{"id":147610,"date":"2022-10-05T17:23:36","date_gmt":"2022-10-05T22:23:36","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/10\/as-ransomware-attacks-increase-new-algorithm-may-help-prevent-power-blackouts"},"modified":"2022-10-05T17:23:36","modified_gmt":"2022-10-05T22:23:36","slug":"as-ransomware-attacks-increase-new-algorithm-may-help-prevent-power-blackouts","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/10\/as-ransomware-attacks-increase-new-algorithm-may-help-prevent-power-blackouts","title":{"rendered":"As ransomware attacks increase, new algorithm may help prevent power blackouts"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/as-ransomware-attacks-increase-new-algorithm-may-help-prevent-power-blackouts2.jpg\"><\/a><\/p>\n<p>Millions of people could suddenly lose electricity if a ransomware attack just slightly tweaked energy flow onto the U.S. power grid.<\/p>\n<p>No single power utility company has enough resources to protect the entire grid, but maybe all 3,000 of the grid\u2019s utilities could fill in the most crucial <a href=\"https:\/\/techxplore.com\/tags\/security\/\" rel=\"tag\" class=\"\">security<\/a> gaps if there were a map showing where to prioritize their security investments.<\/p>\n<p>Purdue University researchers have developed an <a href=\"https:\/\/techxplore.com\/tags\/algorithm\/\" rel=\"tag\" class=\"\">algorithm<\/a> to create that map. Using this tool, regulatory authorities or cyber insurance companies could establish a framework that guides the security investments of power utility companies to parts of the grid at greatest risk of causing a blackout if hacked.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Millions of people could suddenly lose electricity if a ransomware attack just slightly tweaked energy flow onto the U.S. power grid. No single power utility company has enough resources to protect the entire grid, but maybe all 3,000 of the grid\u2019s utilities could fill in the most crucial security gaps if there were a map [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1497,41],"tags":[],"class_list":["post-147610","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-energy","category-information-science"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/147610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=147610"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/147610\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=147610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=147610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=147610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}