Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Applications Of Underground Structures For The Protection Of Critical Infrastructure, George H. Baker, Richard G. Little, Don A. Linger
Applications Of Underground Structures For The Protection Of Critical Infrastructure, George H. Baker, Richard G. Little, Don A. Linger
George H Baker
The U.S. President’s Commission on Critical Infrastructure Protection (PCCIP), convened in the wake of the bombing of the Murrah Federal Building in Oklahoma City, concluded that the nation’s physical security and economic security depend on our critical energy, communications, and computer infrastructures. While a primary motivating event for the establishment of the commission was the catastrophic physical attack of the Murrah Building, it is ironic that the commission focused its attention primarily on cyber threats. Their rationale was that cyber vulnerabilities posed a new, unaddressed challenge to infrastructure security. This approach was further questioned by the events of September 11, …
Supervisory Control And Data Acquisition (Scada) Systems, George H. Baker, Allan Berg
Supervisory Control And Data Acquisition (Scada) Systems, George H. Baker, Allan Berg
George H Baker
Our critical national infrastructure systems have become almost universally dependent upon computer-based control systems technically referred to as supervisory control and data acquisition (SCADA) systems. SCADA systems evolved from the telemetry and event-alarm systems developed in the early days of utilities. With the widespread use of SCADA systems, computers have become the "basis element" for much of our critical infrastructure. Thus, the disruption of controlling computer terminals and networks due to natural disasters, electric power failure, accidents or malicious activity can have catastrophic consequences.