nuclear_plant_sw

nuclear_plant_sw - A Method for Developing Secure Software...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
A Method for Developing Secure Software for Nuclear Power Plants Jeffrey Kirby Mohamed Sharaf Daniel Du
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Outline Background Related Work Proposal Examples Conclusion and Future work References
Background image of page 2
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Critical Infrastructure Critical Infrastructure Resources and services which are essential to a society and its economy Physical or virtual systems and assets so vital to the nation that their incapacitation or destruction would have a debilitating impact on national and economic security, public health, and safety
Background image of page 4
Critical Infrastructure Examples Energy (nuclear, coal, generation and distribution) Water (water purification, sewage) Transportation (interstate system, airports, railroads) Telecommunications (internet)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Critical Infrastructure In fact, there have already been some serious accidents and safety breaches as a result of linking SCADA systems to the main TCP/IP network. The 883 MW Unit 2 at the Hatch Nuclear Power Plant in Georgia went through an emergency shutdown as a result of a software update that was made on the plant’s business network. The system update synchronized information on both systems, wiping out much of the data on the SCADA side. After everything was reset following a reboot, the SCADA safety system detected a lack of data, which it interpreted to mean that cooling system water levels for the nuclear fuel rods had dropped. It suggested a dangerous situation, indeed, if, in fact, the event had actually occurred.
Background image of page 6
Critical Infrastructure The Browns Ferry nuclear plant in Alabama, for example, shut down in 2006 when a network traffic overload locked up pump controls. The Slammer worm penetrated a private computer network at Ohio's Davis-Besse nuclear power plant in January and disabled a safety monitoring system for nearly five hours, despite a belief by plant personnel that the network was protected by a firewall
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Critical Infrastructure Maroochy Shire sewage spill. In the spring of 2000, a former employee of an Australian organization that develops manufacturing software applied for a job with the local government, but was rejected. Over a 2-month period, this individual reportedly used a radio transmitter on as many as 46 occasions to remotely break into the controls of a sewage treatment system. He altered electronic data for particular sewerage pumping stations and caused malfunctions in their operations, ultimately releasing about 264,000 gallons of raw sewage into nearby rivers and parks.
Background image of page 8
Critical Infrastructure Current Examples “Experts Alarmed Over U.S. Electrical Grid Penetration” Robert Westervelt. SearchSecurity.com. 08 April 2009. “Russian and Chinese cybercriminals penetrated the U.S. electrical grid, leaving behind malware that could disrupt the
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/13/2011 for the course CSCE 548 taught by Professor Farkas during the Spring '10 term at South Carolina.

Page1 / 34

nuclear_plant_sw - A Method for Developing Secure Software...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online