SKOLKOVO School of Management

Normal view MARC view ISBD view

Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / Eric D. Knapp, Raj Samani, Joel Langill, technical editor.

By: Knapp, Eric D.
Contributor(s): Samani, Raj.
Description: xxii, 202 pages : illustrations ; 24 cm.ISBN: 9781597499989 (pbk.).Subject(s): Smart power grids -- Security measures | Computer networks -- Security measuresDDC classification: 621.310285/58 Online resources: Full-text here
Contents:
Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary.
Summary: "Understanding how the Smart Grid works first requires an understanding of how industrial networks operate, which in turn requires a basic understanding of the underlying communications protocols that are used, where they are used, and why. There are many systems that comprise the larger system of the "Smart Grid," which utilize both common and open protocols as well as many highly specialized protocols used for industrial automation and control, most of which are designed for efficiency and reliability to support the economic and operational requirements of large distributed control systems. Similarly, industrial protocols are designed for real-time operation requiring deterministic results with continuous availability. Combined together, this blend of open and proprietary networks enables the much larger network of measurements, controls, metering and automation that is the Smart Grid. This amalgam of disparate systems and networks is also a major factor in the cyber security concerns facing the Smart Grid today"--
Tags from this library: No tags from this library for this title.
Item type Current location Call number Status Date due Barcode Item holds
Book Skoltech library
Shelves
TK3105 .K63 2013 (Browse shelf) Available 2000007526
Total holds: 0

Includes bibliographical references and index.

Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary.

"Understanding how the Smart Grid works first requires an understanding of how industrial networks operate, which in turn requires a basic understanding of the underlying communications protocols that are used, where they are used, and why. There are many systems that comprise the larger system of the "Smart Grid," which utilize both common and open protocols as well as many highly specialized protocols used for industrial automation and control, most of which are designed for efficiency and reliability to support the economic and operational requirements of large distributed control systems. Similarly, industrial protocols are designed for real-time operation requiring deterministic results with continuous availability. Combined together, this blend of open and proprietary networks enables the much larger network of measurements, controls, metering and automation that is the Smart Grid. This amalgam of disparate systems and networks is also a major factor in the cyber security concerns facing the Smart Grid today"--

There are no comments for this item.

Log in to your account to post a comment.