SlideShare a Scribd company logo
Cyber Security in
Power Grid
JISHNU PRADEEP
The US Power Grid
An electrical grid is an interconnected network for
delivering electricity from suppliers to consumers.
The U.S. power transmission grid consists of about
300,000 km (186,411 mi) of lines operated by
approximately 500 companies.
American homes, industries, and businesses are
deeply dependent on reliable electricity, so threats to
the consistent delivery of electricity put modern life
itself at risk.
Threats to the Power Grid
 Protecting the nation’s electricity grid from attacks is a critical
national security issue.
 Cyber attacks on key energy infrastructure—and on the electricity
system in particular—are increasing, both in frequency and
sophistication. These trends are alarming because the potential
consequences of a successful large-scale cyber attack.
Cyber attacks in Power Grids
 Infecting industrial systems, such as power grids, with malware is so simple that
there are 5-minute YouTube tutorials on how to do it. By overwhelming network
links with traffic in a DDoS attack, Internet users or cyber-terrorists can and
have removed the ability of utilities to communicate with their own electrical
grids, effectively causing a blackout.
 The estimated price for 24 hours of consistent DDoS attack is a mere $40, making
such attacks available to pretty much anybody.
 What makes this attacks worse? Difficult to spot, even when they are happening
Results in a ‘nightmare scenario’
 Stores closed. Cell service fails. Broadband Internet is compromised.
 Hospitals are operating on generators, but rapidly running out of fuel.
 Water supply will be hit.
 Commerce would be brought to a standstill.
 Transport and Communication lines disrupted.
 Crimes will surge.
 The geopolitical fallout could be even worse.
RESULT: Complete Chaos!
The scenario isn’t completely hypothetical.
Vulnerabilities
 The power grid is controlled by more than just a panel of
digital buttons.
 Grid operation depends on control systems—called
Supervisory Control And Data Acquisition (SCADA)—that
monitor and control the physical infrastructure.
 The U.S. electrical grid is decentralized network owned by
numerous local operators.
 Any smart meters connected to the internet can be easily
exploited.
The U.S. power grid is full of seams that can be exploited
by hackers.
Examples of Cyber Attacks on Energy
Systems
 Stuxnet (worm): It gained attention for the damage it caused at a nuclear facility in
Iran.
 Aurora: The planned cyber attack on a generator control system led to the
destruction of the generator and a fire.
 Slammer (SQL Server worm): The worm disabled a safety-monitoring system for
several hours and led to a temporary failure of a nuclear power plant’s process
computer.
 Shamoon (virus): The national oil company of Saudi Arabia, Aramco, reported in
2012 that this was responsible for damaging about 30,000 computers in an effort to
disrupt energy and oil production.
Attack on Ukrainian Power Grid
 Took place on 23 December 2015 and is a considered to
be the first known successful cyber attack on a power
grid.
 Hackers were able to successfully compromise
information systems of three energy distribution
companies in Ukraine and temporary disrupt electricity
supply.
 They took out 60 substations leaving 700,000 residents in
the dark. This attack was relatively short-lived (7 hours)
and benign. The next one might not be.
Steps involved:
 Prior compromise of corporate networks using spear-fishing emails with
BlackEnergy malware.
 Seizing SCADA under control, remotely switching substations off.
 Disabling IT infrastructure components(UPS, Modem).
 Destruction of files stored on servers and workstations with the KillDisk malware.
 Denial-of-service attack on call-center to deny consumers up-to-date information
on the blackout.
BlackEnergy3 and KillDisk Malwares
 What is it? BlackEnergy is a Trojan malware designed to launch
DDoS attacks, download custom spam, and banking information-
stealer plugins.
 Function: BlackEnergy malware was known to have been used to
deliver KillDisk, a feature that could render systems unusable and
could obliterate critical components on an infected system.
 Who is responsible? The Ukraine attack has been attributed
to Sandworm, a Russian cyber espionage group known to have
been harassing Ukrainian officials.

More Related Content

What's hot

Smart Grid
Smart GridSmart Grid
Smart Grid
Mohamed Abuella
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
Mihir Acharya
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction Nilesh Dhage
 
concept of resilience and self healing in smart grid
concept of resilience and self healing in smart gridconcept of resilience and self healing in smart grid
concept of resilience and self healing in smart grid
Kundan Kumar
 
CYBERSECURITY FOR POWER SYSTEMS
CYBERSECURITY FOR POWER SYSTEMSCYBERSECURITY FOR POWER SYSTEMS
CYBERSECURITY FOR POWER SYSTEMS
Power System Operation
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)
Chinedu Opara
 
smart grid seminar report
smart grid seminar reportsmart grid seminar report
smart grid seminar report
ramesh kumawat
 
