Securing the Power Grid - Innovations in Energy Cybersecurity

Securing the Power Grid - Innovations in Energy Cybersecurity

A Deep Dive Into The Cyber Security Technologies Being Developed For A Secure Power Grid

RELEASE DATE
24-Jul-2017
REGION
Global
Research Code: D7AB-01-00-00-00
SKU: EG01794-GL-TR_20452
AvailableYesPDF Download

$4,950.00

Special Price $3,712.50 save 25 %

In stock
SKU
EG01794-GL-TR_20452

$4,950.00

$3,712.50save 25 %

DownloadLink
ENQUIRE NOW

Description

With the addition of smart meters and AMI, the need to provide cybersecurity to the energy and power infrastructure has also increased significantly. The Energy infrastructure is slowly turning from a mere physical infrastructure to a cyber-physical one with the addition of smart devices those are connected by communication networks. These nodes provide easy entry points for the attackers and other unauthorized persons. As the fiel only emerging the cybersecurity solutions are also just evolving. The differences between the requirements of the legacy Internet and the network requirements of the smart grid also generate restrictions for the direct adoption of cybersecurity solutions developed for the former. This study will deal with solutions those are in existence, the ones those are developed and considered specifically for the smart grid and power infrastructure, their limitations and areas to improve and so on.

Table of Contents

1.1 Research Scope

1.2 Research Process and Methodology

1.3 Key Findings

1.3 Key Findings (continued)

2.1 Interoperability is One of the Major Features Smart Grids Must Possess

2.2 Generation Sector is More Secure Compared to Distribution Sector

2.3 The Backbone Network is Used for Inter Domain Communication and the LAN is Used for Intra Domain Communication

2.4 DNP3 and IEC 61850 Are the Most Commonly Used Communication Protocols

2.5 Communication Protocols in Cybersecurity

2.6 Securing Cyber Critical Utility Assets for the Operation of Electrical Grids: NERC CIP Version 5

2.7 Some of the Other Commonly Adopted Standards

2.8 Drivers and : Organizational Challenges Call for Attention

2.8.1 Drivers: Government Funding and Projects Play a Very Significant Role in Taking Smart Grids Closer to Reality

2.8.2 Challenges: High Cost is a Major Deterrent in the Initial Adoption of Technologies

3.1 Data Latency and Throughput are the Differentiating Factors

3.2 Time Criticality is Very Important in Power Communication Networks as it Ensures Availability

3.3 Ensuring Availability is the Most Important Feature of a Smart Grid Communication Network

3.4 Integrity Ranks above Confidentiality as the Consequences of Unauthorized Access are More Dangerous

4.1 A total of 225,000 People/Customers Were Affected

4.2 Phishing and Malware Played a Prominent Role in the Attack

4.3 Level of Automation Was an Important Factor that Drew the Attackers

5.1 Falsified Data Injection and Denial of Service are Very Dangerous

5.2 Attacks on Distribution and Transmission

5.3 Integrity Attacks Play a Dominant Role in Distribution and Transmission

5.4 Data Latency is not a Problem in AMI and HAN

6.1 Network and Cryptographic Countermeasures are Used to Secure the Smart Grid

6.2 Network Countermeasures: Attack Detection

6.3 Network Layer and Physical Layer Mitigation are Used

6.4 Insertion Of A Security Layer Could Be Very Effective

6.5 Data Aggregation Can Bring Down the Network Overhead

6.6 Encryption And Authentication Play Important Roles In Securing The Grid

6.7 Profile and Detect Methods can Cause Delays

7.1 Project for Protection of Medium Voltage Sector and AMI

7.2 Development of Solutions for Platform, Protocols, and Privacy

7.3 Singapore UK Joint Cybersecurity Venture

7.4 Key Stakeholders in the Cybersecurity Arena

7.4 Key Stakeholders in the Cybersecurity Arena (Continued)

8.1 Growth Opportunity 1: Secure Power Grids for the Future

8.2 Growth Opportunity 2: Adoption of Cybersecurity for Energy is being Encouraged Globally

8.3 Growth Opportunity 3: Development of Smart Grids

8.4 Growth Opportunity : Smart Meter rollout is expected to grow significantly APAC in the future

8.5 Strategic Imperatives for Success and Growth

9.1 Development of Proactive Cybersecurity instead of a Reactive One is Needed

9.2 Risk Assessment Can Help Secure against Large-scale DoS and Integrity Attacks

10.1 Key Contacts

Legal Disclaimer

11.1 The Frost & Sullivan Story

11.2 Value Proposition: Future of Your Company and Career

11.3 Global Perspective

11.4 Industry Convergence

11.5 360º Research Perspective

11.6 Implementation Excellence

11.7 Our Blue Ocean Strategy

Related Research
With the addition of smart meters and AMI, the need to provide cybersecurity to the energy and power infrastructure has also increased significantly. The Energy infrastructure is slowly turning from a mere physical infrastructure to a cyber-physical one with the addition of smart devices those are connected by communication networks. These nodes provide easy entry points for the attackers and other unauthorized persons. As the fiel only emerging the cybersecurity solutions are also just evolving. The differences between the requirements of the legacy Internet and the network requirements of the smart grid also generate restrictions for the direct adoption of cybersecurity solutions developed for the former. This study will deal with solutions those are in existence, the ones those are developed and considered specifically for the smart grid and power infrastructure, their limitations and areas to improve and so on.
More Information
No Index No
Podcast No
Author Guhan Sriram R V
Industries Energy
WIP Number D7AB-01-00-00-00
Is Prebook No