Applied Cyber Security and the Smart Grid :: Implementing Security Controls into the Modern Power Infrastructure.
Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The ""Smart Grid"" requires new technologies throughout energy generation, transmission and distribution, a...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington :
Elsevier Science,
2013.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The ""Smart Grid"" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of t. |
Beschreibung: | Smart Grid: Integrating renewable, distributed, and efficient energy, by Fereidoon P. Sioshansi. |
Beschreibung: | 1 online resource (435 pages) |
ISBN: | 9780124046382 012404638X |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn830170155 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 130316s2013 vtu o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d OCLCQ |d OPELS |d N$T |d IDEBK |d YDXCP |d ZMC |d OCLCQ |d OCLCO |d DEBSZ |d OCLCQ |d ICA |d AGLDB |d MERUC |d OCLCQ |d SAV |d OCLCQ |d ZCU |d OCLCF |d U3W |d D6H |d VTS |d LND |d ICG |d AU@ |d OCLCQ |d STF |d LEAUB |d DKC |d OCLCQ |d AJS |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
020 | |a 9780124046382 |q (electronic bk.) | ||
020 | |a 012404638X |q (electronic bk.) | ||
035 | |a (OCoLC)830170155 | ||
050 | 4 | |a TK3105 .K63 2013 | |
072 | 7 | |a TEC |x 007000 |2 bisacsh | |
082 | 7 | |a 621.31028558 | |
049 | |a MAIN | ||
100 | 1 | |a Knapp, Eric D. | |
245 | 1 | 0 | |a Applied Cyber Security and the Smart Grid : |b Implementing Security Controls into the Modern Power Infrastructure. |
260 | |a Burlington : |b Elsevier Science, |c 2013. | ||
300 | |a 1 online resource (435 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | 0 | |t Foreword / |r Troels Oerting -- |t Foreword / |r Robert P. Lockhart -- |t What is the Smart Grid? -- |t Smart Grid Network Architecture -- |t Hacking the Smart Grid -- |t Privacy Concerns with the Smart Grid -- |t Security Models for SCADA, ICS, and Smart Grid -- |t Securing the Smart Grid -- |t Securing the Supply Chain -- |t The Future of the Grid -- |g Appendix A. |t Reference Models and Architectures -- |g Appendix B. |t Continued Reading. |
505 | 0 | |a Cover image; Title page; Table of Contents; Copyright; Acknowledgments; About the Authors; About the Technical Editor; Foreword by Troels Oerting; Foreword by Robert P. Lockhart; Introduction; Book overview and key learning points; Book audience; Diagrams and Figures; What's in the Book; References; Chapter 1. What is the Smart Grid?; Energy demands; Grid resilience; Environmental performance; Operational efficiencies; Common components of the Smart Grid; Pitfalls of the Smart Grid; Summary; References; Chapter 2. Smart Grid Network Architecture; Bulk and distributed generation architectures. | |
505 | 8 | |a Transmission and distribution architectureAdvanced metering architecture; In-home systems; Microgrids; System interdependencies; Protocols; Summary; References; Chapter 3. Hacking the Smart Grid; Motive; Identifying a target; Vulnerability; Attack tools; Attack methods; Summary; References; Chapter 4. Privacy Concerns with the Smart Grid; Personal data; References; Chapter 5. Security Models for SCADA, ICS, and Smart Grid; NISTIR 7628 Smart Grid cyber security architecture; EU M/490 and the SGCG reference architecture for the Smart Grid. | |
505 | 8 | |a IEEE 2030-2011 Smart Grid power system, communication technology, and information technology reference diagramsISA-62443 (also known as ISA-SP99): zones and conduits and Smart Grids; Mapping security requirements to Smart Grid environments; A simplified Smart Grid reference model; Summary; References; Chapter 6. Securing the Smart Grid; Implementing security control within Smart Grid endpoints; Establishing strong boundaries and zone separation; Protecting data and applications within the Smart Grid; Situational awareness; Use case: defending against Shamoon; Summary; References. | |
505 | 8 | |a Chapter 7. Securing the Supply ChainSmart Grid supply chain; References; Chapter 8. The Future of the Grid; The challenge of making predictions; Value of personal data; Future cyber security considerations; The future of cyber security countermeasures; Summary; References; Appendix A. Reference Models and Architectures; Smart Grid cyber security reference model; Smart Grid cyber security design template; Generation cyber security reference model (detail); Generation cyber security design template (detail); NISTIR 7628 guidelines for Smart Grid cyber security. | |
505 | 8 | |a SGCG reference architecture for the Smart GridApplying endpoint security controls; Applying network security controls; Applying data integrity and protection controls; References; Appendix B. Continued Reading; Smart Grid Security: An end-to-end view of security in the new electrical grid, by Gilbert N. Sorebo and Michael C. Echols; Industrial Network Security: Securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems, by Eric D. Knapp; Securing the Smart Grid: Next generation power grid security, by Tony Flick and Justin Morehouse. | |
500 | |a Smart Grid: Integrating renewable, distributed, and efficient energy, by Fereidoon P. Sioshansi. | ||
