Smart grid security: innovative solutions for a modernized grid
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Elsevier
2015
|
Schriftenreihe: | Syngress advanced topics in information security
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIV, 315 Seiten Illustrationen |
ISBN: | 9780128021224 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044562927 | ||
003 | DE-604 | ||
005 | 20171114 | ||
007 | t | ||
008 | 171102s2015 a||| |||| 00||| eng d | ||
020 | |a 9780128021224 |9 978-0-12-802122-4 | ||
035 | |a (OCoLC)935885189 | ||
035 | |a (DE-599)OBVAC12377448 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ZN 8520 |0 (DE-625)157630: |2 rvk | ||
245 | 1 | 0 | |a Smart grid security |b innovative solutions for a modernized grid |c ed. by Florian Skopik ; Paul Smith |
264 | 1 | |c 2015 | |
264 | 1 | |a Amsterdam [u.a.] |b Elsevier | |
300 | |a XIV, 315 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Syngress advanced topics in information security | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |D s |
689 | 0 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Skopik, Florian |e Sonstige |0 (DE-588)1100321047 |4 oth | |
700 | 1 | |a Smith, Paul |e Sonstige |4 oth | |
856 | 4 | |m DE-601 |q pdf/application |u http://www.gbv.de/dms/bowker/toc/9780128021224.pdf |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029961503&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029961503 |
Datensatz im Suchindex
_version_ | 1804177935684337664 |
---|---|
adam_text | Contents
List of Contributors.......................................................xi
Foreword.................................................................xiii
CHAPTER 1 Introduction......................................................l
1.1 What is a Smart Grid?.......................................1
1.2 The Structure of a Smart Grid System........................2
1.3 The Two Key Challenges to be Solved by Smart Grids........4
1.4 Smart Grid Applications and their Critical Nature...........5
1.5 Challenges in Smart Grid Security...........................7
1.6 The Storyline of this Book..................................8
References.....................................................10
CHAPTER 2 Assessing the European Approach to Privacy
and Data Protection in Smart Grids. Lessons
for Emerging Technologies..................................................11
2.1 Introduction...............................................11
2.2 The Dutch Case Study: A Smart Grid Roll-Out that
Neglected Individual Interests.............................12
2.3 The Smart Grid: A Socially Complex Phenomenon
with a Surveillance Dimension..............................15
2.4 Privacy and Personal Data Protection in the European
Legal Order................................................19
2.5 Privacy Testing and Data Protection Testing of Smart Grids..22
2.6 Regulating Smart Grids in Europe: A “Light” Approach
to Personal Data Protection................................25
2.6.1 Supplementing the Legally Binding Data Protection
Framework............................................25
2.6.2 A Data Protection Impact Assessment Framework
is the Core Element..................................26
2.7 The EU “Light” Regulatory Approach to Personal Data
Protection in Smart Grids: An Evaluation...................31
2.8 Conclusion: DPIA Testing is a First Good Step but a More
Inclusive, Easy to Apply and Flexible Solution is Necessary.40
2.8.1 A Missed Opportunity?................................40
2.8.2 Recommendation 1: The Governance of Emerging
Technologies should Carefully Combine Regulatory
Strategies...........................................41
Contents
2.8.3 Recommendation 2: Impact Assessments of Emerging
Technologies should be Inclusive, Easy to Use
and Flexible.........................................41
References.....................................................44
CHAPTER 3 The Evolution of the Smart Grid Threat Landscape
and Cross-Domain Risk Assessment..........................49
3.1 Introduction.............................................49
3.2 Smart Grid Architectures: The Basics.....................51
3.2.1 GridWise Interoperability Context-Setting Framework.51
3.2.2 NIST Smart Grid Framework..........................52
3.2.3 Smart Grid Architecture Model and EU Mandate
M490............................................... 52
3.3 Smart Grid Threat Landscape..............................54
3.3.1 Threat Types.......................................54
3.3.2 Threat Agents......................................56
3.3.3 Attack Vectors.....................................58
3.3.4 Case Studies.......................................60
3.4 Smart Grid Risk Assessment...............................65
3.4.1 Basic Concepts.....................................65
3.4.2 Main Challenges....................................68
3.4.3 Existing Risk Assessment Frameworks................72
3.5 Conclusion...............................................74
References.....................................................75
CHAPTER 4 Resilience Against Physical Attacks.............................79
4.1 Introduction.............................................79
4.2 Physical Attacks.........................................79
4.2.1 Goals of Physical Attacks in the Context of Smart
Grid Devices.........................................79
4.2.2 Overview of Physical Attacks.......................81
4.2.3 Access to Local Storage (Non-Invasive).............83
4.2.4 Accessing Open Interfaces (Non-Invasive)...........84
4.2.5 Bus Probing (Non-Invasive).........................84
4.2.6 Fault/Signal Injection (Non-Invasive)..............85
4.2.7 Glitching Attacks..................................86
4.2.8 Side-Channel Attacks...............................89
4.2.9 IC Decapsulation...................................95
4.2.10 Limited Optical Access to Internal Storage........96
4.2.11 (Optical) Fault Injection (Semi-Invasive).........97
4.2.12 IC Reverse Engineering............................97
Contents
4.3 Basic Protection Mechanisms............................100
4.4 Hardware Security Modules..............................101
4.5 Integrity Protection and Attestation...................104
4.6 Physical Uncloneable Functions.........................105
