2011
DOI: 10.1016/j.epsr.2010.10.012
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security assessment of a power plant

Abstract: Relevant results from long lasting work on C(I)IP will be tangibleWith the tenth ECN issue the articles move from awareness to case studies, results of C(I)IP research and conceptual innovations. C(I)IP is now discussed for years at policy and conceptual levels. The policy actors have completed fundamental studies and start to take action. About this IssueAndrea Servida highlights the background on which an EU policy initiative on Critical Communication and Information Infrastructure Protection (C(I)IP) may gr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(22 citation statements)
references
References 12 publications
0
22
0
Order By: Relevance
“…A typical electrical power grid includes several control centres to manage the generation, transmission, and distribution of power throughout the grid [24]. Therefore, the electric power critical infrastructure is highly interconnected, consisting of several utilities and distributed substations.…”
Section: A the Power Chain Dimensionmentioning
confidence: 99%
“…A typical electrical power grid includes several control centres to manage the generation, transmission, and distribution of power throughout the grid [24]. Therefore, the electric power critical infrastructure is highly interconnected, consisting of several utilities and distributed substations.…”
Section: A the Power Chain Dimensionmentioning
confidence: 99%
“…The framework includes processes for a security risk and vulnerability assessment. As efforts in the nuclear industries, Nai Fovino I [12] presented the outcome of information and communication technology (ICT) security assessment targeting an operational power plant. The results show that the vulnerability of a plant to malicious attacks is severe.…”
Section: Cyber Security Accidents and Effortsmentioning
confidence: 99%
“…(). Specific attention has been paid in the literature to power systems (see, e.g., the papers by Ericsson, ; Fovino, Guidi, Masera, & Stefanini, ; Onyeji, Bazilian, & Bronk, ; Sun, Hahn, & Liu, ), industrial control systems (dealt with in the papers by Cherdantseva et al., ; Ralston, Graham, & Hieb, ), and nuclear plants (as in the papers by Park, Suh, & Park, ; Shin, Son, & Heo, ). Whatever the specific infrastructure, securing it requires an investment in cybersecurity tools and policies.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber risks represent a major source of concern for several utility and industrial infrastructures, due to both the risk arising in individual infrastructures and that deriving from the interconnections and interdependencies among them, as shown in the papers by Kröger (2008) and by Maglaras et al (2018). Specific attention has been paid in the literature to power systems (see, e.g., the papers by Ericsson, 2010;Fovino, Guidi, Masera, & Stefanini, 2011;Onyeji, Bazilian, & Bronk, 2014;Sun, Hahn, & Liu, 2018), industrial control systems (dealt with in the papers by Cherdantseva et al, 2016;Ralston, Graham, & Hieb, 2007), and nuclear plants (as in the papers by Park, Suh, & Park, 2016;Shin, Son, & Heo, 2017). Whatever the specific infrastructure, securing it requires an investment in cybersecurity tools and policies.…”
Section: Introductionmentioning
confidence: 99%