Smart Grid Handbook 2016
DOI: 10.1002/9781118755471.sgd055
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity ofSCADAwithin Substations

Abstract: The cybersecurity of modern substations is becoming increasingly important as they continue to integrate more digital control and communication technologies. This chapter will explore the cybersecurity threats to substations and will then discuss various mechanisms to protect them. The chapter will demonstrate how the security protections, such as encryption, authentication, access control, and intrusion detection, should be applied to substation systems. The chapter will then discuss the emerging cybersecurit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 12 publications
0
1
0
1
Order By: Relevance
“…ThecurrentglobalsecuritylandscapethathascausedGeneralDempsey(andmostofus)somuchangst hasasmuchtodowiththeidentificationofthreatagentsasitdoeswithhandlingthesophistication and complexity of current and future threats (Shaw, 2006). The cyberspace domain as we have notedprovidesanumberofdifferentchallengesforusamongstthembeingtheabilitytodetermine quicklythepotentialsourceofthethreatstodecideanappropriatecourseofaction(COA).Among thehighestoftheprioritiesistheneedtoreducethecybervulnerabilities.Theconflictswagedover historyinthefourconventionalwarfaredomains(air,space,sea,land)havebeenverydifferentin thedeterminationofwherethethreatsmayoriginate.Inthecyberspacedomain,however,because thepotentialsourcesofthethreatsaresoverydifficulttoimmediatelydetermine,averyspecialand differentsetofchallengesmustbeovercome.TheNationalInstituteofStandardsandTechnology (NIST),aswellasothergovernmentagencies,havedonealotofworkinclassifyingandcategorizing cyberthreats.Itisverymuchanissuethatgoesbeyondsimplydeliberateattacksthatcanbeattributed toindividuals,groups,governments,etc.,includingnaturaldisasters,e.g.,earthquakes,tornados, hurricanes,storms,pandemics.Inaddition,therecanbedisastersthatcanoccurdotounintended consequencesofhumanbehavior,e.g.,someonehitsthewrongswitchordoesnotturnofftheright switchandcausesamajorproblem.…”
Section: Reduce the Vulnerabilitiesmentioning
confidence: 99%
“…ThecurrentglobalsecuritylandscapethathascausedGeneralDempsey(andmostofus)somuchangst hasasmuchtodowiththeidentificationofthreatagentsasitdoeswithhandlingthesophistication and complexity of current and future threats (Shaw, 2006). The cyberspace domain as we have notedprovidesanumberofdifferentchallengesforusamongstthembeingtheabilitytodetermine quicklythepotentialsourceofthethreatstodecideanappropriatecourseofaction(COA).Among thehighestoftheprioritiesistheneedtoreducethecybervulnerabilities.Theconflictswagedover historyinthefourconventionalwarfaredomains(air,space,sea,land)havebeenverydifferentin thedeterminationofwherethethreatsmayoriginate.Inthecyberspacedomain,however,because thepotentialsourcesofthethreatsaresoverydifficulttoimmediatelydetermine,averyspecialand differentsetofchallengesmustbeovercome.TheNationalInstituteofStandardsandTechnology (NIST),aswellasothergovernmentagencies,havedonealotofworkinclassifyingandcategorizing cyberthreats.Itisverymuchanissuethatgoesbeyondsimplydeliberateattacksthatcanbeattributed toindividuals,groups,governments,etc.,includingnaturaldisasters,e.g.,earthquakes,tornados, hurricanes,storms,pandemics.Inaddition,therecanbedisastersthatcanoccurdotounintended consequencesofhumanbehavior,e.g.,someonehitsthewrongswitchordoesnotturnofftheright switchandcausesamajorproblem.…”
Section: Reduce the Vulnerabilitiesmentioning
confidence: 99%
“…Em contraste com os sistemas de informac ¸ões tradicionais, onde as propriedades de Confidencialidade e Integridade são consideradas prioritárias, nos sistemas industriais de infraestrutura crítica a Disponibilidade é fundamental [Hahn et al 2016]. Nesse contexto, uma das principais ameac ¸as consistem nos ataques de negac ¸ão de servic ¸o, do inglês Denial of Service (DoS).…”
Section: Introduc ¸ãOunclassified