2021
DOI: 10.2172/1774870
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity in Photovoltaic Plant Operations

Abstract: Department of Energy (DOE) reports produced after 1991 and a growing number of pre-1991 documents are available free via www.OSTI.gov.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…In a study conducted by Walker et al (2021) that specifically examined cybersecurity in PV operations, notable challenges were identified, including a shortage of personnel with cybersecurity expertise and inadequate cyber hygiene practices. To address these concerns, the study proposed comprehensive plans that encompassed the expanded threat landscape, emphasized training programs for staff, and recommended implementing certifications for security systems as proactive measures to mitigate these risks.…”
Section: Cybersecurity In Smart Grids With Solar Pv Integrationmentioning
confidence: 99%
“…In a study conducted by Walker et al (2021) that specifically examined cybersecurity in PV operations, notable challenges were identified, including a shortage of personnel with cybersecurity expertise and inadequate cyber hygiene practices. To address these concerns, the study proposed comprehensive plans that encompassed the expanded threat landscape, emphasized training programs for staff, and recommended implementing certifications for security systems as proactive measures to mitigate these risks.…”
Section: Cybersecurity In Smart Grids With Solar Pv Integrationmentioning
confidence: 99%
“…Cybersecurity has an important impact on many aspects of the supply chain, from firmware arranged on chips, to software packages used at various points in the software development cycle. Equipment or software that has been compromised in the supply chain upstream of the ultimate owner-operator might lead to attacks, such as stealing or rerouting funds; denial of service; breaching confidential or proprietary information from a company, its customers, or its suppliers; ransomware that denies the operation of automated equipment for payment; and malicious control actions that could damage equipment and endanger personnel (Walker et al 2021). One key area that that needs cybersecurity recommendations and guidance is the security of firmware and programmable logic controllers.…”
Section: Executive Summarymentioning
confidence: 99%
“…Many standards exist to inform increases in cybersecurity postures and to protect against cyberattacks. The current landscape of recommendations and standards includes several that can be used by DER utilities, vendors, aggregators, or manufacturers (Walker et al 2021): Although this is not a complete list, these are recommended standards to assess and implement for DER cybersecurity. Idaho National Laboratory posted the standards to a secure energy infrastructure website that allows an organization to select the filters that match their own organizational structure, the purpose of the standard they are looking for, as well as the type.…”
Section: Current Landscapementioning
confidence: 99%
See 1 more Smart Citation
“…example is the 2015 cyberattack on Ukraine's power grid, where hackers targeted control systems, triggering widespread outages affecting approximately 225,000 customers (Zetter, 2016). Similarly, a 2019 attack on a US utility impacted PV and wind installations due to an unpatched firewall breach, temporarily disrupting Supervisory Control and Data Acquisition (SCADA) systems and 500 MW of generation (Walker et al, 2021). These incidents emphasize the urgent need for robust cybersecurity measures in PV systems to avert future threats, underlining power grid vulnerability and potential repercussions of cyberattacks on vital systems.…”
mentioning
confidence: 99%