Text
Applied cyber security and the smart grid: implementing security controls into the modern power infrastructure
Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented.
This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.
Table of Contents
Chapter 1. What is the Smart Grid?
Energy demands
Grid resilience
Environmental performance
Operational efficiencies
Common components of the Smart Grid
Pitfalls of the Smart Grid
Chapter 2. Smart Grid Network Architecture
Bulk and distributed generation architectures
Transmission and distribution architecture
Advanced metering architecture
In-home systems
Microgrids
System interdependencies
Protocols
Chapter 3. Hacking the Smart Grid
Motive
Identifying a target
Vulnerability
Attack tools
Attack methods
Chapter 4. Privacy Concerns with the Smart Grid
Personal data
Chapter 5. Security Models for SCADA, ICS, and Smart Grid
NISTIR 7628 Smart Grid cyber security architecture
EU M/490 and the SGCG reference architecture for the Smart Grid
IEEE 2030-2011 Smart Grid power system, communication technology, and information technology eference diagrams
ISA-62443 (also known as ISA-SP99): zones and conduits and Smart Grids
Mapping security requirements to Smart Grid environments
A simplified Smart Grid reference model
Chapter 6. Securing the Smart Grid
Implementing security control within Smart Grid endpoints
Establishing strong boundaries and zone separation
Protecting data and applications within the Smart Grid
Situational awareness
Use case: defending against Shamoon
Chapter 7. Securing the Supply Chain
Smart Grid supply chain
Chapter 8. The Future of the Grid
The challenge of making predictions
Value of personal data
Future cyber security considerations
The future of cyber security countermeasures
Appendix A. Reference Models and Architectures
Smart Grid cyber security reference model
Smart Grid cyber security design template
Generation cyber security reference model (detail)
Generation cyber security design template (detail)
NISTIR 7628 guidelines for Smart Grid cyber security
SGCG reference architecture for the Smart Grid
Applying endpoint security controls
Applying network security controls
Applying data integrity and protection controls
Appendix B. Continued Reading
Smart Grid Security: An end-to-end view of security in the new electrical grid, by Gilbert N. Sorebo and Michael C. Echols
Industrial Network Security: Securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems, by Eric D. Knapp
Securing the Smart Grid: Next generation power grid security, by Tony Flick and Justin Morehouse
Smart Grid: Integrating renewable, distributed, and efficient energy, by Fereidoon P. Sioshansi
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS, by Tyson Macaulay and Bryan Singer
NISTIR 7628 guidelines for Smart Grid Cyber Security
SGCG report on reference architecture for the Smart Grid
IEEE guide for Smart Grid interoperability of energy technology and information technology operation with the Electric Power System (EPS), end-use applications, and loads
References
Glossary
Index
No other version available