Forensics Journal - Stevenson University 2015 | Page 25

FORENSICS JOURNAL legacy architecture that has only recently become interconnected. Power plants, water supply stations, transportation systems, and other systems use industrial control systems i.e. supervisory control and data acquisition (SCADA) networks and “with the advent of internet-based systems…SCADA networks have gradually become… integrated into larger global networks” (“Cyber Threats,” n.d.). For these types of companies, a major and costly transition to wireless remote monitoring systems has only recently occurred. (These systems provide ease-of-use for owners and operators.) Smart grid technology is so expensive that large companies like Baltimore Gas and Electric (BGE), the “nation’s oldest and most experienced utility company” had to apply for hundreds of millions of dollars in grants to subsidize the costs of such an initiative (a major investment in cloud-based architecture, and the potential for greater cyber vulnerabilities) (Butts, 2010, p. 1). see the implementation of the cybersecurity measures necessary to prevent such an attack in the first place. In the words of former Director of National Intelligence, Mike McConnell, “the United States is fighting a cyber-war today, and we are losing” (McConnell, 2010). Cybersecurity cannot keep up with the cyber threat without a proactive approach and commitment of resources. REFERENCES Adler, J. (2014, February 24). Why Obama’s ‘Voluntary’ Cybersecurity Plan May Prove Mandatory. Insurance Networking News. Botnet DDoS Attacks. (2014). Retrieved February 17, 2014, from http://www.incapsula.com Bots and Botnets—A Growing Threat. (2014). Retrieved February 17, 2014, from http://www.norton.com Michael Assante, cybersecurity strategist and former chief security officer, National Electric Reliability Corporation, American Electric Power, states, “because the [NIST cybersecurity framework] program offers no financial incentives to help companies reduce the costs of implementing the guidelines, companies may opt not to participate” (“SANS NewsBites,” 2014). Consider the ShapeShifter which may cost its customers over a million dollars each year it is utilized after the testing phase is complete (Greenberg, 2014). For large companies such as BGE, implementing the best cybersecurity technology is available may be viable and in line with its priorities, but for smaller busines ͕̰