Library Logo
Normal view MARC view ISBD view

Smart grid security : innovative solutions for a modernized grid / [electronic resource]

by Skopik, Florian [editor.]; Smith, Paul [editor.].
Material type: materialTypeLabelBookSeries: Syngress advanced topics in information security: Publisher: Waltham, MA : Elsevier : 2015Description: 1 online resource.ISBN: 9780128023549; 0128023546.Subject(s): Smart power grids | Computer security | COMPUTERS -- General | Computer security | Smart power grids | Electrical Engineering | Electrical & Computer Engineering | Engineering & Applied Sciences | Electronic books | Electronic booksOnline resources: ScienceDirect
Contents:
Cover; Title Page; Copyright Page; Contents; List of Contributors; Foreword; Chapter 1 -- Introduction; 1.1 -- What is a Smart Grid?; 1.2 -- The Structure of a Smart Grid System; 1.3 -- The Two Key Challenges to be solved by Smart Grids; 1.4 -- Smart Grid Applications and their Critical Nature; 1.5 -- Challenges in Smart Grid Security; 1.6 -- The Storyline of this Book; References; Chapter 2 -- Assessing the European Approach to Privacy and Data Protection in Smart Grids. Lessons for Emerging Technologiesa; 2.1 -- Introduction.
2.2 -- The Dutch Case Study: a smart grid roll-out that neglected individual interests2.3 -- The Smart Grid: a socially complex phenomenon with a surveillance dimension; 2.4 -- Privacy and Personal Data Protection in the European Legal Order; 2.5 -- Privacy Testing and Data Protection Testing of Smart Grids; 2.6 -- Regulating Smart Grids in Europe: a "light" approach to personal data protection; 2.6.1 -- Supplementing the legally binding data protection framework; 2.6.2 -- A data protection impact assessment framework is the core element.
2.6.2.1 -- The First Regulatory Experiment: The RFID PIA Framework2.6.2.2 -- The Second Regulatory Experiment: The DPIA Framework for Smart Grids and Smart Metering Systems; 2.7 -- The EU "light" regulatory approach to Personal Data Protection in Smart Grids: an evaluation; 2.8 -- Conclusion: DPIA Testing is a First Good Step but a more inclusive, easy to apply and flexible solution is necessary; 2.8.1 -- A missed opportunity?; 2.8.2 -- Recommendation 1: the governance of emerging technologies should carefully combine regulatory strategies.
2.8.3 -- Recommendation 2: Impact assessments of emerging technologies should be inclusive, easy to use and flexibleAcronyms; References; Chapter 3 -- The Evolution of the Smart Grid Threat Landscape and Cross-Domain Risk Assessment; 3.1 -- Introduction; 3.2 -- Smart Grid Architectures: The Basics; 3.2.1 -- GridWise Interoperability Context-Setting Framework; 3.2.2 -- NIST Smart Grid Framework; 3.2.3 -- Smart Grid Architecture Model and EU Mandate M490; 3.3 -- Smart Grid Threat Landscape; 3.3.1 -- Threat Types; 3.3.2 -- Threat Agents; 3.3.3 -- Attack Vectors; 3.3.4 -- Case Studies.
3.3.4.1 -- Advanced Metering Infrastructure (AMI)3.3.4.2 -- Wide Area Monitoring, Protection, and Control (WAMPAC); 3.3.4.3 -- Distribution Grid Management (DGM); 3.4 -- Smart Grid Risk Assessment; 3.4.1 -- Basic Concepts; 3.4.2 -- Main Challenges; 3.4.2.1 -- Managing Safety and Security Risks; 3.4.2.2 -- Analysing Cyber-physical Risks; 3.4.2.3 -- Understanding the Risks to Legacy Systems; 3.4.2.4 -- Complex Organisational Dependencies; 3.4.2.5 -- Understanding Cascading Effects; 3.4.3 -- Existing Risk Assessment Frameworks; 3.5 -- Conclusion; Acronyms; References.
Chapter 4 -- Resilience Against Physical Attacks.
Summary: This book provides a holistic view of leading edge smart grid security research by providing a complete presentation of forward-looking research in all areas of smart grid security. It will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of smart grid technology. It includes coverage of risk management, operational security, and secure development of the smart grid; and covers key technical topics, including threat types and attack vectors, threat case studies, smart metering, smart home, e- mobility, smart buildings, DERs, demand response management, distribution grid operators, transmission grid operators, virtual power plants, resilient architectures, communications protocols and encryption, as well as physical security. -- Edited summary from book.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Vendor-supplied metadata.

