Applied cyber security and the smart grid [electronic resource] : implementing security controls into the modern power infrastructure / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor.Material type: TextPublication details: Waltham, MA : Syngress, c2013.Description: 1 online resource ( xxii, 202 p.)ISBN:
- 9780124046382 (electronic bk.)
- 012404638X (electronic bk.)
- 621.310285/58 23
- TK3105 .K63 2013
Includes bibliographical references and index.
Cover image; Title page; Table of Contents; Copyright; Acknowledgments; About the Authors; About the Technical Editor; Foreword by Troels Oerting; Foreword by Robert P. Lockhart; Introduction; Book overview and key learning points; Book audience; Diagrams and Figures; What's in the Book; References; Chapter 1. What is the Smart Grid?; Energy demands; Grid resilience; Environmental performance; Operational efficiencies; Common components of the Smart Grid; Pitfalls of the Smart Grid; Summary; References; Chapter 2. Smart Grid Network Architecture; Bulk and distributed generation architectures.
Transmission and distribution architectureAdvanced metering architecture; In-home systems; Microgrids; System interdependencies; Protocols; Summary; References; Chapter 3. Hacking the Smart Grid; Motive; Identifying a target; Vulnerability; Attack tools; Attack methods; Summary; References; Chapter 4. Privacy Concerns with the Smart Grid; Personal data; References; Chapter 5. Security Models for SCADA, ICS, and Smart Grid; NISTIR 7628 Smart Grid cyber security architecture; EU M/490 and the SGCG reference architecture for the Smart Grid.
IEEE 2030-2011 Smart Grid power system, communication technology, and information technology reference diagramsISA-62443 (also known as ISA-SP99): zones and conduits and Smart Grids; Mapping security requirements to Smart Grid environments; A simplified Smart Grid reference model; Summary; References; Chapter 6. Securing the Smart Grid; Implementing security control within Smart Grid endpoints; Establishing strong boundaries and zone separation; Protecting data and applications within the Smart Grid; Situational awareness; Use case: defending against Shamoon; Summary; References.
Chapter 7. Securing the Supply ChainSmart Grid supply chain; References; Chapter 8. The Future of the Grid; The challenge of making predictions; Value of personal data; Future cyber security considerations; The future of cyber security countermeasures; Summary; References; Appendix A. Reference Models and Architectures; Smart Grid cyber security reference model; Smart Grid cyber security design template; Generation cyber security reference model (detail); Generation cyber security design template (detail); NISTIR 7628 guidelines for Smart Grid cyber security.
SGCG reference architecture for the Smart GridApplying endpoint security controls; Applying network security controls; Applying data integrity and protection controls; References; Appendix B. Continued Reading; Smart Grid Security: An end-to-end view of security in the new electrical grid, by Gilbert N. Sorebo and Michael C. Echols; Industrial Network Security: Securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems, by Eric D. Knapp; Securing the Smart Grid: Next generation power grid security, by Tony Flick and Justin Morehouse.
Smart Grid: Integrating renewable, distributed, and efficient energy, by Fereidoon P. Sioshansi.
Electronic reproduction. Amsterdam Available via World Wide Web.
Description based on online resource; title from digital title page (viewed on May 15, 2013).