Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Applications Of Underground Structures For The Protection Of Critical Infrastructure, George H. Baker, Richard G. Little, Don A. Linger Nov 2002

Applications Of Underground Structures For The Protection Of Critical Infrastructure, George H. Baker, Richard G. Little, Don A. Linger

George H Baker

The U.S. President’s Commission on Critical Infrastructure Protection (PCCIP), convened in the wake of the bombing of the Murrah Federal Building in Oklahoma City, concluded that the nation’s physical security and economic security depend on our critical energy, communications, and computer infrastructures. While a primary motivating event for the establishment of the commission was the catastrophic physical attack of the Murrah Building, it is ironic that the commission focused its attention primarily on cyber threats. Their rationale was that cyber vulnerabilities posed a new, unaddressed challenge to infrastructure security. This approach was further questioned by the events of September 11, …


Supervisory Control And Data Acquisition (Scada) Systems, George H. Baker, Allan Berg Nov 2002

Supervisory Control And Data Acquisition (Scada) Systems, George H. Baker, Allan Berg

George H Baker

Our critical national infrastructure systems have become almost universally dependent upon computer-based control systems technically referred to as supervisory control and data acquisition (SCADA) systems. SCADA systems evolved from the telemetry and event-alarm systems developed in the early days of utilities. With the widespread use of SCADA systems, computers have become the "basis element" for much of our critical infrastructure. Thus, the disruption of controlling computer terminals and networks due to natural disasters, electric power failure, accidents or malicious activity can have catastrophic consequences.