lastID = -293053
Skip to main content Skip to top navigation Skip to site search
Top of page
  • My citations options
    Web Back (from Web)
    Chicago Back (from Chicago)
    MLA Back (from MLA)
Close action menu

You need to login to use this feature.

Please wait a moment…
Please wait while we update your results...
Please wait a moment...
Description: Access Water
Context Menu
Description: Book cover
Is Technology Security Keeping You Away From Data You Need?
  • Browse
  • Compilations
    • Compilations list
  • Subscriptions
Tools

Related contents

Loading related content

Workflow

No linked records yet

X
  • Current: 2022-05-06 20:13:05 Adam Phillips
  • 2022-05-06 20:13:04 Adam Phillips
  • 2020-03-27 02:10:52 Adam Phillips
  • 2020-02-01 00:46:24 Administrator
  • 2020-02-01 00:46:23 Administrator
Description: Access Water
  • Browse
  • Compilations
  • Subscriptions
Log in
0
Accessibility Options

Base text size -

This is a sample piece of body text
Larger
Smaller
  • Shopping basket (0)
  • Accessibility options
  • Return to previous
Description: Book cover
Is Technology Security Keeping You Away From Data You Need?

Is Technology Security Keeping You Away From Data You Need?

Is Technology Security Keeping You Away From Data You Need?

  • New
  • View
  • Details
  • Reader
  • Default
  • Share
  • Email
  • Facebook
  • Twitter
  • LinkedIn
  • New
  • View
  • Default view
  • Reader view
  • Data view
  • Details

This page cannot be printed from here

Please use the dedicated print option from the 'view' drop down menu located in the blue ribbon in the top, right section of the publication.

screenshot of print menu option

Description: Book cover
Is Technology Security Keeping You Away From Data You Need?
Abstract
For the past 20 years, utility managers have worked hard to gain access to valuable data captive in process control systems (PCS) including SCADA. Unfortunately, security precautions implemented in the wake of the 9-11 terrorist attacks have now curtailed access to that data for many utility decision makers. A recent WERF/AwwaRF research project, led by EMA, was designed to determine current vulnerabilities and consequences and to quantify vulnerabilities for water and wastewater utilities. What the research project found may come as a surprise to many utility managers.In the past, automated systems were resilient largely due to complex communication protocols, proprietary real-time operating systems, and limited connectivity. Because of these safeguards and protocols, it was unlikely that an intruder could create commands on the fly to start, stop, open, close, or otherwise disrupt operating equipment. Today's technology has changed that, leaving SCADA and PCS systems vulnerable to intrusions. At the same time, the information contained in these systems is necessary to facilitate effective day-to-day operations of the utility and management decision-making. The data is required throughout the organization to make better decisions while managing the operation.In the wake of 9–11, many utilities have limited access to this data by isolating their automation systems from other networks in an attempt to be more secure, negating the operational benefits of access to SCADA and process control system data. As part of this project, 11 U.S. utilities (small to large) participated in the research, testing, and validation of guidance, recommendations and a self assessment tool. Self-analysis by participating utilities revealed a number of shortcomings in existing security policies, procedures, and practices. Field studies confirmed these results and even further vulnerabilities – i.e., you don't know what you don't know. Most importantly, it was shown that just because the SCADA and PCS systems are isolated from the rest of the utility's computer networks – thus preventing data access – doesn't mean these systems are secure against different sets of threats and scenarios. The research project has produced valuable findings for all utilities, results that give managers the information needed and tools to protect their core business operation of facilities and infrastructure. Just as important, however, is the discovery that adequate protection of automation technology does not require utility managers to forego use of valuable data produced by these systems. This presentation will explain how to keep systems secure and retain access to key data.
For the past 20 years, utility managers have worked hard to gain access to valuable data captive in process control systems (PCS) including SCADA. Unfortunately, security precautions implemented in the wake of the 9-11 terrorist attacks have now curtailed access to that data for many utility decision makers. A recent WERF/AwwaRF research project, led by EMA, was designed to determine current...
Author(s)
Candace SandsTerry Brueck
SourceProceedings of the Water Environment Federation
SubjectSession WED3: Making Security Make Sense
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2006
ISSN1938-6478
SICI1938-6478(20060101)2006:1L.799;1-
DOI10.2175/193864706783789842
Volume / Issue2006 / 1
Content sourceUtility Management Conference
First / last page(s)799 - 803
Copyright2006
Word count407

Purchase price $11.50

Get access
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'Is Technology Security Keeping You Away From Data You Need?'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: Book cover
Is Technology Security Keeping You Away From Data You Need?
Pricing
Non-member price: $11.50
Member price:
-293053
Get access
-293053
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'Is Technology Security Keeping You Away From Data You Need?'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.

Details

Description: Book cover
Is Technology Security Keeping You Away From Data You Need?
Abstract
For the past 20 years, utility managers have worked hard to gain access to valuable data captive in process control systems (PCS) including SCADA. Unfortunately, security precautions implemented in the wake of the 9-11 terrorist attacks have now curtailed access to that data for many utility decision makers. A recent WERF/AwwaRF research project, led by EMA, was designed to determine current vulnerabilities and consequences and to quantify vulnerabilities for water and wastewater utilities. What the research project found may come as a surprise to many utility managers.In the past, automated systems were resilient largely due to complex communication protocols, proprietary real-time operating systems, and limited connectivity. Because of these safeguards and protocols, it was unlikely that an intruder could create commands on the fly to start, stop, open, close, or otherwise disrupt operating equipment. Today's technology has changed that, leaving SCADA and PCS systems vulnerable to intrusions. At the same time, the information contained in these systems is necessary to facilitate effective day-to-day operations of the utility and management decision-making. The data is required throughout the organization to make better decisions while managing the operation.In the wake of 9–11, many utilities have limited access to this data by isolating their automation systems from other networks in an attempt to be more secure, negating the operational benefits of access to SCADA and process control system data. As part of this project, 11 U.S. utilities (small to large) participated in the research, testing, and validation of guidance, recommendations and a self assessment tool. Self-analysis by participating utilities revealed a number of shortcomings in existing security policies, procedures, and practices. Field studies confirmed these results and even further vulnerabilities – i.e., you don't know what you don't know. Most importantly, it was shown that just because the SCADA and PCS systems are isolated from the rest of the utility's computer networks – thus preventing data access – doesn't mean these systems are secure against different sets of threats and scenarios. The research project has produced valuable findings for all utilities, results that give managers the information needed and tools to protect their core business operation of facilities and infrastructure. Just as important, however, is the discovery that adequate protection of automation technology does not require utility managers to forego use of valuable data produced by these systems. This presentation will explain how to keep systems secure and retain access to key data.
For the past 20 years, utility managers have worked hard to gain access to valuable data captive in process control systems (PCS) including SCADA. Unfortunately, security precautions implemented in the wake of the 9-11 terrorist attacks have now curtailed access to that data for many utility decision makers. A recent WERF/AwwaRF research project, led by EMA, was designed to determine current...
Author(s)
Candace SandsTerry Brueck
SourceProceedings of the Water Environment Federation
SubjectSession WED3: Making Security Make Sense
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2006
ISSN1938-6478
SICI1938-6478(20060101)2006:1L.799;1-
DOI10.2175/193864706783789842
Volume / Issue2006 / 1
Content sourceUtility Management Conference
First / last page(s)799 - 803
Copyright2006
Word count407

Actions, changes & tasks

Outstanding Actions

Add action for paragraph

Current Changes

Add signficant change

Current Tasks

Add risk task

Connect with us

Follow us on Facebook
Follow us on Twitter
Connect to us on LinkedIn
Subscribe on YouTube
Powered by Librios Ltd
Powered by Librios Ltd
Authors
Terms of Use
Policies
Help
Accessibility
Contact us
Copyright © 2024 by the Water Environment Federation
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: WWTF Digital Boot 180x150
WWTF Digital (180x150)
Created on Jul 02
Websitehttps:/­/­www.wef.org/­wwtf?utm_medium=WWTF&utm_source=AccessWater&utm_campaign=WWTF
180x150
Candace Sands# Terry Brueck. Is Technology Security Keeping You Away From Data You Need?. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Web. 1 Jul. 2025. <https://www.accesswater.org?id=-293053CITANCHOR>.
Candace Sands# Terry Brueck. Is Technology Security Keeping You Away From Data You Need?. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Accessed July 1, 2025. https://www.accesswater.org/?id=-293053CITANCHOR.
Candace Sands# Terry Brueck
Is Technology Security Keeping You Away From Data You Need?
Access Water
Water Environment Federation
December 22, 2018
July 1, 2025
https://www.accesswater.org/?id=-293053CITANCHOR