Applied cyber security and the smart grid: implementing security controls into the modern power infrastructure
Understanding how the Smart Grid works first requires an understanding of how industrial networks operate, which in turn requires a basic understanding of the underlying communications protocols that are used, where they are used, and why. There are many systems that comprise the larger system of th...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Elsevier Syngress
2013
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | Understanding how the Smart Grid works first requires an understanding of how industrial networks operate, which in turn requires a basic understanding of the underlying communications protocols that are used, where they are used, and why. There are many systems that comprise the larger system of the "Smart Grid," which utilize both common and open protocols as well as many highly specialized protocols used for industrial automation and control, most of which are designed for efficiency and reliability to support the economic and operational requirements of large distributed control systems. Similarly, industrial protocols are designed for real-time operation requiring deterministic results with continuous availability. Combined together, this blend of open and proprietary networks enables the much larger network of measurements, controls, metering and automation that is the Smart Grid. This amalgam of disparate systems and networks is also a major factor in the cyber security concerns facing the Smart Grid today"-- |
Beschreibung: | Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary Includes bibliographical references and index |
Beschreibung: | XXII, 202 S. |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040938377 | ||
003 | DE-604 | ||
005 | 20130527 | ||
007 | t | ||
008 | 130411s2013 |||| 00||| eng d | ||
020 | |z 9781597499989 |c pbk |9 978-1-59749-998-9 | ||
035 | |a (OCoLC)844055820 | ||
035 | |a (DE-599)BVBBV040938377 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-29T | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Knapp, Eric |e Verfasser |4 aut | |
245 | 1 | 0 | |a Applied cyber security and the smart grid |b implementing security controls into the modern power infrastructure |c Eric D. Knapp ; Raj Samani |
264 | 1 | |a Amsterdam [u.a.] |b Elsevier Syngress |c 2013 | |
300 | |a XXII, 202 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Understanding how the Smart Grid works first requires an understanding of how industrial networks operate, which in turn requires a basic understanding of the underlying communications protocols that are used, where they are used, and why. There are many systems that comprise the larger system of the "Smart Grid," which utilize both common and open protocols as well as many highly specialized protocols used for industrial automation and control, most of which are designed for efficiency and reliability to support the economic and operational requirements of large distributed control systems. Similarly, industrial protocols are designed for real-time operation requiring deterministic results with continuous availability. Combined together, this blend of open and proprietary networks enables the much larger network of measurements, controls, metering and automation that is the Smart Grid. This amalgam of disparate systems and networks is also a major factor in the cyber security concerns facing the Smart Grid today"-- | ||
650 | 4 | |a Smart power grids / Security measures | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Infrastruktur |0 (DE-588)4026944-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Infrastruktur |0 (DE-588)4026944-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Samani, Raj |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025917191&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025917191 |
Datensatz im Suchindex
_version_ | 1804150240039665664 |
---|---|
adam_text | Contents
Acknowledgments
.....................................................................................................ix
About the Authors
.....................................................................................................xi
About
lhe
Technical Editor
.....................................................................................xiii
Foreword by
Troeis
Oerting
.....................................................................................xv
Foreword by Robert P.
Lockhart.............................................................................xvi
Introduction
.............................................................................................................xix
CHAPTER
1
What is the Smart Grid?
..........................................1
Energy demands
..............................................................................2
Grid resilience
.................................................................................3
Environmental performance
............................................................5
Greater efficiency
......................................................................5
Integration of renewable technologies
.......................................6
Reduction in the need for new power plants
.............................7
Support for electric vehicles
......................................................8
Smarter appliances
.....................................................................8
Operational efficiencies
..................................................................9
Common components of the Smart Grid
......................................11
Substation automation
.............................................................11
Phasor measurement units
.......................................................11
Advanced Metering Infrastructure
...........................................12
Pitfalls of the Smart Grid
..............................................................12
Summary
.......................................................................................14
References
.....................................................................................14
CHAPTER
2
Smart Grid Network Architecture
...........................17
Bulk and distributed generation architectures
..............................19
Types of electrical generation
..................................................19
Generation system architecture
...............................................23
Generation system security concerns and recommendations
......26
Transmission and distribution architecture
...................................32
Transmission architecture
........................................................32
Distribution architecture
..........................................................43
Advanced metering architecture
...................................................47
Compromise of the smart meter
..............................................49
Compromise of AMI
................................................................49
In-home systems
...........................................................................50
Microgrids
.....................................................................................50
VI
Contents
System interdependencies
.............................................................51
Protocols.......................................................................................
