New Additions

 

Cyber Security

Integration of information technology (IT) and telecommunications infrastructures into the traditional electric power system have transformed the historical electricity network into a smarter electricity grid that enables real-time sensing, measurement, control, and two-way energy and information flow among various devices. As cyber infrastructure has become a critical component to the energy sector infrastructure, management and protections of cyber systems and IT components at all levels are required to prevent access to unauthorized functions, especially as they relate to grid operations. Cyber infrastructure and cyber security are terms defined by the National Infrastructure Protection Plan (NIPP) as:

Cyber Infrastructure: Includes electronic information and communications systems and services and the information contained in these systems and services. Information and communications systems and services are composed of all hardware and software that process, store, and communicate information, or any combination of all of these elements. Processing includes the creation, access, modification, and destruction of information. Storage includes paper, magnetic, electronic, and all other media types. Communications include sharing and distribution of information. For example: computer systems; control systems (e.g., SCADA); networks, such as the Internet; and cyber services (e.g., managed security services) are part of cyber infrastructure.

Cyber Security: The protection required to ensure confidentiality, integrity and availability of the electronic information communication system. With the adoption and implementation of the Smart Grid, the IT and telecommunication sectors will be more directly involved. These sectors have existing cyber security standards to address vulnerabilities and assessment programs to identify known vulnerabilities in these systems. These same vulnerabilities need to be assessed in the context of the Smart Grid. In addition, the Smart Grid has additional vulnerabilities due to its complexity, large number of stakeholders, and highly time-sensitive operational requirements.

Selected cyber security documents are listed below:


Filter
Smart Grid Domain
Year From
To
 


Search Results

240   results
Title Sourcesort icon Year Document Type
U.S. Department of Energy Smart Grid Privacy Workshop Summary Report
Smartgrid.gov
2012
Report
Electricity Subsector Cybersecurity Capability Maturity Model: Version 1.0
Smartgrid.gov
2012
Report
Consumer Data Privacy in a Networked World: A Framework For Protecting Privacy and Promoting Innovation in The Global Digital Economy
Smartgrid.gov
2012
Report
DNP3 Secure Authentication - What's all the buzz about?
SmartGridNews.com
2013
Magazine Articles
The 2013 Fix
SmartGridToday.com
2013
Report
SmartHouse/SmartGrid: D1.2 Technology Trends for SmartHouse/SmartGrid
Smarthouse-Smartgrid Consortium
2010
Report
SmartHouse/SmartGrid: D2.1 In-house Architecture and Interface Description
Smarthouse-Smartgrid Consortium
2009
Report
Advanced Metering Infrastructure Security Considerations
SNL
2007
Report
Control System Devices: Architectures and Supply Channels Overview
SNL
2010
Report
Best Practices for SCADA Security
SNL
2011
HTML
Protecting Process Control Systems against Lifecycle Attacks Using Trust Anchors
SNL
2009
Technical paper
Cyber Effects Analysis Using VCSE—Promoting Control System Reliability
SNL
2008
Report
Control Systems Security Standards Accomplishments & Impacts
SNL
2007
Report
National SCADA Test Bed Consequence Modeling Tool
SNL
2007
Report
Framework for SCADA Security Policy
SNL
2005
Technical paper
Key Management for SCADA
SNL
2002
Technical paper
Cyber Security for Utility Operations
SNL
2005
Report
A Threat Analysis Framework as Applied to Critical Infrastructures in the Energy Sector
SNL
2007
Report
Sustainable Security for Infrastructure SCADA
SNL
2003
Technical paper
Impacts of IPv6 on Infrastructure Control Systems
SNL
2007
Report
Categorizing Threat Building and Using a Generic Threat Matrix
SNL
2007
Report
Guide to CIP Cyber Vulnerability Assessment
SNL
2008
White paper
High-Security SCADA LDRD Final Report
SNL
2002
Report
Analysis of Operations and Cyber Security Policies for a System of Cooperating Flexible Alternating Current Transmission System (FACTS) Devices Laurence
SNL
2005
Report
Security Metrics for Process Control Systems
SNL
2007
Report
Control and Optimization Methods for Electric Smart Grids
Springer.com
2012
Book
Smart Power Grids 2011
Springer.com
2011
Book
Security Profile for Advanced Metering Infrastructure (version 2.0)
The Advanced Security Acceleration Project for the Smart Grid (ASAP-SG)
2010
Technical paper
Security Profile Blueprint
The Advanced Security Acceleration Project for the Smart Grid (ASAP-SG)
2010
Technical paper
How a Utility Can Use ASAP-SG Security Profiles
The Advanced Security Acceleration Project for the Smart Grid (ASAP-SG)
2011
Technical paper
Security Profile for Substation Automation (version 0.15)
The Advanced Security Acceleration Project for the Smart Grid (ASAP-SG)
2012
Technical paper
Security Profile for Distribution Management (version 1.0)
The Advanced Security Acceleration Project for the Smart Grid (ASAP-SG)
2012
Technical paper
Security Profile for Wide-Area Monitoring, Protection, and Control (WAMPAC) (version 0.08)
The Advanced Security Acceleration Project for the Smart Grid (ASAP-SG)
2011
Technical paper
Security Profile for Third Party Data Access (version 1.0)
The Advanced Security Acceleration Project for the Smart Grid (ASAP-SG)
2011
Technical paper
THE SMART GRID: Enabling Energy Efficiency and Demand Response
The Fairmont Press
2009
Book
Smart Grid: Modernizing Electric Power Transmission and Distribution; Energy Independence, Storage and Security; Energy Independence and Security Act of 2007 (EISA); Improving Electrical Grid Efficiency, Communication, Reliability, and Resiliency...
TheCapitol.Net
2012
Book
At the Cyber Crossroads
Transmission & Distribution World Magazine
2013
Magazine Articles
Toward a More Secure Posture for Industrial Control System Networks
Trend Micro
2012
Technical paper
2013 Global Security Report
Trustwave
2013
Report