Includes bibliographical references and index.

This book provides a holistic view of leading edge smart grid security research by providing a complete presentation of forward-looking research in all areas of smart grid security. It will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of smart grid technology. It includes coverage of risk management, operational security, and secure development of the smart grid; and covers key technical topics, including threat types and attack vectors, threat case studies, smart metering, smart home, e- mobility, smart buildings, DERs, demand response management, distribution grid operators, transmission grid operators, virtual power plants, resilient architectures, communications protocols and encryption, as well as physical security. -- Edited summary from book.

Cover; Title Page; Copyright Page; Contents; List of Contributors; Foreword; Chapter 1 -- Introduction; 1.1 -- What is a Smart Grid?; 1.2 -- The Structure of a Smart Grid System; 1.3 -- The Two Key Challenges to be solved by Smart Grids; 1.4 -- Smart Grid Applications and their Critical Nature; 1.5 -- Challenges in Smart Grid Security; 1.6 -- The Storyline of this Book; References; Chapter 2 -- Assessing the European Approach to Privacy and Data Protection in Smart Grids. Lessons for Emerging Technologiesa; 2.1 -- Introduction.

2.2 -- The Dutch Case Study: a smart grid roll-out that neglected individual interests2.3 -- The Smart Grid: a socially complex phenomenon with a surveillance dimension; 2.4 -- Privacy and Personal Data Protection in the European Legal Order; 2.5 -- Privacy Testing and Data Protection Testing of Smart Grids; 2.6 -- Regulating Smart Grids in Europe: a "light" approach to personal data protection; 2.6.1 -- Supplementing the legally binding data protection framework; 2.6.2 -- A data protection impact assessment framework is the core element.

2.6.2.1 -- The First Regulatory Experiment: The RFID PIA Framework2.6.2.2 -- The Second Regulatory Experiment: The DPIA Framework for Smart Grids and Smart Metering Systems; 2.7 -- The EU "light" regulatory approach to Personal Data Protection in Smart Grids: an evaluation; 2.8 -- Conclusion: DPIA Testing is a First Good Step but a more inclusive, easy to apply and flexible solution is necessary; 2.8.1 -- A missed opportunity?; 2.8.2 -- Recommendation 1: the governance of emerging technologies should carefully combine regulatory strategies.

2.8.3 -- Recommendation 2: Impact assessments of emerging technologies should be inclusive, easy to use and flexibleAcronyms; References; Chapter 3 -- The Evolution of the Smart Grid Threat Landscape and Cross-Domain Risk Assessment; 3.1 -- Introduction; 3.2 -- Smart Grid Architectures: The Basics; 3.2.1 -- GridWise Interoperability Context-Setting Framework; 3.2.2 -- NIST Smart Grid Framework; 3.2.3 -- Smart Grid Architecture Model and EU Mandate M490; 3.3 -- Smart Grid Threat Landscape; 3.3.1 -- Threat Types; 3.3.2 -- Threat Agents; 3.3.3 -- Attack Vectors; 3.3.4 -- Case Studies.

3.3.4.1 -- Advanced Metering Infrastructure (AMI)3.3.4.2 -- Wide Area Monitoring, Protection, and Control (WAMPAC); 3.3.4.3 -- Distribution Grid Management (DGM); 3.4 -- Smart Grid Risk Assessment; 3.4.1 -- Basic Concepts; 3.4.2 -- Main Challenges; 3.4.2.1 -- Managing Safety and Security Risks; 3.4.2.2 -- Analysing Cyber-physical Risks; 3.4.2.3 -- Understanding the Risks to Legacy Systems; 3.4.2.4 -- Complex Organisational Dependencies; 3.4.2.5 -- Understanding Cascading Effects; 3.4.3 -- Existing Risk Assessment Frameworks; 3.5 -- Conclusion; Acronyms; References.

Chapter 4 -- Resilience Against Physical Attacks.

There are no comments for this item.

Log in to your account to post a comment.
Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login