52
IEEE C37.
118..........................................................................53
IEC
62351
and IEC
61850......................................................54
ZigBee
.....................................................................................54
Summary
.......................................................................................54
References
.....................................................................................55
CHAPTER
3
Hacking the Smart Grid
.........................................57
Motive
...........................................................................................58
Theft of information
................................................................58
Denial of service
......................................................................59
Manipulation of service
...........................................................60
Identifying a target
........................................................................62
Scanning transmission and distribution
infrastructure
.........................................................................65
Leveraging automation systems for enumeration
....................67
Vulnerability
.................................................................................67
Devices-specific vulnerabilities
...............................................68
Leveraging known vulnerabilities
...........................................69
Inherent vulnerabilities in industrial protocols
........................70
Turning a vulnerably into a compromise
.................................72
Attack tools
...................................................................................73
General tools
............................................................................73
Smart meter tools
.....................................................................73
Attack methods
.............................................................................74
Man-in-the-middle attacks
.......................................................75
Replay attacks
..........................................................................76
Popping the HMI
.....................................................................77
Blended attacks
........................................................................77
Setting phasors to kill
..............................................................81
Attacking generation facilities from the grid
...........................82
What about secure protocols?
..................................................83
Summary
......................................................................... 84
References
............................................................ 85
CHAPTER
4
Privacy Concerns with the Smart Grid
....................87
Personal data
................................................................... 87
Privacy risks associated with the Smart Grid
..........................88
References
............................................ 98
Contents
VII
CHAPTER
5
Security Models for
SCADA, ICS,
and
Smart Grid
..........................................................101
NISTIR
7628
Smart Grid cyber security architecture
................103
EU M/490
and the SGCG reference architecture for the
Smart Grid
................................................................................104
IEEE
2030-2011
Smart Grid power system,
communication technology, and information technology
reference diagrams
...................................................................108
ISA-62443 (also known as ISA-SP99): zones and
conduits and Smart Grids
.........................................................109
Mapping security requirements to Smart Grid
environments
............................................................................114
Applying the
3
χ
3
cyber security model to
Smart Grids
.........................................................................118
A simplified Smart Grid reference model
...................................121
Summary
.....................................................................................122
References
...................................................................................123
CHAPTER
6
Securing the Smart Grid
......................................125
Implementing security control within Smart Grid
endpoints
..................................................................................126
Field zone protection
.............................................................126
Control zone protection
.........................................................129
Service zone protection and back-office systems
..................130
Establishing strong boundaries and zone separation
..................130
Compensating controls
..........................................................132
Advanced network monitoring
..............................................133
Protecting data and applications within the Smart Grid
.............134
Situational awareness
..................................................................138
What to monitor
.....................................................................139
Where to monitor
...................................................................140
Use case: Defending against Shamoon
.......................................141
Summary
.....................................................................................144
References
...................................................................................145
CHAPTER
7
Securing the Supply Chain
..................................147
Smart Grid supply chain
.............................................................149
High transparency
..................................................................150
Medium transparency
............................................................151
Standardization bodies
...........................................................153
VIII
Contents
The chain, in the supply chain
...............................................156
References
...................................................................................158
CHAPTER
8
The Future of the Grid
.........................................161
The challenge of making predictions
..........................................161
An alternate world
.................................................................162
Value of personal data
.................................................................163
Transparency
..........................................................................164
Proportionality
.......................................................................166
Future cyber security considerations
..........................................166
The future of cyber security countermeasures
............................168
Making the tools we have better
............................................169
New tools
...............................................................................169
Point security versus a secure framework
.............................170
Summary
.....................................................................................171
References
...................................................................................171
Appendix A: Reference Models and Architectures
...........................................173
Appendix B: Continued Reading
........................................................................183
