Applied Cyber Security and the Smart Grid. Implementing by Eric D. Knapp

By Eric D. Knapp

Many humans contemplate the clever Grid as an influence distribution staff equipped on complicated clever metering―but that’s only one point of a far better and extra complicated approach. The "Smart Grid" calls for new applied sciences all through strength iteration, transmission and distribution, or even the houses and companies being served by means of the grid. This additionally represents new details paths among those new platforms and companies, all of which represents possibility, requiring a extra thorough method of the place and the way cyber protection controls are implemented.

This perception presents a close structure of the whole clever Grid, with urged cyber security features for every little thing from the provision chain to the consumer.

  • Discover the opportunity of the clever Grid
  • Learn extensive approximately its systems
  • See its vulnerabilities and the way top to guard it

Show description

Read or Download Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure PDF

Similar management information systems books

Outsourcing Management Information Systems

This e-book balances the optimistic results of outsourcing, that have made it a well-liked administration approach with the detrimental to supply a extra inclusive choice; it explores threat components that experience now not but been generally linked to this process. It specializes in the conceptual "what", "why", and "where" facets of outsourcing in addition to the methodological "how" elements"

Design of Sustainable Product Life Cycles

Product lifestyles cycle layout – producing sustainable product existence cycles explains the significance of a holistic long term making plans and administration method of attaining a greatest product profit over the whole existence cycle. The paradigm of considering in product lifestyles cycles helps brands in shaping winning items.

Extra info for Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure

Sample text

Examples include process alterations to bypass or override critical steps of a process and to sabotage the process or bypass safety. • Exfiltration of process commands. Examples include the theft of a manufacturing “blueprint”—essentially stealing the target’s intellectual property. By looking at the logic in our steam generation example, we can see exactly how these threats could materialize. The logic of PLC 1 is simple: While there is a supply of fuel and demand for fuel (based on readings from the burner), the fuel pulverizer processes coal through a manipulation of a feed valve and a grinding motor and delivers powdered coal on to a conveyor that delivers the fuel at a controlled rate (based on readings from the pulverizer and the burner) to the burner.

Data” here represent the values of the generation facility—the specific inputs and outputs used by the logic of the control applications. It is used within the controllers such as the PLC, but also reported to HMIs and SCADA consoles, where it is consumed by a human operator. Manipulation of these values can influence all aspects of automated production, distribution, safety, and reliability. • Showing a human operator misleading values from the plant could cause the operator to override the (legitimate) automation logic, effectively sabotaging their own process.

5 Electric generation system (nuclear). 3 The sheer capacity of generation, combined with the nature of the fuel, processing, and waste also leads to increased regulations. Not surprisingly, nuclear generation facilities are heavily regulated, and security (both physical and cyber) is a primary concern among plant operators. Generation system architecture Regardless of the type of generation facility, there are common concepts around information generation, utilization, and automation that are used heavily within the facility.

Download PDF sample

Rated 4.76 of 5 – based on 25 votes