Skip to main content

Currently Skimming:

Summary
Pages 1-6

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 1...
... Such an attack could be carried out by knowlsystem is inherently vulnerable because transmission lines edgeable attackers with little risk of detection or interdiction. may span hundreds of miles, and many key facilities are Further well-planned and coordinated attacks by terrorists unguarded.
From page 2...
... SCADA systems to disrupt the flow of electricity, transmit erroneous signals to operators, block the flow of vital infor mation, or disable protective systems. Cyber attacks are Physical Vulnerability unlikely to cause extended outages, but if well coordinated Disruption in the supply of electric power can result from they could magnify the damage of a physical attack.
From page 3...
... TABLE S.1 Examples of Options for Minimizing Vulnerability Selected Options Currently Available Selected Options That R&D Could Make Available Physical vulnerability Hardening of key substations and control centers Improved intrusion sensors Increased physical surveillance Development of strategies to provide greater system Addition of transmission towers that can prevent capacity domino-like collapse Greater use of distributed generation and micro-grids For additional examples, see Chapter 3 For additional examples, see Chapter 9 Cyber vulnerability Elimination of all non-essential pathways to external Improved cyber security for sensors, communication, and systems control systems Use of high-quality cyber security on all links Systems to monitor for, and help avoid, operator error For additional examples, see Chapter 4 For additional examples, see Chapter 9 Personnel vulnerability Improved employee and contractor screening Improved training simulators Improved training for attack response Expansion of support for educational programs in power Improved planning and coordination with engineering that have atrophied in large part because of government (especially law enforcement) very limited research investment For additional examples, see Chapter 5 For additional examples, see Chapter 9 Increased system robustness and A change in institutional arrangements and incentives Lower-cost undergrounding graceful degradation to ensure adequate modernization of the Improved probabilistic vulnerability assessment transmission system Improved sensors, communication, real-time analysis, and Greater use of high-voltage power electronic system visualization technology Improved automatic control Greater use of DC interconnects Improved capability for islanding and self-healing Expanded and more selective demand-side Improved energy storage management and distribution automation For additional examples, see Chapter 9 For additional examples, see Chapter 6 Accelerated restoration Expanded planning for very large outages Development and stockpiling of restoration transformers Designation of some utility employees as first and other key equipment of long leadtime responders.
From page 4...
... could isolate themselves from the failing grid and maintain a balance of generation and demand within their borders. Expedite Restoration Physical protection of critical facilities includes hardened enclosures for key transformers, improved electronic surveil- After an attack, an electric utility's main focus will be lance, and system tools that can identify physical and control on restoring power to its customers.
From page 5...
... Thus, in that require alternative or backup sources of electric power addition to strengthening the grid, society should also focus for key facilities. on identifying critical services and developing strategies to keep them operating in the event of power outages -- be they THE IMPORTANCE OF INVESTMENT IN RESEARCH accidental or the result of terrorist attack.
From page 6...
... . Department of Homeland Security should: · Recommendation 6 Take the lead in initiating plan ning at the state and local level to reduce the vulner · Recommendation 1 Take the lead and work with the ability of critical services in the event of disruption DOE and with relevant private parties to develop and of conventional power supplies, and offer pilot and stockpile a family of easily transported high-voltage incremental funding to implement these activities recovery transformers and other key equipment.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.