Book description
Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented.
This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.
- Discover the potential of the Smart Grid
- Learn in depth about its systems
- See its vulnerabilities and how best to protect it
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Acknowledgments
- About the Authors
- About the Technical Editor
- Foreword by Troels Oerting
- Foreword by Robert P. Lockhart
- Introduction
- Chapter 1. What is the Smart Grid?
- Chapter 2. Smart Grid Network Architecture
- Chapter 3. Hacking the Smart Grid
- Chapter 4. Privacy Concerns with the Smart Grid
-
Chapter 5. Security Models for SCADA, ICS, and Smart Grid
- NISTIR 7628 Smart Grid cyber security architecture
- EU M/490 and the SGCG reference architecture for the Smart Grid
- IEEE 2030-2011 Smart Grid power system, communication technology, and information technology reference diagrams
- ISA-62443 (also known as ISA-SP99): zones and conduits and Smart Grids
- Mapping security requirements to Smart Grid environments
- A simplified Smart Grid reference model
- Summary
- References
- Chapter 6. Securing the Smart Grid
- Chapter 7. Securing the Supply Chain
- Chapter 8. The Future of the Grid
-
Appendix A. Reference Models and Architectures
- Smart Grid cyber security reference model
- Smart Grid cyber security design template
- Generation cyber security reference model (detail)
- Generation cyber security design template (detail)
- NISTIR 7628 guidelines for Smart Grid cyber security
- SGCG reference architecture for the Smart Grid
- Applying endpoint security controls
- Applying network security controls
- Applying data integrity and protection controls
- References
-
Appendix B. Continued Reading
- Smart Grid Security: An end-to-end view of security in the new electrical grid, by Gilbert N. Sorebo and Michael C. Echols
- Industrial Network Security: Securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems, by Eric D. Knapp
- Securing the Smart Grid: Next generation power grid security, by Tony Flick and Justin Morehouse
- Smart Grid: Integrating renewable, distributed, and efficient energy, by Fereidoon P. Sioshansi
- Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS, by Tyson Macaulay and Bryan Singer
- NISTIR 7628 guidelines for Smart Grid Cyber Security
- SGCG report on reference architecture for the Smart Grid
- IEEE guide for Smart Grid interoperability of energy technology and information technology operation with the Electric Power System (EPS), end-use applications, and loads
- References
- Glossary
- Index
Product information
- Title: Applied Cyber Security and the Smart Grid
- Author(s):
- Release date: February 2013
- Publisher(s): Syngress
- ISBN: 9780124046382
You might also like
book
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established …
book
Cyber Security and Digital Forensics
CYBER SECURITY AND DIGITAL FORENSICS Cyber security is an incredibly important issue that is constantly changing, …
book
Industrial Network Security
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems …
book
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual …