Maintaining Mission Critical Systems in a 24/7 Environment. Peter M. Curtis

Чтение книги онлайн.

Читать онлайн книгу Maintaining Mission Critical Systems in a 24/7 Environment - Peter M. Curtis страница 26

Автор:
Жанр:
Серия:
Издательство:
Maintaining Mission Critical Systems in a 24/7 Environment - Peter M. Curtis

Скачать книгу

concern to those considering energy security is the dependency of the U.S. on foreign energy sources. Fossil fuels make up the bulk of our energy sources, as seen in Figure 2.1, leaving us vulnerable to disruptions in their supply as well as their contribution to the release of greenhouse gases and other pollutants. Developing a more diverse “energy portfolio” is the solution to this issue, taking a phased approach to introducing renewable energy sources into the power grid.

Graph depicts the U S Primary Energy Sources.

      (Courtesy of Eia.gov.) Source: U.S. Energy Information Administration, US Primary Energy Sources.

      Mission Critical facilities may take a similar path, albeit on a smaller scale. By introducing renewable energy sources on‐site, facilities may reduce their dependency on the grid and improve resiliency in the event of an outage by complementing conventional energy with alternatives.

      Computer hackers pose a significant threat to our information technology systems. There have been instances where hackers have gained access to electric power plants, and possibly triggered major power interruptions. These events demonstrate how vulnerable and fragile our critical infrastructure really is. The electric grid is not the only area we need to be concerned with; the government, military, and business networks are all at risk, and officials are not acting swiftly enough to address these vulnerabilities. Steps need to be taken to improve information security and mitigate the threat of cyber‐attacks.

      Military networks need to be safeguarded as well. Research shows that cyber threats are forming and are searching for ways to disrupt operations remotely. “Denial of Service” attacks are a major threat accomplished by bombarding a computer system with automated message traffic, causing bandwidth overload, where the effects could approach the magnitude of a weapon of mass destruction.

      Analyses of the vulnerabilities of other critical infrastructure sectors have reached similar conclusions: The loss of electric power quickly brings down communications and financial networks, cripples the movement of oil, gas, water, and traffic, and paralyzes emergency response services. Conversely, a disruption in the transportation of coal, oil, and gas can also bring down central power plants along with the power grid.

      The stark reality is that a sustained interruption of any energy delivery system cripples our country. The national electric grid is inherently vulnerable since a small number of large central power plants are linked to millions of customers by hundreds of thousands of miles of exposed transmission and distribution lines. Nearly all high‐voltage electric lines run above ground throughout the country with only a handful of high‐voltage lines serving major metropolitan areas. The national electric grid is a vast, sprawling, multi‐tiered structure that reaches everywhere, and is used by everyone. The North American electric grid, along with the Internet, is the largest networks on the planet. When one key transmission line fails, the load is spread to other lines, which may become overloaded and also fail, causing a domino effect and cascading outages.

      Most accidental grid interruptions last less than two seconds, and many “power quality” issues involve problems that persist for only a few cycles or milliseconds. In most areas of the country, electric outages less than a couple of hours occur only a few times per year, with longer outages even less common.

      Unless deliberate, there is a low risk that several high‐voltage lines feeding a metropolitan area from several different points could fail simultaneously, and when one high voltage transmission line does fail, resources are dispatched quickly to isolate the problem and make appropriate repairs and any necessary improvements. Deliberate assaults, by contrast, are much more likely to disable multiple nodes on the network simultaneously. A 2002 National Academy of Sciences report drove this reality home, observing: “A coordinated attack on a selected set of key points in the [electrical] system could result in a long‐term, multi‐state blackout. While power might be restored in parts of the region within a matter of days or weeks, acute shortages could mandate rolling blackouts for as long as several years.” Operations that can afford to simply shut down and wait out short blackouts may not be able to take that approach in response to the mounting threats of longer outages. Future plans for implementing a “smart grid” will reduce the effects of a deliberate attack on the system.

Graph depicts the number of Breaches and records exposed from 2005 to 2019.

      (Source: statista.com) Source: Based on Annual number of data breaches and exposed records in the United States from 2005 to 2019, Cybercrime: number of breaches and records exposed 2005–2019. Published by J. Clement, Mar 10, 2020. 2020, Statista, Inc.

Pie chart depicts the fuel Sources for Electricity Generation in the U S in 2018.

      (Source:

Скачать книгу