Grid locked : managing the risks of hacking the electric grid
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<record>
<leader>00000cab a2200000 4500</leader>
<controlfield tag="001">MAP20170036227</controlfield>
<controlfield tag="003">MAP</controlfield>
<controlfield tag="005">20171220173823.0</controlfield>
<controlfield tag="008">171110e20171002esp|||p |0|||b|eng d</controlfield>
<datafield tag="040" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="b">spa</subfield>
<subfield code="d">MAP</subfield>
</datafield>
<datafield tag="084" ind1=" " ind2=" ">
<subfield code="a">7</subfield>
</datafield>
<datafield tag="100" ind1=" " ind2=" ">
<subfield code="0">MAPA20140012534</subfield>
<subfield code="a">Tuttle, Hilary</subfield>
</datafield>
<datafield tag="245" ind1="1" ind2="0">
<subfield code="a">Grid locked</subfield>
<subfield code="b">: managing the risks of hacking the electric grid</subfield>
<subfield code="c">Hilary Tuttle</subfield>
</datafield>
<datafield tag="300" ind1=" " ind2=" ">
<subfield code="a">4 p.</subfield>
</datafield>
<datafield tag="520" ind1=" " ind2=" ">
<subfield code="a">On december 2016, hackers successfully targeted an electronic transmission substation outside of Kiev, Ukraine, leaving part of the city without power for about an hour. Widely thought to be attributable to the Russian government, the incident was the second attack to cause a power outage in Ukraine in as many years. The incident was far from catastrophicindeed, the attack the year before cut off power to more people and for a longer period But cybersecurity researchers now believe rhe 2016 attack was merelya dry run, testing out the most advanced malware ever deployed to target a grid-an adaptable, scalable tool purpose-built to disrupt critical infrastructure.</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080591182</subfield>
<subfield code="a">Gerencia de riesgos</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080544119</subfield>
<subfield code="a">Hackers</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20140023066</subfield>
<subfield code="a">Ciberataques</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20160007633</subfield>
<subfield code="a">Ciberriesgos</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20100017982</subfield>
<subfield code="a">Riesgos emergentes</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20090035270</subfield>
<subfield code="a">Piratería</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20150010735</subfield>
<subfield code="a">Internet de las cosas</subfield>
</datafield>
<datafield tag="773" ind1="0" ind2=" ">
<subfield code="w">MAP20077000291</subfield>
<subfield code="t">Risk Management Magazine</subfield>
<subfield code="d">New York : Risk and Insurance Management Society, 1982-</subfield>
<subfield code="x">0035-5593</subfield>
<subfield code="g">02/10/2017 Volumen 64 Número 9 - octubre 2017 , p. 20-24</subfield>
</datafield>
</record>
</collection>