SMART GRID TECHNOLOGY
SMART GRID TECHNOLOGYSMART GRID TECHNOLOGY
SMART GRID TECHNOLOGY
asegekar18
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
Smarak Suman
 
Introduction to Microgrid
Introduction to Microgrid Introduction to Microgrid
Advanced Metering Infrastructure Standards and protocol
Advanced Metering Infrastructure Standards and protocolAdvanced Metering Infrastructure Standards and protocol
Advanced Metering Infrastructure Standards and protocol
Eklavya Sharma
 
Smart grid challenge
Smart grid challengeSmart grid challenge
Smart grid challenge
Abhishek Kumar
 
Smart Grid
Smart GridSmart Grid
Smart grid
Smart gridSmart grid
Smart grid
Abhishek Kumar
 
Cloud computing for smart grid applications
Cloud computing for smart grid applicationsCloud computing for smart grid applications
Cloud computing for smart grid applications
Siksha 'O' Anusandhan (Deemed to be University )
 
Protection and control of Microgrid
Protection and control of MicrogridProtection and control of Microgrid
Protection and control of Microgrid
Amarjeet S Pandey
 
Energy storage in smart micro-grid
Energy storage in smart micro-gridEnergy storage in smart micro-grid
Energy storage in smart micro-grid
Siksha 'O' Anusandhan (Deemed to be University )
 
Policies for smart grid
Policies for smart gridPolicies for smart grid
Policies for smart grid
Ashfaq khan
 

What's hot (20)

Smart Grid
Smart GridSmart Grid
Smart Grid
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
 
concept of resilience and self healing in smart grid
concept of resilience and self healing in smart gridconcept of resilience and self healing in smart grid
concept of resilience and self healing in smart grid
 
CYBERSECURITY FOR POWER SYSTEMS
CYBERSECURITY FOR POWER SYSTEMSCYBERSECURITY FOR POWER SYSTEMS
CYBERSECURITY FOR POWER SYSTEMS
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)
 
smart grid seminar report
smart grid seminar reportsmart grid seminar report
smart grid seminar report
 
SMART GRID TECHNOLOGY
SMART GRID TECHNOLOGYSMART GRID TECHNOLOGY
SMART GRID TECHNOLOGY
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
 
Introduction to Microgrid
Introduction to Microgrid Introduction to Microgrid
Introduction to Microgrid
 
Advanced Metering Infrastructure Standards and protocol
Advanced Metering Infrastructure Standards and protocolAdvanced Metering Infrastructure Standards and protocol
Advanced Metering Infrastructure Standards and protocol
 
Smart grid challenge
Smart grid challengeSmart grid challenge
Smart grid challenge
 
Microgrid
MicrogridMicrogrid
Microgrid
 
Smart Grid
Smart GridSmart Grid
Smart Grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
Cloud computing for smart grid applications
Cloud computing for smart grid applicationsCloud computing for smart grid applications
Cloud computing for smart grid applications
 
Smart grid
Smart gridSmart grid
Smart grid
 
Protection and control of Microgrid
Protection and control of MicrogridProtection and control of Microgrid
Protection and control of Microgrid
 
Energy storage in smart micro-grid
Energy storage in smart micro-gridEnergy storage in smart micro-grid
Energy storage in smart micro-grid
 
Policies for smart grid
Policies for smart gridPolicies for smart grid
Policies for smart grid
 

Viewers also liked

The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
Venafi
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Community Protection Forum
 
61850easy Test Tool 2013
61850easy Test Tool 201361850easy Test Tool 2013
61850easy Test Tool 2013
GE Grid Solutions
 
Smart grid projects and ciber security in brazil conference
Smart grid projects and ciber security in  brazil conference Smart grid projects and ciber security in  brazil conference
Smart grid projects and ciber security in brazil conference
José Reynaldo Formigoni Filho, MSc
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Shah Sheikh
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Jishnu Pradeep
 
Insights on it risks cyber attacks
Insights on it risks cyber attacksInsights on it risks cyber attacks
Insights on it risks cyber attacksVladimir Matviychuk
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposesZakaria Zubi
 
Educ 2 d slideshare
Educ 2 d slideshareEduc 2 d slideshare
Educ 2 d slideshare
Mhel Cañete
 
Vilde icon
Vilde icon Vilde icon
Vilde icon SofiaNim
 
understanding networked infrastructure
understanding networked infrastructureunderstanding networked infrastructure
understanding networked infrastructureMohammad Salman
 
