Friday, December 27, 2019
Cyber Defense Strategy - 726 Words
Abstract ââ¬â This paper presents a resilient defense strategy to protect the power system state estimation against false data injection (FDI) attacks. The proposed strategy is based on calculation of the risk of the attack and the optimal budget allocation on the measurements. The method has been formulated as a mixed integer nonlinear programming (MINLP) problem. Multiple researchers have addressed the same problem but with the assumption that some meter measurements can be fully protected or without considering the risk of the attack. The validation of the proposed method has also been evaluated based on various IEEE standard test systems, including IEEE 5-bus, 9-bus, 14-bus and 39-bus system. Index Termsââ¬âCyber-attacks, resiliency, stateâ⬠¦show more contentâ⬠¦Multiple research presented defense strategies against FDIA attacks not only to protect the system but also increase its cyber resiliency [12], [18], [14]. Resiliency as defined in literature is the systemââ¬â¢s ability to plan/prepare, absorb, recover from and adapt to known and unknown threats [18]. For example, a self-healing PMU network to achieve resiliency against cyber-attacks is introduced in a software-defined networking (SDN) infrastructure in [12]. The configuration of the network switches will change to isolate the compromised measurements to prevent further propagation of the attack. This strategy has its own drawbacks such as not being practical because of too much latency of the data to reach at the operational and decision centers. The delay due to several reconfigurations will make the power system more vulnerable to unwanted blackouts due to false and late estimated state measuremen ts. The introduced method also increases maintenance cost and failure rates of the switches. Another strategy proposed is the optimal protection method presented in [5]. This method protects the state variables with the minimum number of measurements, as a variant Steiner tree problem in a graph. This result in an N-P hard problem that needs to be solved each time bad data is detected, requiring huge processing and computation resources. The authors in [6] proposedShow MoreRelatedBuilding And Maintain A Cyber Operations Force1394 Words à |à 6 PagesStrategic Goals Build and maintain a cyber operations force: The Department of Defense requires personnel to be trained to the highest standards and have the highest quality technology available to them in order to operate effectively. To this end the Department of Defense initiated the Cyber Mission Force in 2013 (ââ¬Å"Department of Defense Cyber Strategy,â⬠2015). The Cyber Mission Force is 133 cyber teams: 68 Cyber Protection teams focused on defending the network, 13 National Mission teams to defendRead MoreObama Administrations Policy Views on Cybersecurity1338 Words à |à 6 PagesAdministrationââ¬â¢s Policy Views on Cybersecurity 1.1. Enhancing Resilience 1.2. Reducing Threats Obama and Bush Administrations 1.3. Bush Administration 1.4. Policy Similarities 1.5. Policy Differences Recommendations for Improvements 1.6 Cyber Czar Position 1.7 International Organization and joint punishment Works Cited Introduction The following document will provide information pertaining to presidential administrations both past and present and theirRead MoreThe Dod Developed The Cyber Strategy1072 Words à |à 5 Pagesdeveloped the cyber strategy with three primary missions in mind. The first mission is to defend DoD networks, systems, and information. Next is to defend the U.S. homeland and U.S. national interests against cyberattacks of significant consequence and finally to provide cyber support to military operational and contingency plans. To accomplish this mission, the Secretary of Defense and the current USCYBERCOM Commander acknowledges that the ââ¬Å"DoD must develop its cyber forces and strengthen its cyber defenseRead MoreCyber Security : Armed Forces Sub Unified Command Of America1076 Words à |à 5 PagesCYBER SECURITY RESERVES Unite state cyber reserve is armed forces sub-unified commands / commanded aiding Strategic Command of America . This command is stuated in Maryland , its supposed to ensures that all cyberspace operations are centralized , Its also responsible for the organization of available cyber resources and synchronizes defense of united states military networks . (Protect your workplace , report any abnormal behavior , activity , and cyber incidents . (2006 ) [Washington , D . CRead MoreCyber Espionage In China Essay767 Words à |à 4 Pagesthese agencies were specifically targeted for cyber espionage. On July 9, 2013, Larry Wortzel, a member of the U.S.-China Economic and Security Review Commission testified before the House of Representatives, Committee on Energy and Commerce Subcommittee on Oversight and Investigation. He revealed the following assessment of Chinaââ¬â¢s cyber activities against the United States. China is using its advanced cyber capabilities to conduct large-scale cyber espionage. China to date has compromised a rangeRead MoreThe Security Environment That Is Shaping The Joint Force 2025 ( Jf25 )1650 Words à |à 7 Pagesstability include two aggressive competing powers (China and Russia), two nuclear capable regional hegemons (North Korea and Iran), and a persistent threat of terrorism to the homeland. The global commons are contested and access to the space and cyber domains are no longer guaranteed. Fiscal constraints limit the available means for the Joint Force (JF) to meet these challenges and therefore increases risk to accomplishing the national military objectives. Despite the complexity of this environmentRead MoreThe Enforcement Of Cyber Security Standards1456 Words à |à 6 Pagesforefront of the defense of cyber security, but with the endless number of cyber terrorists, the U.S. defense is not enough. Nations need to come together to provide a standard for cyber security that is able to be enforced throughout the world. The many different organizations provide many avenues of approach for various attackers to take advantage of the vulnerabilities in cyber defense. The only way to prevent these attacks is for the U.S. and its international partners to develop a strategy for globalRead MoreThe Purpose Of A National Cybersecurity Strategy1421 Words à |à 6 PagesThe purpose of a national cybersecurity strategy: In this recent past, the e-services, new technologies, and interconnected networks have become integral part of our daily life. Society, businesses, government and national defense depend entirely on the well-functioning of information technology and information infrastructures, communication, transportation, e-commerce, emergency services and financial services depend on the integrity, availability and confidentiality of information streaming theseRead MoreCyber Deterrence And Its Impact On Western Europe1518 Words à |à 7 PagesWhat is Cyber Deterrence? Merriam-Webster defines deterrence as the act of making someone decide not to do something or the act of preventing a particular act or behavior from happening (Merriam-Webster, 2015) . This can be applied to the cyber realm in the sense that we need to deter terrorists, state actors and non-state actors from attempting attacks on U.S. networks. To understand how to apply cyber deterrence we have to look at past policies or theori es on deterrence. Deterrence theory firstRead MoreEssay On Defense-In-Depth Strategy1218 Words à |à 5 Pagesthere needs to be strong defense-in-depth strategies in place. Although they may be strong defense-in-depth strategies, vulnerabilities may be present and used as an advantage point for hackers to gain access to the network. Defense-in-depth strategies will help create risk management to assess certain risks that may be proven as detrimental to a network. The idea behind defense in depth is to manage risk with diverse defensive strategies, so that if one layer of defense turns out to be inadequate
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.