{"id":91943,"date":"2019-06-11T13:04:49","date_gmt":"2019-06-11T20:04:49","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/06\/protecting-our-energy-infrastructure-from-cyberattack"},"modified":"2019-06-11T13:04:49","modified_gmt":"2019-06-11T20:04:49","slug":"protecting-our-energy-infrastructure-from-cyberattack","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/06\/protecting-our-energy-infrastructure-from-cyberattack","title":{"rendered":"Protecting our energy infrastructure from cyberattack"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/protecting-our-energy-infrastructure-from-cyberattack.jpg\"><\/a><\/p>\n<p>Almost every day, news headlines announce another security breach and the theft of credit card numbers and other personal information. While having one\u2019s credit card stolen can be annoying and unsettling, a far more significant, yet less recognized, concern is the security of physical infrastructure, including energy systems.<\/p>\n<p>\u201cWith a credit card theft, you might have to pay $50 and get a new credit card,\u201d says Stuart Madnick, the John Norris Maguire Professor of Information Technologies at the Sloan School of Management, a professor of engineering systems at the School of Engineering, and founding director of the Cybersecurity at MIT Sloan consortium. \u201cBut with infrastructure attacks, real physical damage can occur, and recovery can take weeks or months.\u201d<\/p>\n<p>A few examples demonstrate the threat. In 2008, an alleged <a href=\"https:\/\/techxplore.com\/tags\/cyberattack\/\" rel=\"tag\" class=\"\">cyberattack<\/a> blew up an oil pipeline in Turkey, shutting it down for three weeks; in 2009, the malicious Stuxnet computer worm destroyed hundreds of Iranian centrifuges, disrupting that country\u2019s nuclear fuel enrichment program; and in 2015, an attack brought down a section of the Ukrainian power grid\u2014for just six hours, but substations on the grid had to be operated manually for months.<\/p>\n<p><a href=\"https:\/\/techxplore.com\/news\/2019-06-energy-infrastructure-cyberattack.html\" target=\"_blank\" rel=\"noopener noreferrer\"><\/p>\n<div style=\"clear:both;\">Read more<\/div>\n<p><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost every day, news headlines announce another security breach and the theft of credit card numbers and other personal information. While having one\u2019s credit card stolen can be annoying and unsettling, a far more significant, yet less recognized, concern is the security of physical infrastructure, including energy systems. \u201cWith a credit card theft, you might [\u2026]<\/p>\n","protected":false},"author":513,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,873],"tags":[],"class_list":["post-91943","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-nuclear-energy"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/91943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/513"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=91943"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/91943\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=91943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=91943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=91943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}