Skip to content

Menu

  • HOME
  • NEWS
    • Android
    • Artificial Intelligence (AI)
    • Cloud Computing
    • Digital Transformation
    • Internet of Things (IoT)
  • PRODUCTS
    • Desktops
    • Home Security Systems
    • Laptops
    • Printers
    • Routers
    • Servers
    • Smartwatches
    • Storage
    • Streaming Devices
  • SECURITY
    • Antivirus
    • Cybersecurity
  • FINANCE
  • HEALTHCARE
  • SUSTAINABILITY
  • DEVELOPMENT
  • EDUCATION
  • CAREER
  • RETAIL

Archives

  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • December 2020
  • October 2020

Calendar

June 2025
MTWTFSS
 1
2345678
9101112131415
16171819202122
23242526272829
30 
« Jun    

Categories

  • Android
  • Antivirus
  • Artificial Intelligence (AI)
  • Automobili
  • Bitcoins
  • Blockchain
  • CAREER
  • Cloud Computing
  • Cybersecurity
  • DEVELOPMENT
  • Digital Transformation
  • EDUCATION
  • FINANCE
  • HEALTHCARE
  • Home Security Systems
  • IGAMING
  • Internet of Things (IoT)
  • Laptops
  • NEWS
  • Printers
  • PRODUCTS
  • RETAIL
  • Routers
  • SECURITY
  • Servers
  • SERVICE
  • Smartwatches
  • Storage
  • Streaming Devices
  • SUSTAINABILITY

Copyright IT-Technews 2025 | Theme by ThemeinProgress | Proudly powered by WordPress

HOT
  • Why are multiwallet apps useful?
  • Why are virtual credit cards useful?
  • Crypto-crash: why did it happen?
  • Where to study blockchain?
  • What would happen if Bitcoin became worth zero dollars?
logo itechnews
  • HOME
  • NEWS
    • Android
    • Artificial Intelligence (AI)
    • Cloud Computing
    • Digital Transformation
    • Internet of Things (IoT)
  • PRODUCTS
    • Desktops
    • Home Security Systems
    • Laptops
    • Printers
    • Routers
    • Servers
    • Smartwatches
    • Storage
    • Streaming Devices
  • SECURITY
    • Antivirus
    • Cybersecurity
  • FINANCE
  • HEALTHCARE
  • SUSTAINABILITY
  • DEVELOPMENT
  • EDUCATION
  • CAREER
  • RETAIL
  • You are here :
  • Home
  • Cybersecurity ,
  • Digital Transformation ,
  • NEWS ,
  • SECURITY
  • A new technology has been developed that can block cyberattacks on the electricity grid
A new technology has been developed that can block cyberattacks on the electricity grid
May 10, 2022

A new technology has been developed that can block cyberattacks on the electricity grid

Cybersecurity . Digital Transformation . NEWS . SECURITY Article

Researchers at the Idaho National Laboratory in New Mexico have developed and tested a technology that can block cyberattacks on the power grid. During a demonstration at the Idaho National Laboratory Critical Infrastructure Complex facility, the apparatus in question, Constrained Cyber communication Device (C3D) was subjected to a series of remote access attempts indicative of a cyber attack.

The section alerted operators to abnormal commands and automatically blocked them, thus preventing attacks from accessing and damaging critical components of the power grid.

“Protecting our critical infrastructure from foreign adversaries is a key component of the Department of Homeland Security,” said Patricia Hoffman, Assistant Secretary of the US Department of Energy.
“It is achievements like this that extend our efforts to harden our electrical system against threats while mitigating vulnerabilities. Leveraging the capabilities of Idaho National Laboratory and other national laboratories will accelerate the hardware modernization of our electrical grid, protecting us from cyberattacks.”

A device to review and filter commands that blocks cyber attacks

The device, C3D, uses advanced communication capabilities to autonomously review and filter commands that are sent to the relays. The relays are the heart and soul of the national electricity grid and are designed to quickly send power interruption commands in the event that a disturbance is detected. For example, relays can prevent expensive installations from being damaged when a power line fails in a storm.

However, relays are not traditionally designed to block the speed and stealth of a cyber attack, which can send unpredictable commands to the network in a matter of milliseconds. To prevent such attacks, intelligent and automatic filtering technology is necessary.

“As cyberattacks against the nation’s critical infrastructure have become increasingly sophisticated, there is a need to create a device that provides a last line of defense against attacks,” said Jake Gentle , Laboratory program manager. Idaho National. “The Constrained Cyber communication Device (C3D) has an essential role in the network of a facility, since it monitors and blocks cyber attacks before they impact the behavior of the relays”.

You may also like

Crypto-crash: why did it happen?

Uttopion, the Spanish metaverse

Trends in the world of NFTs

Tags: cyber-attack, Technologies

Categories

  • Android (3)
  • Antivirus (1)
  • Artificial Intelligence (AI) (20)
  • Automobili (6)
  • Bitcoins (6)
  • Blockchain (8)
  • CAREER (18)
  • Cloud Computing (15)
  • Cybersecurity (28)
  • DEVELOPMENT (20)
  • Digital Transformation (62)
  • EDUCATION (20)
  • FINANCE (99)
  • HEALTHCARE (98)
  • Home Security Systems (2)
  • IGAMING (12)
  • Internet of Things (IoT) (28)
  • Laptops (8)
  • NEWS (351)
  • Printers (2)
  • PRODUCTS (90)
  • RETAIL (31)
  • Routers (8)
  • SECURITY (60)
  • Servers (13)
  • SERVICE (12)
  • Smartwatches (2)
  • Storage (2)
  • Streaming Devices (13)
  • SUSTAINABILITY (56)
  • Contact
  • Pressrelease
  • Newsletter sign up
  • IT Media Group
    • IT-KANALEN.SE
    • IT-KANALEN.DK
    • IT-RETAIL.SE
    • IT-FINANS.SE
    • IT-KARRIÄR.SE
    • IT-HÅLLBARHET.SE
    • IT-PEDAGOGEN.SE
    • IT-HÄLSA.SE
    • IT-TECHNEWS.COM ENGLISH

Copyright IT-Technews 2025 | Theme by ThemeinProgress | Proudly powered by WordPress