Chapter 3

Hacking the Smart Grid

Information in this chapter:

• Motive

• Identifying a target

• Vulnerability

• Attack tools

• Attack methods

Now that we have an understanding of Smart Grid architecture (see Chapter 2) and we can start examining Smart Grid attack methodology. Depending upon the motive of the attacker and the target of the attack, the exact methods of attack may vary. Understanding the motives of the attacker and the inherent vulnerabilities of the systems helps to determine exactly how an attacker might approach, assess, and breach a Smart Grid. As with any cyber attack, there are well-defined steps to hacking a Smart Grid. Starting with reconnaissance and then scanning, the architecture of the grid can begin to be mapped—the ...

Get Applied Cyber Security and the Smart Grid now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.