Smart grid security : innovative solutions for a modernized grid /

This book provides a holistic view of leading edge smart grid security research by providing a complete presentation of forward-looking research in all areas of smart grid security. It will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and gover...

Full description

Saved in:
Bibliographic Details
Corporate Authors: Elsevier Science & Technology
Group Author: Skopik, Florian; Smith, Paul
Published: Elsevier : Syngress,
Publisher Address: Waltham, MA :
Publication Dates: [2015]
Literature type: eBook
Language: English
Series: Syngress advanced topics in information security
Subjects:
Online Access: http://www.sciencedirect.com/science/book/9780128021224
Summary: This book provides a holistic view of leading edge smart grid security research by providing a complete presentation of forward-looking research in all areas of smart grid security. It will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of smart grid technology. It includes coverage of risk management, operational security, and secure development of the smart grid; and covers key technical topics, including threat types and attack
Carrier Form: 1 online resource.
Bibliography: Includes bibliographical references and index.
ISBN: 9780128023549
0128023546
Index Number: TK3105
CLC: TM76
Contents: Cover; Title Page; Copyright Page; Contents; List of Contributors; Foreword; Chapter 1 -- Introduction; 1.1 -- What is a Smart Grid?; 1.2 -- The Structure of a Smart Grid System; 1.3 -- The Two Key Challenges to be solved by Smart Grids; 1.4 -- Smart Grid Applications and their Critical Nature; 1.5 -- Challenges in Smart Grid Security; 1.6 -- The Storyline of this Book; References; Chapter 2 -- Assessing the European Approach to Privacy and Data Protection in Smart Grids. Lessons for Emerging Technologiesa; 2.1 -- Introduction.
2.2 -- The Dutch Case Study: a smart grid roll-out that neglected individual interests2.3 -- The Smart Grid: a socially complex phenomenon with a surveillance dimension; 2.4 -- Privacy and Personal Data Protection in the European Legal Order; 2.5 -- Privacy Testing and Data Protection Testing of Smart Grids; 2.6 -- Regulating Smart Grids in Europe: a "light" approach to personal data protection; 2.6.1 -- Supplementing the legally binding data protection framework; 2.6.2 -- A data protection impact assessment framework is the core element.
2.6.2.1 -- The First Regulatory Experiment: The RFID PIA Framework2.6.2.2 -- The Second Regulatory Experiment: The DPIA Framework for Smart Grids and Smart Metering Systems; 2.7 -- The EU "light" regulatory approach to Personal Data Protection in Smart Grids: an evaluation; 2.8 -- Conclusion: DPIA Testing is a First Good Step but a more inclusive, easy to apply and flexible solution is necessary; 2.8.1 -- A missed opportunity?; 2.8.2 -- Recommendation 1: the governance of emerging technologies should carefully combine regulatory strategies.
2.8.3 -- Recommendation 2: Impact assessments of emerging technologies should be inclusive, easy to use and flexibleAcronyms; References; Chapter 3 -- The Evolution of the Smart Grid Threat Landscape and Cross-Domain Risk Assessment; 3.1 -- Introduction; 3.2 -- Smart Grid Architectures: The Basics; 3.2.1 -- GridWise Interoperability Context-Setting Framework; 3.2.2 -- NIST Smart Grid Framework; 3.2.3 -- Smart Grid Architecture Model and EU Mandate M490; 3.3 -- Smart Grid Threat Landscape; 3.3.1 -- Threat Types; 3.3.2 -- Threat Agents; 3.3.3 -- Attack Vectors; 3.3.4 -- Case Studies.
3.3.4.1 -- Advanced Metering Infrastructure (AMI)3.3.4.2 -- Wide Area Monitoring, Protection, and Control (WAMPAC); 3.3.4.3 -- Distribution Grid Management (DGM); 3.4 -- Smart Grid Risk Assessment; 3.4.1 -- Basic Concepts; 3.4.2 -- Main Challenges; 3.4.2.1 -- Managing Safety and Security Risks; 3.4.2.2 -- Analysing Cyber-physical Risks; 3.4.2.3 -- Understanding the Risks to Legacy Systems; 3.4.2.4 -- Complex Organisational Dependencies; 3.4.2.5 -- Understanding Cascading Effects; 3.4.3 -- Existing Risk Assessment Frameworks; 3.5 -- Conclusion; Acronyms; References.
Chapter 4 -- Resilience Against Physical Attacks.