Glossary
................................................................................................................187
Index
......................................................................................................................199
|
any_adam_object | 1 |
author | Knapp, Eric Samani, Raj |
author_facet | Knapp, Eric Samani, Raj |
author_role | aut aut |
author_sort | Knapp, Eric |
author_variant | e k ek r s rs |
building | Verbundindex |
bvnumber | BV040938377 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)844055820 (DE-599)BVBBV040938377 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03095nam a2200409 c 4500</leader><controlfield tag="001">BV040938377</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130527 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130411s2013 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597499989</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-59749-998-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)844055820</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040938377</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-29T</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Knapp, Eric</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied cyber security and the smart grid</subfield><subfield code="b">implementing security controls into the modern power infrastructure</subfield><subfield code="c">Eric D. Knapp ; Raj Samani</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier Syngress</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, 202 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Understanding how the Smart Grid works first requires an understanding of how industrial networks operate, which in turn requires a basic understanding of the underlying communications protocols that are used, where they are used, and why. There are many systems that comprise the larger system of the "Smart Grid," which utilize both common and open protocols as well as many highly specialized protocols used for industrial automation and control, most of which are designed for efficiency and reliability to support the economic and operational requirements of large distributed control systems. Similarly, industrial protocols are designed for real-time operation requiring deterministic results with continuous availability. Combined together, this blend of open and proprietary networks enables the much larger network of measurements, controls, metering and automation that is the Smart Grid. This amalgam of disparate systems and networks is also a major factor in the cyber security concerns facing the Smart Grid today"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Smart power grids / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Infrastruktur</subfield><subfield code="0">(DE-588)4026944-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Infrastruktur</subfield><subfield code="0">(DE-588)4026944-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samani, Raj</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025917191&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025917191</subfield></datafield></record></collection> |
id | DE-604.BV040938377 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:35:46Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025917191 |
oclc_num | 844055820 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-29T |
owner_facet | DE-473 DE-BY-UBG DE-29T |
physical | XXII, 202 S. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Elsevier Syngress |
record_format | marc |
spelling | Knapp, Eric Verfasser aut Applied cyber security and the smart grid implementing security controls into the modern power infrastructure Eric D. Knapp ; Raj Samani Amsterdam [u.a.] Elsevier Syngress 2013 XXII, 202 S. txt rdacontent n rdamedia nc rdacarrier Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary Includes bibliographical references and index Understanding how the Smart Grid works first requires an understanding of how industrial networks operate, which in turn requires a basic understanding of the underlying communications protocols that are used, where they are used, and why. There are many systems that comprise the larger system of the "Smart Grid," which utilize both common and open protocols as well as many highly specialized protocols used for industrial automation and control, most of which are designed for efficiency and reliability to support the economic and operational requirements of large distributed control systems. Similarly, industrial protocols are designed for real-time operation requiring deterministic results with continuous availability. Combined together, this blend of open and proprietary networks enables the much larger network of measurements, controls, metering and automation that is the Smart Grid. This amalgam of disparate systems and networks is also a major factor in the cyber security concerns facing the Smart Grid today"-- Smart power grids / Security measures Computer networks / Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Infrastruktur (DE-588)4026944-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 s Infrastruktur (DE-588)4026944-9 s DE-604 Samani, Raj Verfasser aut Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025917191&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Knapp, Eric Samani, Raj Applied cyber security and the smart grid implementing security controls into the modern power infrastructure Smart power grids / Security measures Computer networks / Security measures Datensicherung (DE-588)4011144-1 gnd Infrastruktur (DE-588)4026944-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4026944-9 |
title | Applied cyber security and the smart grid implementing security controls into the modern power infrastructure |
title_auth | Applied cyber security and the smart grid implementing security controls into the modern power infrastructure |
title_exact_search | Applied cyber security and the smart grid implementing security controls into the modern power infrastructure |
title_full | Applied cyber security and the smart grid implementing security controls into the modern power infrastructure Eric D. Knapp ; Raj Samani |
title_fullStr | Applied cyber security and the smart grid implementing security controls into the modern power infrastructure Eric D. Knapp ; Raj Samani |
title_full_unstemmed | Applied cyber security and the smart grid implementing security controls into the modern power infrastructure Eric D. Knapp ; Raj Samani |
title_short | Applied cyber security and the smart grid |
title_sort | applied cyber security and the smart grid implementing security controls into the modern power infrastructure |
title_sub | implementing security controls into the modern power infrastructure |
topic | Smart power grids / Security measures Computer networks / Security measures Datensicherung (DE-588)4011144-1 gnd Infrastruktur (DE-588)4026944-9 gnd |
topic_facet | Smart power grids / Security measures Computer networks / Security measures Datensicherung Infrastruktur |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025917191&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT knapperic appliedcybersecurityandthesmartgridimplementingsecuritycontrolsintothemodernpowerinfrastructure AT samaniraj appliedcybersecurityandthesmartgridimplementingsecuritycontrolsintothemodernpowerinfrastructure |