Chapter 8 Securing the Utility Companies

Information in This Chapter

  • Smart Grid Security Program

  • Top 12 Technical Practices to Secure the Smart Grid

We previously discussed the threats to utility companies in Chapter 3, “Threats and Impacts: Utility Companies & Beyond.” We also reviewed how to attack utility companies in Chapter 7, “Attacking the Utility Companies.” In this chapter, we will take a look at how to secure the utility companies. First, we will examine the softer side of security; how to develop and mature an effective information security program through the use of standards. Then, we will dive into the technical side of security; reviewing the technologies that can protect the utility companies’ smart grid deployments. ...

Get Securing the Smart Grid now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.