61850easy Test Tool for IEC 61850 Networks & Systems
61850easy Test Tool for IEC 61850 Networks & Systems61850easy Test Tool for IEC 61850 Networks & Systems
61850easy Test Tool for IEC 61850 Networks & Systems
GE Grid Solutions
 
Analysis of database tampering
Analysis of database tamperingAnalysis of database tampering
Analysis of database tampering
saddamhusain hadimani
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
 
Basic concept cybersecurity
Basic concept cybersecurityBasic concept cybersecurity
Basic concept cybersecurity
Settapong_CyberSecurity
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber security
mahendra_chauhan
 
Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot project
canaleenergia
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
anthony4web
 

Viewers also liked (20)

The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
61850easy Test Tool 2013
61850easy Test Tool 201361850easy Test Tool 2013
61850easy Test Tool 2013
 
Smart grid projects and ciber security in brazil conference
Smart grid projects and ciber security in  brazil conference Smart grid projects and ciber security in  brazil conference
Smart grid projects and ciber security in brazil conference
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
 
Insights on it risks cyber attacks
Insights on it risks cyber attacksInsights on it risks cyber attacks
Insights on it risks cyber attacks
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposes
 
Educ 2 d slideshare
Educ 2 d slideshareEduc 2 d slideshare
Educ 2 d slideshare
 
Vilde icon
Vilde icon Vilde icon
Vilde icon
 
understanding networked infrastructure
understanding networked infrastructureunderstanding networked infrastructure
understanding networked infrastructure
 
61850easy Test Tool for IEC 61850 Networks & Systems
61850easy Test Tool for IEC 61850 Networks & Systems61850easy Test Tool for IEC 61850 Networks & Systems
61850easy Test Tool for IEC 61850 Networks & Systems
 
Analysis of database tampering
Analysis of database tamperingAnalysis of database tampering
Analysis of database tampering
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Basic concept cybersecurity
Basic concept cybersecurityBasic concept cybersecurity
Basic concept cybersecurity
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber security
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot project
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 

Similar to Cyber Security of Power grids

Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochure
George Wainblat
 
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
nilesh405711
 
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Power System Operation
 
US Power Grid Vs. Smart Grid
US Power Grid Vs. Smart GridUS Power Grid Vs. Smart Grid
US Power Grid Vs. Smart GridJosh Wentz
 
Presentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue systemPresentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue system
Mahesh Chandra Manav
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Power System Operation
 
Running head SMART GRID .docx
Running head SMART GRID                                          .docxRunning head SMART GRID                                          .docx
Running head SMART GRID .docx
todd521
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
 
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
Muhammad FAHAD
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
IJRES Journal
 
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Ahmed Al Enizi
 
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
IRJET Journal
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
Power System Essay
Power System EssayPower System Essay
Power System Essay
Divya Watson
 
8 fault-analysis-and-electrical
8 fault-analysis-and-electrical8 fault-analysis-and-electrical
8 fault-analysis-and-electrical
Senghuo LY
 
Cyber Security for SCADA
Cyber Security for SCADACyber Security for SCADA
Cyber Security for SCADARichard Umbrino
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Business Days
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
Hamza AlBzoor
 
Trans Block Show
Trans Block ShowTrans Block Show
Trans Block Showmjsmith9
 

Similar to Cyber Security of Power grids (20)

Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochure
 
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
 
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
 
US Power Grid Vs. Smart Grid
US Power Grid Vs. Smart GridUS Power Grid Vs. Smart Grid
US Power Grid Vs. Smart Grid
 
Presentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue systemPresentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue system
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
 
Running head SMART GRID .docx
Running head SMART GRID                                          .docxRunning head SMART GRID                                          .docx
Running head SMART GRID .docx
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
 
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
Power System Essay
Power System EssayPower System Essay
Power System Essay
 
8 fault-analysis-and-electrical
8 fault-analysis-and-electrical8 fault-analysis-and-electrical
8 fault-analysis-and-electrical
 
Cyber Security for SCADA
Cyber Security for SCADACyber Security for SCADA
Cyber Security for SCADA
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
 
Trans Block Show
Trans Block ShowTrans Block Show
Trans Block Show
 

Recently uploaded

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 

Recently uploaded (20)

