Cyber security and functional monitoring for substations
Multiple layers are necessary to ensure the cyber security of substations. Cryptography allows authentication of devices, but not all attacks can be prevented by these measures. Firewalls and “air gaps” can be circumvented through existing remote access tunnels, or through maintenance computers directly attached to IEDs or the station bus. T
Radio wave weapon knocks out drone swarms
I hope they have assessed how easy it is to shield a drone against the attack. Hopefully the shielding would add too much weight.