close

Containment,Wide application of digital grid and renewable energy and create opportunities for hackers, these hackers have yet to fully explore even in the past few months, several well-known clean energy companies also take measures to reduce the risk of default.

Containment
One of the world's largest solar energy holders, Maine Laws, chief technology officer of the light source Lab Corp, said hackers could attack renewable energy companies and factories for ransom in Ioannidis.
He said, although there is no aggressive behavior, but the implementation of hackers is not difficult.
In August this year, a Holland researcher found 17 vulnerabilities in solar inverters, which hackers could use to remotely control factory output.
The general manager of the British manufacturer of renewable energy solar energy company and chief financial officer Graham Hardin said that cyber attacks could damage the business reputation, resulting in data and data loss, a threat to the integrity of the security system, cause business interruption, and caused the loss of ransom.
He said: "we believe that any company dealing with technology has the obligation to ensure that network security is considered in all things. We are taking steps to ensure that network security is integrated into our design, solutions, and activities in the same way as physical security."
Last month, SIEMENS Gamesa renewable energy (sgre), a wind turbine generator, recommended a new network security officer for chief information officer Alan Feeley.
The company said in a press release: "network security operations supervisor will expand the framework of network security and management of the company, and will be in Gamesa company and SIEMENS Wind Power Ltd after the merger, the integration of all security in the development process of digital transformation under the background of sgre.
The statement said that increasing the position of network security supervisor at the top management level of the company will help the company prepare for future challenges and risks.
At the same time, dnvgl recently released a practical guide to the safety, performance and performance of grid connected energy storage systems, with particular emphasis on network security.
The guidelines recommend that any software that has network access, security software and data infrastructure should be constantly monitored and maintained in the latest state to resist the latest cyber threats.
In addition, the Berkeley laboratory announced last month that it was launching a project to ease the vulnerability of the rooftop solar panel network.
The Berkeley laboratory announced that the project is the 2 million 500 thousand year development project funded by the U.S. Department of energy for three years. "It will develop tools to detect and respond to certain types of network attacks in the grid."."
This work will focus on the use of standard communication protocol and network communication protocol of intelligent solar inverter if hackers trying to manipulate their settings, researchers hope to provide a way to counter the inverter.
The Berkeley lab says its development team will use the system in the same way as hackers do, but just send the opposite signals to eliminate attacks, such as noise canceling headphones. The project is one of the $50 million funding projects supported by the US Department of energy to improve the resilience and safety of the critical energy infrastructure in the United states.
Because hackers are redoubling their efforts to attack factory equipment, efforts to support energy infrastructure network security need to be made even harder.
For example, since the end of 2015, a dragonfly research and development team has been attacking the energy industry in Europe and North america. Symantec, a security company, said, "a new round of cyber attacks could provide an attacker with serious damage to the affected business.". The dragonfly team seemed to be interested in knowing how to operate energy facilities, and to gain control of the operating system, if the organization may have the ability to destroy or gain control of these systems now, as long as the organization is willing to."
The growing interest of hackers in industrial technology for energy sectors is exposing vulnerabilities that have not previously been obvious, because monitoring and data acquisition (SCADA) or other systems do not communicate with traditional networks.
For example, this year's cry software attack does not have an impact on the SCADA system, which has caused serious losses to some companies and public sector organizations in Europe and asia.
Extortion software attacks use Windows operating systems to control computers, and most SCADA systems are based on them, but hackers are looking for new ways to control Linux for power plants.
For example, David, vice president of research at the black hat hackers said in Europe held in December of last year, cyberx industrial network security vendors, plans to show how penetration of the industrial network "voids", or complete isolation of internet. The meeting explains how to invade the SIEMENS simatics7-1200 controller, which is used in the solar park.

arrow
arrow
    文章標籤
    Containment
    全站熱搜
    創作者介紹
    創作者 hank 的頭像
    hank

    websitedesign

    hank 發表在 痞客邦 留言(0) 人氣()