Pesquisa de referências

Grid locked : managing the risks of hacking the electric grid

<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<title>Grid locked</title>
<subTitle>: managing the risks of hacking the electric grid</subTitle>
</titleInfo>
<typeOfResource>text</typeOfResource>
<genre authority="marcgt">periodical</genre>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">esp</placeTerm>
</place>
<dateIssued encoding="marc">2017</dateIssued>
<issuance>serial</issuance>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
<extent>4 p.</extent>
</physicalDescription>
<abstract displayLabel="Summary">On december 2016, hackers successfully targeted an electronic transmission substation outside of Kiev, Ukraine, leaving part of the city without power for about an hour. Widely thought to be attributable to the Russian government, the incident was the second attack to cause a power outage in Ukraine in as many years. The incident was far from catastrophicindeed, the attack the year before cut off power to more people and for a longer period But cybersecurity researchers now believe rhe 2016 attack was merelya dry run, testing out the most advanced malware ever deployed to target a grid-an adaptable, scalable tool purpose-built to disrupt critical infrastructure.</abstract>
<note type="statement of responsibility">Hilary Tuttle</note>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080591182">
<topic>Gerencia de riesgos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080544119">
<topic>Hackers</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140023066">
<topic>Ciberataques</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20160007633">
<topic>Ciberriesgos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20100017982">
<topic>Riesgos emergentes</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20090035270">
<topic>Piratería</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20150010735">
<topic>Internet de las cosas</topic>
</subject>
<classification authority="">7</classification>
<relatedItem type="host">
<titleInfo>
<title>Risk Management Magazine</title>
</titleInfo>
<originInfo>
<publisher>New York : Risk and Insurance Management Society, 1982-</publisher>
</originInfo>
<identifier type="issn">0035-5593</identifier>
<identifier type="local">MAP20077000291</identifier>
<part>
<text>02/10/2017 Volumen 64 Número 9 - octubre 2017 , p. 20-24</text>
</part>
</relatedItem>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">171110</recordCreationDate>
<recordChangeDate encoding="iso8601">20171220173823.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20170036227</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>