520 | |a Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The ""Smart Grid"" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of t. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Smart power grids |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Réseaux électriques intelligents |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Electrical. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
700 | 1 | |a Samani, Raj. | |
758 | |i has work: |a Applied Cyber Security and the Smart Grid (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFvvxdVgXMJdw4GRc7Q7BP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Knapp, Eric D. |t Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure. |d Burlington : Elsevier Science, ©2013 |z 9781597499989 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=486628 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597499989 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL1115187 | ||
938 | |a EBSCOhost |b EBSC |n 486628 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis25154902 | ||
938 | |a YBP Library Services |b YANK |n 10358100 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn830170155 |
---|---|
_version_ | 1816882225462902784 |
adam_text | |
any_adam_object | |
author | Knapp, Eric D. |
author2 | Samani, Raj |
author2_role | |
author2_variant | r s rs |
author_additional | Troels Oerting -- Robert P. Lockhart -- |
author_facet | Knapp, Eric D. Samani, Raj |
author_role | |
author_sort | Knapp, Eric D. |
author_variant | e d k ed edk |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK3105 |
callnumber-raw | TK3105 .K63 2013 |
callnumber-search | TK3105 .K63 2013 |
callnumber-sort | TK 43105 K63 42013 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover image; Title page; Table of Contents; Copyright; Acknowledgments; About the Authors; About the Technical Editor; Foreword by Troels Oerting; Foreword by Robert P. Lockhart; Introduction; Book overview and key learning points; Book audience; Diagrams and Figures; What's in the Book; References; Chapter 1. What is the Smart Grid?; Energy demands; Grid resilience; Environmental performance; Operational efficiencies; Common components of the Smart Grid; Pitfalls of the Smart Grid; Summary; References; Chapter 2. Smart Grid Network Architecture; Bulk and distributed generation architectures. Transmission and distribution architectureAdvanced metering architecture; In-home systems; Microgrids; System interdependencies; Protocols; Summary; References; Chapter 3. Hacking the Smart Grid; Motive; Identifying a target; Vulnerability; Attack tools; Attack methods; Summary; References; Chapter 4. Privacy Concerns with the Smart Grid; Personal data; References; Chapter 5. Security Models for SCADA, ICS, and Smart Grid; NISTIR 7628 Smart Grid cyber security architecture; EU M/490 and the SGCG reference architecture for the Smart Grid. IEEE 2030-2011 Smart Grid power system, communication technology, and information technology reference diagramsISA-62443 (also known as ISA-SP99): zones and conduits and Smart Grids; Mapping security requirements to Smart Grid environments; A simplified Smart Grid reference model; Summary; References; Chapter 6. Securing the Smart Grid; Implementing security control within Smart Grid endpoints; Establishing strong boundaries and zone separation; Protecting data and applications within the Smart Grid; Situational awareness; Use case: defending against Shamoon; Summary; References. Chapter 7. Securing the Supply ChainSmart Grid supply chain; References; Chapter 8. The Future of the Grid; The challenge of making predictions; Value of personal data; Future cyber security considerations; The future of cyber security countermeasures; Summary; References; Appendix A. Reference Models and Architectures; Smart Grid cyber security reference model; Smart Grid cyber security design template; Generation cyber security reference model (detail); Generation cyber security design template (detail); NISTIR 7628 guidelines for Smart Grid cyber security. SGCG reference architecture for the Smart GridApplying endpoint security controls; Applying network security controls; Applying data integrity and protection controls; References; Appendix B. Continued Reading; Smart Grid Security: An end-to-end view of security in the new electrical grid, by Gilbert N. Sorebo and Michael C. Echols; Industrial Network Security: Securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems, by Eric D. Knapp; Securing the Smart Grid: Next generation power grid security, by Tony Flick and Justin Morehouse. Foreword / What is the Smart Grid? -- Smart Grid Network Architecture -- Hacking the Smart Grid -- Privacy Concerns with the Smart Grid -- Security Models for SCADA, ICS, and Smart Grid -- Securing the Smart Grid -- Securing the Supply Chain -- The Future of the Grid -- Reference Models and Architectures -- Continued Reading. |
ctrlnum | (OCoLC)830170155 |
dewey-full | 621.31028558 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.31028558 |
dewey-search | 621.31028558 |
dewey-sort | 3621.31028558 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06534cam a2200577Mi 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn830170155</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">130316s2013 vtu o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">N$T</subfield><subfield code="d">IDEBK</subfield><subfield code="d">YDXCP</subfield><subfield code="d">ZMC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ICA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCF</subfield><subfield code="d">U3W</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">LND</subfield><subfield code="d">ICG</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">LEAUB</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124046382</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">012404638X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)830170155</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK3105 .K63 2013</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">007000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">621.31028558</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Knapp, Eric D.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied Cyber Security and the Smart Grid :</subfield><subfield code="b">Implementing Security Controls into the Modern Power Infrastructure.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Burlington :</subfield><subfield code="b">Elsevier Science,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (435 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Foreword /</subfield><subfield code="r">Troels Oerting --</subfield><subfield code="t">Foreword /</subfield><subfield code="r">Robert P. Lockhart --</subfield><subfield code="t">What is the Smart Grid? --</subfield><subfield code="t">Smart Grid Network Architecture --</subfield><subfield code="t">Hacking the Smart Grid --</subfield><subfield code="t">Privacy Concerns with the Smart Grid --</subfield><subfield code="t">Security Models for SCADA, ICS, and Smart Grid --</subfield><subfield code="t">Securing the Smart Grid --</subfield><subfield code="t">Securing the Supply Chain --</subfield><subfield code="t">The Future of the Grid --</subfield><subfield code="g">Appendix A.</subfield><subfield code="t">Reference Models and Architectures --</subfield><subfield code="g">Appendix B.</subfield><subfield code="t">Continued Reading.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover image; Title page; Table of Contents; Copyright; Acknowledgments; About the Authors; About the Technical Editor; Foreword by Troels Oerting; Foreword by Robert P. Lockhart; Introduction; Book overview and key learning points; Book audience; Diagrams and Figures; What's in the Book; References; Chapter 1. What is the Smart Grid?; Energy demands; Grid resilience; Environmental performance; Operational efficiencies; Common components of the Smart Grid; Pitfalls of the Smart Grid; Summary; References; Chapter 2. Smart Grid Network Architecture; Bulk and distributed generation architectures.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Transmission and distribution architectureAdvanced metering architecture; In-home systems; Microgrids; System interdependencies; Protocols; Summary; References; Chapter 3. Hacking the Smart Grid; Motive; Identifying a target; Vulnerability; Attack tools; Attack methods; Summary; References; Chapter 4. Privacy Concerns with the Smart Grid; Personal data; References; Chapter 5. Security Models for SCADA, ICS, and Smart Grid; NISTIR 7628 Smart Grid cyber security architecture; EU M/490 and the SGCG reference architecture for the Smart Grid.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">IEEE 2030-2011 Smart Grid power system, communication technology, and information technology reference diagramsISA-62443 (also known as ISA-SP99): zones and conduits and Smart Grids; Mapping security requirements to Smart Grid environments; A simplified Smart Grid reference model; Summary; References; Chapter 6. Securing the Smart Grid; Implementing security control within Smart Grid endpoints; Establishing strong boundaries and zone separation; Protecting data and applications within the Smart Grid; Situational awareness; Use case: defending against Shamoon; Summary; References.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 7. Securing the Supply ChainSmart Grid supply chain; References; Chapter 8. The Future of the Grid; The challenge of making predictions; Value of personal data; Future cyber security considerations; The future of cyber security countermeasures; Summary; References; Appendix A. Reference Models and Architectures; Smart Grid cyber security reference model; Smart Grid cyber security design template; Generation cyber security reference model (detail); Generation cyber security design template (detail); NISTIR 7628 guidelines for Smart Grid cyber security.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">SGCG reference architecture for the Smart GridApplying endpoint security controls; Applying network security controls; Applying data integrity and protection controls; References; Appendix B. Continued Reading; Smart Grid Security: An end-to-end view of security in the new electrical grid, by Gilbert N. Sorebo and Michael C. Echols; Industrial Network Security: Securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems, by Eric D. Knapp; Securing the Smart Grid: Next generation power grid security, by Tony Flick and Justin Morehouse.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Smart Grid: Integrating renewable, distributed, and efficient energy, by Fereidoon P. Sioshansi.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The ""Smart Grid"" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of t.