Download presentation
Presentation is loading. Please wait.
1
National Security Brittany Haga Sean Bevans Kelsey Splinter
2
Type of National Security Not only physical security Threats to computer systems used in the US to control day-to-day functions Definition: –The condition of a nation’s security from threats, especially threats from an outside source
3
What does our country use? SCADA is used in most of our country’s day to day activities. Computer software program our country uses to monitor specific systems The National Security Agency trains people to protect the US Government information systems from hackers and terrorists
4
What is SCADA Supervisory Control and Data Acquisition Software Program used to control or monitor: –Chemical systems –Physical or transport processes –Water supply systems –Control electric power distribution and generation –Gas and oil pipelines –Financial systems –Transportation systems –Phone and Food systems
5
Components of SCADA Three components that make up SCADA are: 1) Multiple Remote Terminal Units (RTU) 2) Master station 3) Communication infrastructure Most of SCADA is controlled at an RTU
6
Purpose of SCADA and how it works To and control a complete site spread out over a long distance Monitors the flow in a system and alerts the operator when the flow is changed to prevent disaster
7
Why it’s so popular… Ease of use for employers, no hands on activities Does all the work for you Standards are set and SCADA runs the system Cuts down on the number of employee’s needed.
8
Weaknesses with SCADA Hackers and terrorists can tap in and change the settings The main control station doesn’t always recognize when someone has hacked into the system (Australia story)
9
Power Grid If hacked into, power could be lost to the whole North Eastern section of the US and Canada Would take months to fix Food supply goes bad Transportation would be useless Natural gas wouldn’t be usable.
10
United States Power Grid
11
Telephone Communitcations Specific breed of hackers called “Phone Phreaks” Same characteristics of hackers except focuses on phone lines Hard to trace a hacker A sophisticated host machine is not needed to originate an attack
12
Water Systems 12 year old genius hacked into the computer system that runs the Roosevelt Dam in Arizona Could have opened the floodgates and flooded Mesa and Tempe and put over 1 million people in danger 1998: over 48,000 attempted attacks on water systems
13
Food Supply Many targets with Bio-Terrorism: -Distribution -Wholesale facilities Threats made could cause severe economic dislocation or harm to humans
14
Transportation Systems Power grid Communications between air traffic control and planes in the sky Hackers can tap into a system and cause trains to travel different routes Boats could be given the wrong coordinates and crash
15
Chemical Systems Some nuclear power plants use SCADA Hackers/Terrorists could tap in and cause nuclear meltdown Software needs to be updated constantly to be used properly
16
Basically… If a hacker/terrorist hacks into SCADA, it would throw our country into complete chaos in some way or another
17
The End
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.