Presentation is loading. Please wait.

Presentation is loading. Please wait.

National Security Brittany Haga Sean Bevans Kelsey Splinter.

Similar presentations


Presentation on theme: "National Security Brittany Haga Sean Bevans Kelsey Splinter."— Presentation transcript:

1 National Security Brittany Haga Sean Bevans Kelsey Splinter

2 Type of National Security  Not only physical security  Threats to computer systems used in the US to control day-to-day functions  Definition: –The condition of a nation’s security from threats, especially threats from an outside source

3 What does our country use?  SCADA is used in most of our country’s day to day activities.  Computer software program our country uses to monitor specific systems  The National Security Agency trains people to protect the US Government information systems from hackers and terrorists

4 What is SCADA  Supervisory Control and Data Acquisition  Software Program used to control or monitor: –Chemical systems –Physical or transport processes –Water supply systems –Control electric power distribution and generation –Gas and oil pipelines –Financial systems –Transportation systems –Phone and Food systems

5 Components of SCADA  Three components that make up SCADA are: 1) Multiple Remote Terminal Units (RTU) 2) Master station 3) Communication infrastructure Most of SCADA is controlled at an RTU

6 Purpose of SCADA and how it works  To and control a complete site spread out over a long distance  Monitors the flow in a system and alerts the operator when the flow is changed to prevent disaster

7 Why it’s so popular…  Ease of use for employers, no hands on activities  Does all the work for you  Standards are set and SCADA runs the system  Cuts down on the number of employee’s needed.

8 Weaknesses with SCADA  Hackers and terrorists can tap in and change the settings  The main control station doesn’t always recognize when someone has hacked into the system (Australia story)

9 Power Grid  If hacked into, power could be lost to the whole North Eastern section of the US and Canada  Would take months to fix  Food supply goes bad  Transportation would be useless  Natural gas wouldn’t be usable.

10 United States Power Grid

11 Telephone Communitcations  Specific breed of hackers called “Phone Phreaks”  Same characteristics of hackers except focuses on phone lines  Hard to trace a hacker  A sophisticated host machine is not needed to originate an attack

12 Water Systems  12 year old genius hacked into the computer system that runs the Roosevelt Dam in Arizona  Could have opened the floodgates and flooded Mesa and Tempe and put over 1 million people in danger  1998: over 48,000 attempted attacks on water systems

13 Food Supply  Many targets with Bio-Terrorism: -Distribution -Wholesale facilities  Threats made could cause severe economic dislocation or harm to humans

14 Transportation Systems  Power grid  Communications between air traffic control and planes in the sky  Hackers can tap into a system and cause trains to travel different routes  Boats could be given the wrong coordinates and crash

15 Chemical Systems  Some nuclear power plants use SCADA  Hackers/Terrorists could tap in and cause nuclear meltdown  Software needs to be updated constantly to be used properly

16 Basically…  If a hacker/terrorist hacks into SCADA, it would throw our country into complete chaos in some way or another

17 The End


Download ppt "National Security Brittany Haga Sean Bevans Kelsey Splinter."

Similar presentations


Ads by Google