Below are excerpts from a few articles about “The New Paradigm” of Information Security within our soon-to-be wireless infrastructure. Do they really expect us to believe that putting our National weapons systems, top secret sensitive information, and our entire energy grid onto a wireless infrastructure, accessible through shared servers, won’t be a threat to National Security?
The value of Black Hat for smart grid security
By Andy Bochman – Aug 16, 2011
When it comes to spotting flies in the energy sector security ointment, perhaps regulators are too polite to utilities, and utilities too polite to their suppliers. No such problem with the security hackers who jump up on Black Hat’s global soap box every year and show the world what they’ve found.
The conference wrapped up last week, and I’ve got two completely different types of findings for you. One has to do with huge vulnerabilities in the systems related to home networks at the edge of the smart grid. The other is targeted at the heart of the legacy grid itself: SCADA systems and the programmable logic controllers (PLCs) that run important transmission and distribution equipment.
Two years ago it was smart meter vendors who found themselves embarrassed, in the cross hairs of security pros, who showed how easy it was to exploit weaknesses in their products. Now attention has shifted to other grid elements. And the beatings continue!…
Common Ground Between the Grid and the Cloud
December 9th, 2010 by Jeff Huegel
The smart grid and cloud computing have a lot more in common than you might think…
The smart grid accomplishes these tasks by incorporating distributed computing, or the use of multiple autonomous computers that communicate through a computer network. Cloud computing technology is distributed computing. In cloud computing, when a customer needs more of the service (software, infrastructure, or platform), the cloud provider adds resources to the environment. In a smart grid, power resources are generated based on capacity and allocated where the power provides the most benefit in price and performance. Coordinating a power grid is similar to organizing data in a cloud-computing infrastructure. Both involve matching usage with processing power and delivering the service on-demand, quickly, and efficiently.
DOD’s move to the cloud keeps security experts up at night
By John Edwards Aug 22, 2011
Now DOD officials have a new set of risks to worry about as they push forward with plans to overhaul the way the military uses IT. They want to move to a cloud-computing model in which computer, network and software resources are standardized and shared among many parties, thereby reaping cost and operational benefits that the old approach of duplicative but incompatible IT systems could never deliver.
Of all the emerging technologies — including mobile devices, wireless networks and social media platforms — cloud computing is widely viewed as the one that most often keeps DOD’s information assurance experts from getting a good night’s sleep…