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 

Cyber Security of Power grids

  • 1. Cyber Security in Power Grid JISHNU PRADEEP
  • 2. The US Power Grid An electrical grid is an interconnected network for delivering electricity from suppliers to consumers. The U.S. power transmission grid consists of about 300,000 km (186,411 mi) of lines operated by approximately 500 companies. American homes, industries, and businesses are deeply dependent on reliable electricity, so threats to the consistent delivery of electricity put modern life itself at risk.
  • 3. Threats to the Power Grid  Protecting the nation’s electricity grid from attacks is a critical national security issue.  Cyber attacks on key energy infrastructure—and on the electricity system in particular—are increasing, both in frequency and sophistication. These trends are alarming because the potential consequences of a successful large-scale cyber attack.
  • 4. Cyber attacks in Power Grids  Infecting industrial systems, such as power grids, with malware is so simple that there are 5-minute YouTube tutorials on how to do it. By overwhelming network links with traffic in a DDoS attack, Internet users or cyber-terrorists can and have removed the ability of utilities to communicate with their own electrical grids, effectively causing a blackout.  The estimated price for 24 hours of consistent DDoS attack is a mere $40, making such attacks available to pretty much anybody.  What makes this attacks worse? Difficult to spot, even when they are happening
  • 5. Results in a ‘nightmare scenario’  Stores closed. Cell service fails. Broadband Internet is compromised.  Hospitals are operating on generators, but rapidly running out of fuel.  Water supply will be hit.  Commerce would be brought to a standstill.  Transport and Communication lines disrupted.  Crimes will surge.  The geopolitical fallout could be even worse. RESULT: Complete Chaos! The scenario isn’t completely hypothetical.
  • 6.
  • 7. Vulnerabilities  The power grid is controlled by more than just a panel of digital buttons.  Grid operation depends on control systems—called Supervisory Control And Data Acquisition (SCADA)—that monitor and control the physical infrastructure.  The U.S. electrical grid is decentralized network owned by numerous local operators.  Any smart meters connected to the internet can be easily exploited. The U.S. power grid is full of seams that can be exploited by hackers.
  • 8. Examples of Cyber Attacks on Energy Systems  Stuxnet (worm): It gained attention for the damage it caused at a nuclear facility in Iran.  Aurora: The planned cyber attack on a generator control system led to the destruction of the generator and a fire.  Slammer (SQL Server worm): The worm disabled a safety-monitoring system for several hours and led to a temporary failure of a nuclear power plant’s process computer.  Shamoon (virus): The national oil company of Saudi Arabia, Aramco, reported in 2012 that this was responsible for damaging about 30,000 computers in an effort to disrupt energy and oil production.
  • 9. Attack on Ukrainian Power Grid  Took place on 23 December 2015 and is a considered to be the first known successful cyber attack on a power grid.  Hackers were able to successfully compromise information systems of three energy distribution companies in Ukraine and temporary disrupt electricity supply.  They took out 60 substations leaving 700,000 residents in the dark. This attack was relatively short-lived (7 hours) and benign. The next one might not be.
  • 10. Steps involved:  Prior compromise of corporate networks using spear-fishing emails with BlackEnergy malware.  Seizing SCADA under control, remotely switching substations off.  Disabling IT infrastructure components(UPS, Modem).  Destruction of files stored on servers and workstations with the KillDisk malware.  Denial-of-service attack on call-center to deny consumers up-to-date information on the blackout.
  • 11. BlackEnergy3 and KillDisk Malwares  What is it? BlackEnergy is a Trojan malware designed to launch DDoS attacks, download custom spam, and banking information- stealer plugins.  Function: BlackEnergy malware was known to have been used to deliver KillDisk, a feature that could render systems unusable and could obliterate critical components on an infected system.  Who is responsible? The Ukraine attack has been attributed to Sandworm, a Russian cyber espionage group known to have been harassing Ukrainian officials.

Editor's Notes

  1. Every single home, industry and business depends greatly on electricity and any sort of disruption to the power grid would put modern life at risk.
  2. Out of all the threats faced by the power grid including weather, Cyberattacks are the ones to watch out for. It is increasing in both frequency and sophistication.
  3. By overwhelming network links with traffic in a DDOS attack, cyber terrorists can disable power grids causing blackouts.
  4. Any disruption to power grids would result in a nightmare scenario where all communication and transportation lines will be affected bringing life to a standstill.
  5. Moreover, with the advent of smart grid systems, Blackouts such as this, shown in Watchdogs, would not just exist in games, but also in everyday life.
  6. All the generating plants and substations are connected to a control center through a public network. Attacks are mainly launched through these decentralized networks. Even the IOT smart meters connected to internet become an easy target.
  7. Examples of a few cyber attacks launched against energy systems.
  8. World’s first power outage caused by hackers. They successfully managed to compromise information systems of 3 energy distribution companies to disrupt electricity in Ukraine, leaving 700,000 residents in the dark for 7 hours.
  9. Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Consumers were denied information about the blackout.
  10. Blackenergy is a trojan malware that launches a DDOS attack to deliver killdisk malware which in turn destroys files on information systems. A Russian group of hackers called Sandworm has been claimed to be responsible for this attack.