Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham Jul 2008

Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham

George H Baker

The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …


Electric Power: Cyber And Electromagnetic Security Issues, George H. Baker Oct 2007

Electric Power: Cyber And Electromagnetic Security Issues, George H. Baker

George H Baker

Electric power is essential to the functioning of U.S. society. The electric power system increasingly operates at or near its reliability limits. The geographic scale of the tightly coupled networks involved makes the system susceptible to large-scale outages. More frequent natural and accidental failures portend possible catastrophes from intentional disruption. Deregulation has been a major factor to the lack of investment in system upgrades. Techniques to prevent attacks and reduce vulnerabilities are available and affordable.


Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott Apr 2006

Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott

George H Baker

The rise of the American homeland security endeavor under the leadership of the new Department of Homeland Security has been heralded by several major national strategy documents. These documents have served to organize efforts at top levels within the government and industry. However, the national strategy guidance is not getting to many organizations and people at the grass-roots level who can make the most difference in preventing attacks, protecting systems, and recovering from catastrophic events, viz. the general citizenry, private infrastructure owners, and local governments. To better understand grass-roots issues and solutions, James Madison University, in cooperation with the Federal …


Network Security Risk Assessment Modeling Tools For Critical Infrastructure Assessment, George H. Baker, Samuel Redwine, Joseph Blandino Jul 2003

Network Security Risk Assessment Modeling Tools For Critical Infrastructure Assessment, George H. Baker, Samuel Redwine, Joseph Blandino

George H Baker

The James Madison University (JMU) CIPP research team is developing Network Security Risk Assessment Modeling (NSRAM) tools that will enable the assessment of both cyber and physical infrastructure security risks. The effort is driven by the need to predict and compute the probability of adverse effects stemming from system attacks and malfunctions, to understand their consequences, and to improve existing systems to minimize these consequences.

The tools are targeted at systems supporting critical infrastructures varying from individual systems to organization-wide systems, to systems covering entire geographical regions. Early work emphasizes computing systems, but systems sharing the network nature of computing …


Supervisory Control And Data Acquisition (Scada) Systems, George H. Baker, Allan Berg Nov 2002

Supervisory Control And Data Acquisition (Scada) Systems, George H. Baker, Allan Berg

George H Baker

Our critical national infrastructure systems have become almost universally dependent upon computer-based control systems technically referred to as supervisory control and data acquisition (SCADA) systems. SCADA systems evolved from the telemetry and event-alarm systems developed in the early days of utilities. With the widespread use of SCADA systems, computers have become the "basis element" for much of our critical infrastructure. Thus, the disruption of controlling computer terminals and networks due to natural disasters, electric power failure, accidents or malicious activity can have catastrophic consequences.