2022
DOI: 10.1007/978-3-030-91293-2_9
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security of an Electric Power System in Critical Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…Based on our previous articles (Pöyhönen and Lehto, 2017;Pöyhönen, 2022), the concept of national critical infrastructure can be simplified in accordance with three essential system layers. At the base layer is the electricity network, above that is the information network layer, and above these are services.…”
Section: Support Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…Based on our previous articles (Pöyhönen and Lehto, 2017;Pöyhönen, 2022), the concept of national critical infrastructure can be simplified in accordance with three essential system layers. At the base layer is the electricity network, above that is the information network layer, and above these are services.…”
Section: Support Systemsmentioning
confidence: 99%
“…In system-of-systems thinking, their digital structure and operational role should be identified as part of a port entity and part of reliable functioning in and between these layers. This also facilitates the identification of cyber dependencies within the layers so that the cyber threat intelligence can be carried out with the most efficient and practical measures (Pöyhönen and Lehto, 2017;Pöyhönen, 2022).…”
Section: Cyber Threat Intelligencementioning
confidence: 99%
See 1 more Smart Citation
“…In this case, the functions may be, for example, the management and administration of cyber security or the technical development, maintenance or use of information systems, information networks and ICT services. (Pöyhönen, 2020) Many organizations' cyber security activities continue to be characterized by a responsive approach, with hospitals being no exception. A responsive approach means that in the event of a cyber-attack, and the action are quick conclusions and urgent measures.…”
Section: Insider Threatsmentioning
confidence: 99%
“…Developing cyber security using best practices creates for the hospital proactive methods instead reactive actions. (Pöyhönen, 2020) NIST Framework for Improving Critical Infrastructure Cybersecurity provides a common language for understanding, managing, and expressing cybersecurity risk to internal and external stakeholders. It can be used to help identify and prioritize actions for reducing cybersecurity risk, and it is a tool for aligning policy, business, and technological approaches to managing that risk.…”
Section: Insider Threatsmentioning
confidence: 99%