Electric Industry
Java
ISOs/RTOs
Software Engineering
Black Hat
100

This independent agency regulates the interstate transmission of electricity, natural gas, and oil.

FERC (Federal Energy Regulatory Commission)

100

This Java keyword is used in a class declaration to specify the superclass or in an interface declaration to specify one or more superinterfaces.

Extends

100

This organization serves most of the state of California, including some surrounding areas.

CAISO (California ISO)

100

Also known as "Data hiding", this design strategy places all data and functions on that data in a single unit for consistency.

Encapsulation

100

This software attack uses large input data to cause an app to error and reveal information or execute code.

Buffer Overflow Attack

200

Specialty services and functions which provide stability to the electric grid, including frequency control, spinning reserves and operating reserves.

Ancillary Services

200

This Java feature enable class types to be parameters when defining classes, interfaces and methods.


Generics

200

This organization has a service area which borders both Mexico and the US Gulf Coast.

ERCOT (Electric Reliability Council of Texas)

200

This programming language feature allows one interface to be used by multiple implementing types.

Polymorphism

200

A secret method of access into a system that bypasses normal security safeguards

Back Door

300

This type of generator does not require any external power sources to start.

Black-Start Generator

300

Name given to a method implemented in a language other than Java, usually to take advantage of low-level features of the operating system.

Native

300

This organization serves both the United States and Canada, from Manitoba, Wisconsin, Michigan, and Minnesota in the North to Louisiana and Mississippi in the South.

MISO (Midcontinent ISO or Midwest ISO)

300

In this design pattern, components register themselves to receive change notifications from items they are interested in.

Observer Pattern

300

An exhaustive, automated attack by an intruder which attempts every possible combination of data to gain access to a system.


Brute Force Attack

400

This nonprofit corporation is tasked with developing nation-wide reliability standards for transmission systems.

NERC (North American Electric Reliability Corporation)

400

This term refers to automatic conversion between primitive data types and their corresponding objects.

Autoboxing

400

This organization serves Mid-Atlantic states including Ohio, Kentucky, and Virginia.

PJM (PJM interconnection)

400

This term refers to methods that have the same name, but contain different numbers or types of arguments.

(Method) Overloading

400

Duping someone into giving away personal information by sending them email which appears to come from trusted people or organisations.

Phishing

500

This term refers to the pricing of electricity to include the costs of transmission losses, congestion and the local costs of generation.

LMP (Locational Marginal Pricing)

500

This data type enables a variable to take only the values of a predefined set of constants.

Enumeration (enum)

500

This ISO is the only US-based ISO whose transmission is not under FERC regulation.

ERCOT

500

This software development principle is designed to prevent classes and methods from becoming over-complex by doing too many things at once.

Single Responsibility Principle

500

An attack in which resources are made unavailable by flooding the target with huge numbers of requests.

Denial of Service Attack (DoS)