CHF130.00
Download est disponible immédiatement
Building an Effective Security Program for Distributed Energy Resources and Systems
Build a critical and effective security program for DERs
Building an Effective Security Program for Distributed Energy Resources and Systems requires a unified approach to establishing a critical security program for DER systems and Smart Grid applications. The methodology provided integrates systems security engineering principles, techniques, standards, and best practices.
This publication introduces engineers on the design, implementation, and maintenance of a security program for distributed energy resources (DERs), smart grid, and industrial control systems. It provides security professionals with understanding the specific requirements of industrial control systems and real-time constrained applications for power systems. This book:
Security Professionals and Engineers can use Building an Effective Security Program for Distributed Energy Resources and Systems as a reliable resource that is dedicated to the essential topic of security for distributed energy resources and power grids. They will find standards, guidelines, and recommendations from standards organizations, such as ISO, IEC, NIST, IEEE, ENISA, ISA, ISACA, and ISF, conveniently included for reference within chapters.
Auteur
Mariana Hentea earned her PhD and MS in Computer Science , MS in Computer Engineering, and BS in Electrical Engineering. Her research is focused on Smart Grid and DER systems, real-time systems security and performance, network security design and architecture, and use of Artificial Intelligence techniques for information security management, security risk management, network management, and process control. As a member of IEEE Standards Association, she promotes Security and Privacy awareness to Engineers, managers, regulators, and consumers. She is a member of IEEE Smart Grid, IEEE Power & Energy Society, IEEE Computer Society, ISC2 and ISSA organizations. Dr. Hentea holds a CISSP certification from ISC2.
Texte du rabat
Build a critical and effective security program for DERs
Building an Effective Security Program for Distributed Energy Resources and Systems requires a unified approach to establishing a critical security program for DER systems and Smart Grid applications. The methodology provided integrates systems security engineering principles, techniques, standards, and best practices.
This publication introduces engineers on the design, implementation, and maintenance of a security program for distributed energy resources (DERs), smart grid, and industrial control systems. It provides security professionals with understanding the specific requirements of industrial control systems and real-time constrained applications for power systems. This book:
Contenu
Part I Understanding Security and Privacy Problem
1 Security
1.1 Introduction
1.2 Smart Grid
1.2.1 Traditional Power Grid Architecture
1.2.2 Smart Grid Definitions
1.2.3 Drivers for Change
1.2.4 Smart Grid Communication Infrastructure
1.3 Distributed Energy Resources
1.3.1 DER Characteristics
1.3.2 DER Uses
1.3.3 DER Systems
1.3.4 Microgrid
1.3.5 Virtual Power Plant
1.4 Scope of Security and Privacy
1.4.1 Security for the Smart Grid
1.4.2 Privacy
1.4.3 The Need for Security and Privacy
1.5 Computing and Information Systems for Business and Industrial Applications
1.5.1 Information Systems Classification
1.5.2 Information Systems in Power Grids
1.5.3 DER Information Systems
1.6 Integrated Systems in a Smart Grid
1.6.1 Trends
1.6.2 Characteristics
1.7 Critical Smart Grid Systems
1.7.1 Industrial Control Systems
1.7.2 SCADA Systems
1.7.3 Energy Management Systems
1.7.4 Advanced Meter Systems
1.8 Standards, Guidelines, and Recommendations
1.8.1 Overview of Various Standards
1.8.2 Key Standard Attributes and Conformance
1.8.3 Smart Grid Standards
1.8.3.1 Key Players in Smart Grid Standards Development
1.8.3.2 How to Use Standards
1.8.4 Cybersecurity Standards
2 Advancing Security
2.1 Emerging Technologies
2.1.1 Internet of Things
2.1.1.1 Characteristics of Objects
2.1.1.2 Technologies
2.1.1.3 IoT Applications
2.1.1.4 IoT Security and Privacy
2.1.1.5 Challenges
2.1.2 Internet of Everything (IoE)
2.1.3 Cyber-Physical Systems
2.1.4 Cyber-Physical Systems Applications
2.2 Cybersecurity
2.2.1 Cybersecurity Definitions
2.2.2 Understanding Cybersecurity Terms
2.2.3 Cybersecurity Evolution
2.3 Advancing Cybersecurity
2.3.1 Contributing Factors to Cybersecurity Success
2.3.2 Advancing Cybersecurity and Privacy Design
2.4 Smart Grid Cybersecurity: A Perspective on Comprehensive Characterization
2.4.1 Forces Shaping Cybersecurity
2.4.2 Smart Grid Trends
2.5 Security as a Personal, Organizational, National, and Global Priority
2.5.1 Security as Personal Priority
2.5.2 Protection of Private Information
2.5.3 Protecting Cyberspace as a National Asset
2.6 Cybersecurity for Electrical Sector as a National Priority
2.6.1 Need for Cybersecurity Solutions
2.6.2 The US Plans
2.7 The Need for Security and Privacy Programs
2.7.1 Security Program
2.7.2 Privacy Program
2.8 Standards, Guidelines, and Recommendations
2.8.1 Electricity Sector Guidance
2.8.2 International Collaboration
References-Part1
Part II Applying Security Principles to Smart Grid
3 Principles of Cybersecurity
3.1 Introduction
3.2 Information Security
3.2.1 Terminology
3.2.2 Information Security Components
3.2.3 Security Principles
3.3 Security Related Concepts
3.3.1 Basic Security Concepts
3.3.2 The Basis for Security
3.4 Characteristics of Information
3.4.1 Data Transformation
3.4.2 Data Characteristics
3.4.3 Data Quality
3.4.4 Information Quality
3.4.5 System Quality
3.4.6 Data Quality Characteristics Assigned to Systems
3.5 Information Systems Characteristics
3.5.1 Software Quality
3.5.2 System Quality Attributes
3.6 Critical Information Systems
3.6.1 Critical Systems Characteristics
3.6.2 Information Life Cycle
3.6.3 Information Assurance 3.6.4 Critical Secu...