4.6.1 Motivation........................................105
4.6.2 Classification of PUFs and Related Concepts......106
4.6.3 Properties of PUFs...............................107
4.6.4 Example Implementations of PUFs..................107
4.7 Conclusion.............................................108
References..................................................110
CHAPTER 5 Secure Communications in Smart Grid:
Networking and Protocols................................113
5.1 Introduction...........................................113
5.1.1 An Overview of the Communication Network..........114
5.1.2 The Communications Network as an Attack Surface..115
5.2 Smart Grid Communication Standards.....................116
5.2.1 Functional Groups of Smart Grid Communications....116
5.2.2 Communication Standards..........................120
5.2.3 EC 62351: Security...............................127
5.3 Attacking Smart Grid Network Communications............129
5.3.1 Basic Attacks on Communications...................132
5.3.2 Attacks on Smart Grid Communication Protocols....134
5.4 Approaches to Smart Grid Network Communication
Security................................................136
5.4.1 Minimal Vulnerabilities...........................136
5.4.2 Visibility of Attacker Activities................137
5.4.3 Protection.......................................138
5.4.4 Detection........................................140
5.4.5 Current Research.................................142
5.5 Conclusion.............................................144
References..................................................146
CHAPTER 6 Cyber-Secure and Resilient Architectures
for Industrial Control Systems..........................149
6.1 Introduction...........................................149
6.1.1 Cyber Security Challenges in Industrial Control
Systems............................................149
6.1.2 Threats Against Industrial Control Systems.......151
6.1.3 Illustrative Attack Case: Stuxnet................153
Contents
6.2 Design of Cyber-secure and Resilient Industrial Control
Systems...................................................155
6.2.1 IT Security Reference Architecture.................155
6.2.2 Control-Centric Approaches.........................156
6.2.3 Risk Assessment for Control Systems................159
6.3 Cyber Security Challenges in Electric Power Systems.....162
6.3.1 New Control Loops in Smart Grids...................162
6.3.2 Vulnerabilities in Feedback-controlled Smart Grids.167
6.3.3 Existing Control Loops in Modern Power
Transmission Networks...............................169
6.4 Case Studies: Risk Assessment for False-Data Injection
Attacks on Power Systems..................................170
6.4.1 Minimum-Resource Adversary Policies................172
6.4.2 Maximum-Impact Resource-Constrained Adversary
Policies............................................175
6.5 Conclusion..............................................177
References...................................................179
CHAPTER 7 Establishing a Smart Grid Security Architecture................iss
7.1 Introduction............................................185
7.2 Adopting a Smart Grid Security Architecture Methodology.188
7.3 Defining your Smart Grid Security Architecture..........190
7.3.1 NISTIR 7628........................................190
7.3.2 Response to EU Mandate M/490.......................196
7.3.3 Microgrid Security Reference Architecture (MSRA)...202
7.3.4 Addressing Gaps in the Smart Grid Reference
Architectures.......................................205
7.4 Moving from Architecture to Design......................207
7.5 Validating your Smart Grid Security Architecture........212
7.6 Conclusion..............................................213
References...................................................214
CHAPTER 8 Secure Development Life Cycle..................................219
8.1 Introduction............................................219
8.1.1 The Development of Software for the Smart Grid.....221
8.2 The Secure System Development Lifecycle.................222
8.2.1 NIST 800-64........................................223
8.2.2 Microsoft Security Development Lifecycle...........225
8.2.3 Other Industry Best Practices......................228
8.3 Security Assurance Standards............................231
Contents
IX
8.4 Safety-Critical System Development and Best Practices.....233
8.4.1 The DO-178B Document................................234
8.4.2 The IEC 61508 Standard..............................235
8.4.3 The PHASE Principles................................235
8.5 Secure Development Activities.............................236
8.5.1 Secure Programming..................................236
8.5.2 Secure Code Review..................................237
8.5.3 Static Code Analysis................................238
8.5.4 Dynamic Code Analysis...............................239
8.5.5 Code Coverage Analysis..............................239
8.5.6 Penetration Testing.................................240
8.6 Conclusion................................................241
References.....................................................243
CHAPTER 9 Operational Smart Grid Security.........247
9.1 Introduction to the Operational Smart Grid Security
Model......................................................247
9.2 Visibility: Cyber Intelligence and Information Sharing....252
9.2.1 Visibility into Risk................................253
9.2.2 Visibility into Infrastructure......................255
9.2.3 Visibility into Identities..........................258
9.2.4 Visibility into Information.........................259
9.2.5 Visibility into Applications........................261
9.3 Analytics: Deriving Patterns and Understanding
Anomalies..................................................261
9.3.1 Analytics: Establishing Patterns of What is Normal.262
9.3.2 Analytics: Detecting Anomalies within the Operational
Environment..........................................263
9.3.3 Analytics: Detecting Anomalies within the Administrator
Environment..........................................265
9.3.4 Analytics: Investigation and Prioritization.........268
9.4 Action: Mitigation, Remediation and Recovery..............269