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Smart power grids</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux électriques intelligents</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Electrical.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samani, Raj.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Applied Cyber Security and the Smart Grid (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFvvxdVgXMJdw4GRc7Q7BP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Knapp, Eric D.</subfield><subfield code="t">Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure.</subfield><subfield code="d">Burlington : Elsevier Science, ©2013</subfield><subfield code="z">9781597499989</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=486628</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597499989</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1115187</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">486628</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis25154902</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">10358100</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn830170155 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:25:14Z |
institution | BVB |
isbn | 9780124046382 012404638X |
language | English |
oclc_num | 830170155 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (435 pages) |
psigel | ZDB-4-EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Elsevier Science, |
record_format | marc |
spelling | Knapp, Eric D. Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure. Burlington : Elsevier Science, 2013. 1 online resource (435 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Foreword / Troels Oerting -- Foreword / Robert P. Lockhart -- What is the Smart Grid? -- Smart Grid Network Architecture -- Hacking the Smart Grid -- Privacy Concerns with the Smart Grid -- Security Models for SCADA, ICS, and Smart Grid -- Securing the Smart Grid -- Securing the Supply Chain -- The Future of the Grid -- Appendix A. Reference Models and Architectures -- Appendix B. Continued Reading. Cover image; Title page; Table of Contents; Copyright; Acknowledgments; About the Authors; About the Technical Editor; Foreword by Troels Oerting; Foreword by Robert P. Lockhart; Introduction; Book overview and key learning points; Book audience; Diagrams and Figures; What's in the Book; References; Chapter 1. What is the Smart Grid?; Energy demands; Grid resilience; Environmental performance; Operational efficiencies; Common components of the Smart Grid; Pitfalls of the Smart Grid; Summary; References; Chapter 2. Smart Grid Network Architecture; Bulk and distributed generation architectures. Transmission and distribution architectureAdvanced metering architecture; In-home systems; Microgrids; System interdependencies; Protocols; Summary; References; Chapter 3. Hacking the Smart Grid; Motive; Identifying a target; Vulnerability; Attack tools; Attack methods; Summary; References; Chapter 4. Privacy Concerns with the Smart Grid; Personal data; References; Chapter 5. Security Models for SCADA, ICS, and Smart Grid; NISTIR 7628 Smart Grid cyber security architecture; EU M/490 and the SGCG reference architecture for the Smart Grid. IEEE 2030-2011 Smart Grid power system, communication technology, and information technology reference diagramsISA-62443 (also known as ISA-SP99): zones and conduits and Smart Grids; Mapping security requirements to Smart Grid environments; A simplified Smart Grid reference model; Summary; References; Chapter 6. Securing the Smart Grid; Implementing security control within Smart Grid endpoints; Establishing strong boundaries and zone separation; Protecting data and applications within the Smart Grid; Situational awareness; Use case: defending against Shamoon; Summary; References. Chapter 7. Securing the Supply ChainSmart Grid supply chain; References; Chapter 8. The Future of the Grid; The challenge of making predictions; Value of personal data; Future cyber security considerations; The future of cyber security countermeasures; Summary; References; Appendix A. Reference Models and Architectures; Smart Grid cyber security reference model; Smart Grid cyber security design template; Generation cyber security reference model (detail); Generation cyber security design template (detail); NISTIR 7628 guidelines for Smart Grid cyber security. SGCG reference architecture for the Smart GridApplying endpoint security controls; Applying network security controls; Applying data integrity and protection controls; References; Appendix B. Continued Reading; Smart Grid Security: An end-to-end view of security in the new electrical grid, by Gilbert N. Sorebo and Michael C. Echols; Industrial Network Security: Securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems, by Eric D. Knapp; Securing the Smart Grid: Next generation power grid security, by Tony Flick and Justin Morehouse. Smart Grid: Integrating renewable, distributed, and efficient energy, by Fereidoon P. Sioshansi. Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The ""Smart Grid"" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of t. Print version record. Smart power grids Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux électriques intelligents Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. TECHNOLOGY & ENGINEERING Electrical. bisacsh Computer networks Security measures fast Samani, Raj. has work: Applied Cyber Security and the Smart Grid (Text) https://id.oclc.org/worldcat/entity/E39PCFvvxdVgXMJdw4GRc7Q7BP https://id.oclc.org/worldcat/ontology/hasWork Print version: Knapp, Eric D. Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure. Burlington : Elsevier Science, ©2013 9781597499989 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=486628 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597499989 Volltext |
