ABSTRACT

AS ENERGY and facility managers increasingly utilize web-based information systems, they must also develop security for their information and their systems. This chapter describes some of the security nightmares that lurk in cyberspace, waiting like evil villains, to attack unsuspecting system operators and users. Methods for avoiding attacks, recovering from them, and minimizing their impact are covered.