Syngress, Elsevier, 2013., - 224 p., ISBN: 1597499986
Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.
What is the Smart Grid?
Energy demands
Grid resilience
Environmental performance
Operational efficiencies
Common components of the Smart Grid
Pitfalls of the Smart Grid
Smart Grid Network Architecture
Bulk and distributed generation architectures
Transmission and distribution architecture
Advanced metering architecture
In-home systems
Microgrids
System interdependencies
Protocols
Hacking the Smart Grid
Motive
Identifying a target
Vulnerability
Attack tools
Attack methods
Privacy Concerns with the Smart Grid
Personal data
Privacy risks associated with the Smart Grid
Security Models for SCADA, ICS, and Smart Grid
NISTIR 7628 Smart Grid cyber security architecture
EU M/490 and the SGCG reference architecture for the Smart Grid
IEEE 2030-2011 Smart Grid power system, communication technology, and information technology
reference diagrams
ISA-62443 (also known as ISA-SP99): zones and conduits and Smart Grids
Mapping security requirements to Smart Grid Environments
Applying the 3 x 3 cyber security model to Smart Grids
A simplified Smart Grid reference model
Securing the Smart Grid
Implementing security control within Smart Grid endpoints
Establishing strong boundaries and zone separation
Protecting data and applications within the Smart Grid
Situational awareness
What to monitor
Where to monitor
Use case: Defending against Shamoon
Securing the Supply Chain
Smart Grid supply chain
The chain, in the supply chain
The Future of the Grid
The challenge of making predictions
An alternate world
Value of personal data
Transparency
Proportionality
Future cyber security considerations
Point security versus a secure framework
Appendix A: Reference Models and Architectures
Appendix B: Continued Reading