Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/13/2012
08:02 PM
Don Bailey
Don Bailey
Products and Releases
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Infrax Systems (IFXY) Launches Smart Grid's SPIDer

SPIDer network consists of three options or levels of detection

ST. PETERSBURG, Fla., May 8, 2012 /PRNewswire/ -- Infrax Systems, Inc., (OTCBB: IFXY), a global provider of unified Smart Grid-related products and services for the Energy and Utility industries, introduces the SPIDer (Secure Perimeter Intrusion Detection) network to meet the threats of copper theft and malicious attacks to power substations, Generation facilities and critical infrastructure in the Electric Utility Industry. Copper theft, site destruction, and malicious activity are occurring at an alarming rate. Reports from sources including the DOE, (Department of Energy) indicate that costs due to copper theft have grown to a $1 billion concern nationwide. The costs due to the actual theft of the copper is very small compared to the costs to repair the damage to the equipment effected and the cost of restoring substations and critical infrastructure to safe environments. The SPIDer network meets these challenges by providing a multi-level approach to intrusion detection and alarming that is flexible, can be rapidly deployed and configured, and can provide near real time verification of remote threats in a cost effective solution to over 47,000 Substations.

The SPIDer network consists of three options or levels of detection to identify intruders in areas that are secure and restricted. The first level utilizes electronically charged coaxial cables that are attached to chain link fencing. Excessive fence movement such as climbing or cutting the material will set off an alarm indicating that an attempt to breach the security perimeter has occurred. The Level one configuration is a very cost effective means to secure critical infrastructure and meet general system security requirements which may be required by NERC, (North American Electric reliability Corporation) and other regulating bodies.

The second level consists of a visual intrusion monitoring network. This wireless and battery operated network of image sensors communicates to the security center through the cellular network. The network provides 24/7 monitoring and notification via visual and infrared sensors and transmits images through the internet and email to security personnel. Once motion is detected, an alarm is sent to the security team along with a high definition picture that will allow identification of the threat. The industry leading infrared imager provides medium resolution black and white images at night which detect movement up to 100 feet from the sensor. The network can be rapidly deployed and redeployed throughout the security perimeter and sensors can be quickly added or removed from the network.

The third level is a multi-level detection and verification network that uses both level one and level two sensors to rapidly identify a potential threat and provide information for a rapid decision. The level one portion of the network is designed to provide intrusion alarm while the level 2 sensors will provide image verification that the perimeter has been breached. The combination of the two systems provides a high level of security while minimizing false alarms.

The SPIDer network solution addresses the increased activity of unauthorized intrusion, copper theft and site destruction of remote critical infrastructures such as energy substations, generation facilities, remote storage and coal yards. Augment limited security personnel by providing constant surveillance of perimeter fencing and image biased motion detection technologies which provide near real time information to a central location. Offering three levels of security and intrusion detecting, this network is flexible and cost effective for any area that requires a security perimeter.

For more information on our newly created Engineering and Professional Services unit, please contact us at; [email protected]

About Infrax Systems

Infrax Systems offers a series of interrelated operational management, communications, and grid security related products and services known as Secure Intelligent Energy Platform (SIEP). Our products enable a comprehensive and unified solution for communications and applications management of the Smart Grid. SIEP(TM) incorporates a wide array of communications, security, device and data management tools for Smart Grid applications such as advanced metering solutions and grid optimization. SIEP platform creates a unified solution to securely manage Advanced Metering Infrastructure (AMI) and distribution automation. Infrax's secure smart grid platform, incorporates a communications transport and management system, (Grid Mesh(TM)) , device and data security management, and ultimately secures intelligent endpoint devices (SIED). The secure management of the "last mile" backhaul will be necessary for utilities to implement Smart Grid applications including AMI, real-time pricing, Demand Side Management (DSM), Distribution Monitoring and Automation. When combined, these applications can offer economic, operational and environmental benefits for utilities, and ultimately the utility's customers. Don A. Bailey is a pioneer in security for mobile technology, the Internet of Things, and embedded systems. He has a long history of ground-breaking research, protecting mobile users from worldwide tracking systems, securing automobiles from remote attack, and mitigating ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I can't find the back door.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21275
PUBLISHED: 2021-01-25
The MediaWiki "Report" extension has a Cross-Site Request Forgery (CSRF) vulnerability. Before fixed version, there was no protection against CSRF checks on Special:Report, so requests to report a revision could be forged. The problem has been fixed in commit f828dc6 by making use of Medi...
CVE-2021-21272
PUBLISHED: 2021-01-25
ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a "zip-slip" vulnerability. The directory support feature allows the ...
CVE-2021-23901
PUBLISHED: 2021-01-25
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML ...
CVE-2020-17532
PUBLISHED: 2021-01-25
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting