A simulated attack, named the Aurora Generator Test, took place in March 2007 by researchers investigating supervisory control and data acquisition (SCADA) system vulnerabilities at utility...
The Challenge of Implementing NERC's Cyber Standard
How to develop, implement, and operate a security program.
compared with an entity serving only as a distribution function, the latter of which may not have any critical cyber assets.
12. Managing for Enterprise Security, Richard Caralli, Carnegie Mellon University, December 2004.