a protocol developed for the internet to get data from one network device to another
As a result, Scada networks are being migrated to the TCP/IP Ethernet network – the one used to access the internet, to carry internet phone calls, send e-mail and so on.
a type of network technology for local area networks
As a result, Scada networks are being migrated to the TCP/IP Ethernet network – the one used to access the internet, to carry internet phone calls, send e-mail and so on.
Electrical power grids in the eastern US have weak control systems (witness the north-east blackout of 2003), so it would not take much to take them out.
Security Matters: Utilities vulnerable after IT migration – Article taken from the FT (Financial Times)
By Ken Munro
The word “hackers” usually brings up visions of villains trying to crack bank accounts, identity theft and the like, but rarely the stability of critical infrastructures such as water, gas and electricity.
move from one country or region to another and settle there
As a result, Scada networks are being migrated to the TCP/IP Ethernet network – the one used to access the internet, to carry internet phone calls, send e-mail and so on.
Electrical power grids in the eastern US have weak control systems (witness the north-east blackout of 2003), so it would not take much to take them out.
Scada has hardly ever been hacked into, partly because it uses arcane technology that only a small number of specialists have the skills to manipulate.
a pattern of regularly spaced horizontal and vertical lines
Electrical power grids in the eastern US have weak control systems (witness the north-east blackout of 2003), so it would not take much to take them out.
These systems were quite simple: for example, a Scada system might monitor the pressure in a gas pipeline – if it exceeded a set threshold, certain actions might be taken automatically, or a control room might be alerted.
As a result, Scada networks are being migrated to the TCP/IP Ethernet network – the one used to access the internet, to carry internet phone calls, send e-mail and so on.
a set of pages on the internet organized as a single unit
The average hacker might be more interested in stealing data, or defacing a website, but motivations vary: there is already extensive evidence of state-sponsored cyber-attacks.
formless state of matter before the creation of the cosmos
Yet the chaos that would ensue if these were hijacked perhaps ought to raise the greatest alarm; and such a disaster is becoming more of a possibility because of changes in the systems that control them.
Electrical power grids in the eastern US have weak control systems (witness the north-east blackout of 2003), so it would not take much to take them out.
In the UK it is one faced by the Centre for Protection of National Infrastructure, which watches over and works with utilities to ensure they take account of both physical and electronic security.
(computer science) a system of world-wide electronic communication in which a computer user can compose a message at one terminal that can be regenerated at the recipient's terminal when the recipient logs in
As a result, Scada networks are being migrated to the TCP/IP Ethernet network – the one used to access the internet, to carry internet phone calls, send e-mail and so on.
a physical phenomenon that can produce light, heat and power
Security Matters: Utilities vulnerable after IT migration – Article taken from the FT (Financial Times)
By Ken Munro
The word “hackers” usually brings up visions of villains trying to crack bank accounts, identity theft and the like, but rarely the stability of critical infrastructures such as water, gas and electricity.
involving the body as distinguished from the mind or spirit
In the UK it is one faced by the Centre for Protection of National Infrastructure, which watches over and works with utilities to ensure they take account of both physical and electronic security.
Created on Tue Apr 10 03:55:54 EDT 2012
Sign up now (it’s free!)
Whether you’re a teacher or a learner,
Vocabulary.com can put you or your class
on the path to systematic vocabulary improvement.