9.4.1 Action: Recovering from and Managing Incidents......270
9.4.2 Action: Remediating Vulnerabilities and Anomalies..272
9.4.3 Action: Mitigating Risk.............................273
9.5 The Human Factor as Asset.................................274
9.5.1 Engaging the Employee Community.....................275
9.5.2 Engaging the User Community.........................275
9.6 Conclusion: Security Shared is Security Strengthened......276
References.....................................................278
1
x Contents
CHAPTER 10 Implementation Experiences from Smart
Grid Security Applications and Outlook
on Future Research.........................................................283
10.1 Smart Grid Evolution......................................283
10.1.1 Documented Incidents................................283
10.1.2 Evolving Security Standards........................286
10.2 Sustainable Building Integrated Energy Test-Beds..........288
10.2.1 Tertiary (Supervisory) Control Layer................289
10.2.2 Secondary (Coordination) Control Layer.............289
10.2.3 Primary (Local) Control Layer......................290
10.3 Security Measures and Protection Mechanisms...............292
10.3.1 Intrusion Detection Systems.........................293
10.3.2 Physical Unclonable Functions- PUFs................293
10.3.3 Advanced Security Analytics........................294
10.3.4 Resilient Control Algorithms.......................295
10.4 Anticipated Results: Smart Grid Test-Bed Use-Cases........295
10.4.1 Network Vulnerabilities in IEC 61850 Smart
Substations.........................................295
10.4.2 IEC 61850 Based Smart Substation...................296
10.4.3 Security Analytics in SCADA Systems................300
10.5 Conclusion and Look Ahead.................................302
References......................................................304
Subject Index
307
|
any_adam_object | 1 |
author_GND | (DE-588)1100321047 |
building | Verbundindex |
bvnumber | BV044562927 |
classification_rvk | ZN 8520 |
ctrlnum | (OCoLC)935885189 (DE-599)OBVAC12377448 |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01774nam a2200421 c 4500</leader><controlfield tag="001">BV044562927</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171114 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">171102s2015 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128021224</subfield><subfield code="9">978-0-12-802122-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)935885189</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)OBVAC12377448</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 8520</subfield><subfield code="0">(DE-625)157630:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Smart grid security</subfield><subfield code="b">innovative solutions for a modernized grid</subfield><subfield code="c">ed. by Florian Skopik ; Paul Smith</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 315 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Syngress advanced topics in information security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Skopik, Florian</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1100321047</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Paul</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">DE-601</subfield><subfield code="q">pdf/application</subfield><subfield code="u">http://www.gbv.de/dms/bowker/toc/9780128021224.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029961503&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029961503</subfield></datafield></record></collection> |
id | DE-604.BV044562927 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:55:59Z |
institution | BVB |
isbn | 9780128021224 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029961503 |
oclc_num | 935885189 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XIV, 315 Seiten Illustrationen |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Elsevier |
record_format | marc |
series2 | Syngress advanced topics in information security |
spelling | Smart grid security innovative solutions for a modernized grid ed. by Florian Skopik ; Paul Smith 2015 Amsterdam [u.a.] Elsevier XIV, 315 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Syngress advanced topics in information security Literaturangaben Intelligentes Stromnetz (DE-588)7708028-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Intelligentes Stromnetz (DE-588)7708028-2 s Sicherheit (DE-588)4054790-5 s DE-604 Skopik, Florian Sonstige (DE-588)1100321047 oth Smith, Paul Sonstige oth DE-601 pdf/application http://www.gbv.de/dms/bowker/toc/9780128021224.pdf Inhaltsverzeichnis Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029961503&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Smart grid security innovative solutions for a modernized grid Intelligentes Stromnetz (DE-588)7708028-2 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd |
subject_GND | (DE-588)7708028-2 (DE-588)4274324-2 (DE-588)4054790-5 |
title | Smart grid security innovative solutions for a modernized grid |
title_auth | Smart grid security innovative solutions for a modernized grid |
title_exact_search | Smart grid security innovative solutions for a modernized grid |
title_full | Smart grid security innovative solutions for a modernized grid ed. by Florian Skopik ; Paul Smith |
title_fullStr | Smart grid security innovative solutions for a modernized grid ed. by Florian Skopik ; Paul Smith |
title_full_unstemmed | Smart grid security innovative solutions for a modernized grid ed. by Florian Skopik ; Paul Smith |
title_short | Smart grid security |
title_sort | smart grid security innovative solutions for a modernized grid |
title_sub | innovative solutions for a modernized grid |
topic | Intelligentes Stromnetz (DE-588)7708028-2 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd |
topic_facet | Intelligentes Stromnetz Computersicherheit Sicherheit |
url | http://www.gbv.de/dms/bowker/toc/9780128021224.pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029961503&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT skopikflorian smartgridsecurityinnovativesolutionsforamodernizedgrid AT smithpaul smartgridsecurityinnovativesolutionsforamodernizedgrid |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis