New Additions

 

Cyber Security

Integration of information technology (IT) and telecommunications infrastructures into the traditional electric power system have transformed the historical electricity network into a smarter electricity grid that enables real-time sensing, measurement, control, and two-way energy and information flow among various devices. As cyber infrastructure has become a critical component to the energy sector infrastructure, management and protections of cyber systems and IT components at all levels are required to prevent access to unauthorized functions, especially as they relate to grid operations. Cyber infrastructure and cyber security are terms defined by the National Infrastructure Protection Plan (NIPP) as:

Cyber Infrastructure: Includes electronic information and communications systems and services and the information contained in these systems and services. Information and communications systems and services are composed of all hardware and software that process, store, and communicate information, or any combination of all of these elements. Processing includes the creation, access, modification, and destruction of information. Storage includes paper, magnetic, electronic, and all other media types. Communications include sharing and distribution of information. For example: computer systems; control systems (e.g., SCADA); networks, such as the Internet; and cyber services (e.g., managed security services) are part of cyber infrastructure.

Cyber Security: The protection required to ensure confidentiality, integrity and availability of the electronic information communication system. With the adoption and implementation of the Smart Grid, the IT and telecommunication sectors will be more directly involved. These sectors have existing cyber security standards to address vulnerabilities and assessment programs to identify known vulnerabilities in these systems. These same vulnerabilities need to be assessed in the context of the Smart Grid. In addition, the Smart Grid has additional vulnerabilities due to its complexity, large number of stakeholders, and highly time-sensitive operational requirements.

Selected cyber security documents are listed below:


Filter
Smart Grid Domain
Year From
To
 


Search Results

237   results
Title Sourcesort icon Year Document Type
Implementing the Smart Grid: Lessons Learned from the Internet
IEEE PES
2010
Audio presentation
Smart-Grid–Enabled Load and Distributed Generation as a Reactive Resource
IEEE PES
2010
Audio presentation
Innovative Smart Grid Technologies (ISGT) 2010 Panelist Interviews
IEEE PES
2010
Audio presentation
Cyber-related Risk Assessment and Critical Asset Identification within The Power Grid
IEEE PES
2010
Slide presentation
Standards for Interoperability Make the Grids Smart
IEEE PES
2010
Slide presentation
Results from Surveys on Smart Grid Standardization Initiatives
IEEE PES
2010
Slide presentation
Industrial Information and Control System Security – A Government Perspective
IEEE PES
2010
Slide presentation
Cyber Security Issues -A Nordic/European Perspective
IEEE PES
2010
Slide presentation
Cyber Security for Smart Grid Dependability
IEEE PES
2010
Slide presentation
NIST Coordination and Acceleration of Smart Grid Standards
IEEE PES
2010
Slide presentation
Information-Theoretic Approach to Authentication Codes for Power System Communications
IEEE PES
2010
Slide presentation
The Use GSM and Web Based SCADA for Monitoring Fault Passage Indicators
IEEE PES
2010
Slide presentation
Aurora Vulnerability: Issues & Solutions Hardware Mitigation Devices (HMDs)
IEEE PES GM 2011
2011
Slide presentation
Southern Company Smart Grid: Smart Grid Investment Grant Update
IEEE PES GM 2011
2011
Slide presentation
American Electric Power - Community Energy Storage
IEEE PES GM 2011
2011
Slide presentation
Community Energy Storage (CES) - Communicating with a Smart Utility Grid
IEEE PES GM 2011
2011
Slide presentation
Synergy between Electrified Vehicle and Community Energy Storage Batteries and Markets
IEEE PES GM 2011
2011
Slide presentation
Greensmith (GS) Energy Management Systems
IEEE PES GM 2011
2011
Slide presentation
Requirements Driven Design and Implementation of Smart Grid Applications and Technology
IEEE PES GM 2011
2011
Slide presentation
Synchrophasor PMU Data Analysis for Enhanced Control Center Operations
IEEE PES GM 2011
2011
Slide presentation
Implementation of Centralized Remedial Action Scheme - An Important Step towards WAMPAC
IEEE PES GM 2011
2011
Slide presentation
Smart Distribution Applications and their Integration in a Smart Grid Environment
IEEE PES GM 2011
2011
Slide presentation
Integration of PEV and PV Sources into the Electric Distribution System
IEEE PES GM 2011
2011
Slide presentation
Cyber Security of Substation Control and Diagnostic Systems
IEEE Smart Grid
2006
Short course
Cyber Security of Industrial Control Systems (ICS)
IEEE Smart Grid
2009
Short course
Privacy on the Smart Grid
IEEE Spectrum
2010
Magazine Articles
Privacy by Design and Third Party Access to Customer Energy Usage Data
Information & Privacy Commissioner Ontario, Canada
2013
Report
NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses
INL
2010
Report
Smart Grid and Renewables: A Guide for Effective Deployment
International Renewable Energy Agency (IRENA)
2013
Technical paper
Securing the Smart Grid - "To Act Without Delay"
IOActive
2010
Slide presentation
Privacy by Design: Achieving the Gold Standard in Data Protection for the Smart Grid
ipc.on.ca
2010
White paper
Smart Power: Climate Change, the Smart Grid, and the Future of Electric Utilities
Island Press
2010
Book
Smart Grid Applications, Communications and Security
John Wiley & Sons
2012
Book
Smart Grid: Fundamentals of Design and Analysis
John Wiley & Sons
2012
Book
Smart Grid: Technology and Applications
John Wiley & Sons
2012
Book
Smart Grid Implementation Strategies for Success
Lexingtoninstitute.org
2010
Report
Smart Grids for Dummies
Logica
2010
Book
Smarter Protection for the Smart Grid
McAfee
2012
Report
The Need For Essential Consumer Protections
NASUCA
2010
White paper