{"id":53888,"date":"2016-07-28T16:58:21","date_gmt":"2016-07-28T16:58:21","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53888"},"modified":"2016-07-28T17:00:58","modified_gmt":"2016-07-28T17:00:58","slug":"w","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/w\/","title":{"rendered":"Electrical System Cyber Security Standards May Be Amended"},"content":{"rendered":"<p>Critical Infrastructure Protection (CIP) Reliability Standards are allowing\u00a0suggestions to increase cyber security protection and you may be surprised\u00a0at\u00a0one suggestion&#8230;<!--more--><\/p>\n<p>The CIP\u00a0Reliability Standards are the cyber security control centers used to monitor and control the bulk electric system in real-time.\u00a0 After recent concerns regarding the ability of a ransomware attack to take down the entire power grid, the CIP is accepting suggestions to strengthen their standards to avoid such catastrophe.<\/p>\n<p>According to <a href=\"http:\/\/www.elp.com\/articles\/2016\/07\/ferc-wants-comments-on-new-cybersecurity-standards.html\">Electric Light and Power<\/a>, the Federal Energy Regulatory Commission (FERC)\u00a0is recommending for two adjustments in the CIP Reliability Standards.\u00a0 First, that there is a separation between the internet and the bulk cyber systems in control centers performing transmission operator functions.\u00a0 This would\u00a0be done\u00a0by replacing the internet connection with data lines that the transmission operators would be own.\u00a0 It is believed this would\u00a0decrease the risk of malware infections due to the elimination of an internet connection, which is how most malware infiltrates the system.<\/p>\n<p>Second, the FERC is suggesting <a href=\"https:\/\/www.pcmatic.com\/pro\/whitelist\">application whitelisting <\/a>to prevent unwanted and unsafe programs from executing.\u00a0 It is believed application whitelisting could be a more effective mitigation tool than others because of\u00a0the whitelisting methodology.\u00a0 FERC made the following statement regarding their recommendation to implement application whitelisting:<\/p>\n<blockquote><p>&#8220;&#8230;by knowing all installed applications, the security professional can set the application whitelisting program to know the application is approved; all unapproved applications will activate an alert.&#8221;<\/p><\/blockquote>\n<p>Both of the FERC suggestions are not only valid risk mitigation tools, but most importantly take a proactive approach to cyber security.\u00a0 Preventative detection is critical, as remediation is useless against many of today&#8217;s modern threats, including ransomware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Critical Infrastructure Protection (CIP) Reliability Standards are allowing\u00a0suggestions to increase cyber security protection and you may be surprised\u00a0at\u00a0one suggestion&#8230;<\/p>\n","protected":false},"author":54,"featured_media":53213,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4959],"tags":[4354],"class_list":["post-53888","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-whitelisting","tag-whitelisting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Electrical System Cyber Security Standards May Be Amended<\/title>\n<meta name=\"description\" content=\"Critical Infrastructure Protection (CIP) Reliability Standards are allowing suggestions to increase cyber security protection...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/w\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Electrical System Cyber Security Standards May Be Amended\" \/>\n<meta property=\"og:description\" content=\"Critical Infrastructure Protection (CIP) Reliability Standards are allowing suggestions to increase cyber security protection...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/w\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-28T16:58:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-07-28T17:00:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/main-thumb-t-1367-200-WRw5fqEiJKpB2Zz9wXl0WctKau7R9o0R.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Electrical System Cyber Security Standards May Be Amended\",\"datePublished\":\"2016-07-28T16:58:21+00:00\",\"dateModified\":\"2016-07-28T17:00:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/\"},\"wordCount\":282,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/main-thumb-t-1367-200-WRw5fqEiJKpB2Zz9wXl0WctKau7R9o0R.jpeg\",\"keywords\":[\"whitelisting\"],\"articleSection\":[\"Whitelisting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/\",\"name\":\"Electrical System Cyber Security Standards May Be Amended\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/main-thumb-t-1367-200-WRw5fqEiJKpB2Zz9wXl0WctKau7R9o0R.jpeg\",\"datePublished\":\"2016-07-28T16:58:21+00:00\",\"dateModified\":\"2016-07-28T17:00:58+00:00\",\"description\":\"Critical Infrastructure Protection (CIP) Reliability Standards are allowing suggestions to increase cyber security protection...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/main-thumb-t-1367-200-WRw5fqEiJKpB2Zz9wXl0WctKau7R9o0R.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/main-thumb-t-1367-200-WRw5fqEiJKpB2Zz9wXl0WctKau7R9o0R.jpeg\",\"width\":200,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/w\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Electrical System Cyber Security Standards May Be Amended\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Electrical System Cyber Security Standards May Be Amended","description":"Critical Infrastructure Protection (CIP) Reliability Standards are allowing suggestions to increase cyber security protection...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/w\/","og_locale":"en_US","og_type":"article","og_title":"Electrical System Cyber Security Standards May Be Amended","og_description":"Critical Infrastructure Protection (CIP) Reliability Standards are allowing suggestions to increase cyber security protection...","og_url":"https:\/\/www.pcmatic.com\/blog\/w\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-07-28T16:58:21+00:00","article_modified_time":"2016-07-28T17:00:58+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/main-thumb-t-1367-200-WRw5fqEiJKpB2Zz9wXl0WctKau7R9o0R.jpeg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/w\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/w\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Electrical System Cyber Security Standards May Be Amended","datePublished":"2016-07-28T16:58:21+00:00","dateModified":"2016-07-28T17:00:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/w\/"},"wordCount":282,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/w\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/main-thumb-t-1367-200-WRw5fqEiJKpB2Zz9wXl0WctKau7R9o0R.jpeg","keywords":["whitelisting"],"articleSection":["Whitelisting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/w\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/w\/","url":"https:\/\/www.pcmatic.com\/blog\/w\/","name":"Electrical System Cyber Security Standards May Be Amended","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/w\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/w\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/main-thumb-t-1367-200-WRw5fqEiJKpB2Zz9wXl0WctKau7R9o0R.jpeg","datePublished":"2016-07-28T16:58:21+00:00","dateModified":"2016-07-28T17:00:58+00:00","description":"Critical Infrastructure Protection (CIP) Reliability Standards are allowing suggestions to increase cyber security protection...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/w\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/w\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/w\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/main-thumb-t-1367-200-WRw5fqEiJKpB2Zz9wXl0WctKau7R9o0R.jpeg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/main-thumb-t-1367-200-WRw5fqEiJKpB2Zz9wXl0WctKau7R9o0R.jpeg","width":200,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/w\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Electrical System Cyber Security Standards May Be Amended"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53888"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53888\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/53213"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}