In my fourth entry, I will be discussing the differences in cyber security risks in infrastructure, specifically the electric grid, between the United states and Canada. In 2015, Canada produced 59 percent of its entire electricity output via hydroelectric energy; second only to fossil fuels at 21 percent. In comparison, The United States, in 2015, produced 66 percent of its entire electricity output, split evenly between natural gas and coal. Interestingly, the United states only produced 6 percent of its power through hydroelectric energy. I will be focusing on the two country’s most used method of producing electricity. Starting with hydroelectric within Canada, the risks are quite simple. If someone gained physical access to the dam, they could disrupt operations from the inside. For example, physical controls that do not require any authentication. If an outside threat gained access to the dam controls, he or she could effectively disrupt operations from miles away. For example, in 2013, Iranian hackers were able to breach a computer operated dam in Rye New York. Hypothetically, an attack on Canada’s dams could leave millions of people absent of power as it is their main source. The United States doesn’t rely on one major source of energy, it relies on two. With that being said, this gives the United States an advantage in the case of an attack on one particular source of energy. However, this does not protect them entirely. 33 percent of its energy is still delegated to either natural gas or coal. Any attack on either would be extremely detrimental to the electrical infrastructure in the United States. For example, many of the natural pipelines within the United States are controlled through computer systems. This exposes them to outside threats via manipulation of controls or even shutting them down entirely. With coal mining, they too are at risk due to their increase in technology. Specifically, they utilize PCN’s (Process Control Networks) to monitor and control industrial processes. If they were breached, those processes would be susceptible as well.