Smart grid security : innovative solutions for a modernized grid /
This book provides a holistic view of leading edge smart grid security research by providing a complete presentation of forward-looking research in all areas of smart grid security. It will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and gover...
Saved in:
Corporate Authors: | |
---|---|
Group Author: | ; |
Published: |
Elsevier : Syngress,
|
Publisher Address: | Waltham, MA : |
Publication Dates: | [2015] |
Literature type: | eBook |
Language: | English |
Series: |
Syngress advanced topics in information security
|
Subjects: | |
Online Access: |
http://www.sciencedirect.com/science/book/9780128021224 |
Summary: |
This book provides a holistic view of leading edge smart grid security research by providing a complete presentation of forward-looking research in all areas of smart grid security. It will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of smart grid technology. It includes coverage of risk management, operational security, and secure development of the smart grid; and covers key technical topics, including threat types and attack |
Carrier Form: | 1 online resource. |
Bibliography: | Includes bibliographical references and index. |
ISBN: |
9780128023549 0128023546 |
Index Number: | TK3105 |
CLC: | TM76 |
Contents: |
Cover; Title Page; Copyright Page; Contents; List of Contributors; Foreword; Chapter 1 -- Introduction; 1.1 -- What is a Smart Grid?; 1.2 -- The Structure of a Smart Grid System; 1.3 -- The Two Key Challenges to be solved by Smart Grids; 1.4 -- Smart Grid Applications and their Critical Nature; 1.5 -- Challenges in Smart Grid Security; 1.6 -- The Storyline of this Book; References; Chapter 2 -- Assessing the European Approach to Privacy and Data Protection in Smart Grids. Lessons for Emerging Technologiesa; 2.1 -- Introduction. 2.2 -- The Dutch Case Study: a smart grid roll-out that neglected individual interests2.3 -- The Smart Grid: a socially complex phenomenon with a surveillance dimension; 2.4 -- Privacy and Personal Data Protection in the European Legal Order; 2.5 -- Privacy Testing and Data Protection Testing of Smart Grids; 2.6 -- Regulating Smart Grids in Europe: a "light" approach to personal data protection; 2.6.1 -- Supplementing the legally binding data protection framework; 2.6.2 -- A data protection impact assessment framework is the core element. 2.6.2.1 -- The First Regulatory Experiment: The RFID PIA Framework2.6.2.2 -- The Second Regulatory Experiment: The DPIA Framework for Smart Grids and Smart Metering Systems; 2.7 -- The EU "light" regulatory approach to Personal Data Protection in Smart Grids: an evaluation; 2.8 -- Conclusion: DPIA Testing is a First Good Step but a more inclusive, easy to apply and flexible solution is necessary; 2.8.1 -- A missed opportunity?; 2.8.2 -- Recommendation 1: the governance of emerging technologies should carefully combine regulatory strategies. 2.8.3 -- Recommendation 2: Impact assessments of emerging technologies should be inclusive, easy to use and flexibleAcronyms; References; Chapter 3 -- The Evolution of the Smart Grid Threat Landscape and Cross-Domain Risk Assessment; 3.1 -- Introduction; 3.2 -- Smart Grid Architectures: The Basics; 3.2.1 -- GridWise Interoperability Context-Setting Framework; 3.2.2 -- NIST Smart Grid Framework; 3.2.3 -- Smart Grid Architecture Model and EU Mandate M490; 3.3 -- Smart Grid Threat Landscape; 3.3.1 -- Threat Types; 3.3.2 -- Threat Agents; 3.3.3 -- Attack Vectors; 3.3.4 -- Case Studies. 3.3.4.1 -- Advanced Metering Infrastructure (AMI)3.3.4.2 -- Wide Area Monitoring, Protection, and Control (WAMPAC); 3.3.4.3 -- Distribution Grid Management (DGM); 3.4 -- Smart Grid Risk Assessment; 3.4.1 -- Basic Concepts; 3.4.2 -- Main Challenges; 3.4.2.1 -- Managing Safety and Security Risks; 3.4.2.2 -- Analysing Cyber-physical Risks; 3.4.2.3 -- Understanding the Risks to Legacy Systems; 3.4.2.4 -- Complex Organisational Dependencies; 3.4.2.5 -- Understanding Cascading Effects; 3.4.3 -- Existing Risk Assessment Frameworks; 3.5 -- Conclusion; Acronyms; References. Chapter 4 -- Resilience Against Physical Attacks. |