spellingShingle | Knapp, Eric D. Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure. Cover image; Title page; Table of Contents; Copyright; Acknowledgments; About the Authors; About the Technical Editor; Foreword by Troels Oerting; Foreword by Robert P. Lockhart; Introduction; Book overview and key learning points; Book audience; Diagrams and Figures; What's in the Book; References; Chapter 1. What is the Smart Grid?; Energy demands; Grid resilience; Environmental performance; Operational efficiencies; Common components of the Smart Grid; Pitfalls of the Smart Grid; Summary; References; Chapter 2. Smart Grid Network Architecture; Bulk and distributed generation architectures. Transmission and distribution architectureAdvanced metering architecture; In-home systems; Microgrids; System interdependencies; Protocols; Summary; References; Chapter 3. Hacking the Smart Grid; Motive; Identifying a target; Vulnerability; Attack tools; Attack methods; Summary; References; Chapter 4. Privacy Concerns with the Smart Grid; Personal data; References; Chapter 5. Security Models for SCADA, ICS, and Smart Grid; NISTIR 7628 Smart Grid cyber security architecture; EU M/490 and the SGCG reference architecture for the Smart Grid. IEEE 2030-2011 Smart Grid power system, communication technology, and information technology reference diagramsISA-62443 (also known as ISA-SP99): zones and conduits and Smart Grids; Mapping security requirements to Smart Grid environments; A simplified Smart Grid reference model; Summary; References; Chapter 6. Securing the Smart Grid; Implementing security control within Smart Grid endpoints; Establishing strong boundaries and zone separation; Protecting data and applications within the Smart Grid; Situational awareness; Use case: defending against Shamoon; Summary; References. Chapter 7. Securing the Supply ChainSmart Grid supply chain; References; Chapter 8. The Future of the Grid; The challenge of making predictions; Value of personal data; Future cyber security considerations; The future of cyber security countermeasures; Summary; References; Appendix A. Reference Models and Architectures; Smart Grid cyber security reference model; Smart Grid cyber security design template; Generation cyber security reference model (detail); Generation cyber security design template (detail); NISTIR 7628 guidelines for Smart Grid cyber security. SGCG reference architecture for the Smart GridApplying endpoint security controls; Applying network security controls; Applying data integrity and protection controls; References; Appendix B. Continued Reading; Smart Grid Security: An end-to-end view of security in the new electrical grid, by Gilbert N. Sorebo and Michael C. Echols; Industrial Network Security: Securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems, by Eric D. Knapp; Securing the Smart Grid: Next generation power grid security, by Tony Flick and Justin Morehouse. Foreword / What is the Smart Grid? -- Smart Grid Network Architecture -- Hacking the Smart Grid -- Privacy Concerns with the Smart Grid -- Security Models for SCADA, ICS, and Smart Grid -- Securing the Smart Grid -- Securing the Supply Chain -- The Future of the Grid -- Reference Models and Architectures -- Continued Reading. Smart power grids Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux électriques intelligents Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. TECHNOLOGY & ENGINEERING Electrical. bisacsh Computer networks Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 |
title | Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure. |
title_alt | Foreword / What is the Smart Grid? -- Smart Grid Network Architecture -- Hacking the Smart Grid -- Privacy Concerns with the Smart Grid -- Security Models for SCADA, ICS, and Smart Grid -- Securing the Smart Grid -- Securing the Supply Chain -- The Future of the Grid -- Reference Models and Architectures -- Continued Reading. |
title_auth | Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure. |
title_exact_search | Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure. |
title_full | Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure. |
title_fullStr | Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure. |
title_full_unstemmed | Applied Cyber Security and the Smart Grid : Implementing Security Controls into the Modern Power Infrastructure. |
title_short | Applied Cyber Security and the Smart Grid : |
title_sort | applied cyber security and the smart grid implementing security controls into the modern power infrastructure |
title_sub | Implementing Security Controls into the Modern Power Infrastructure. |
topic | Smart power grids Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux électriques intelligents Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. TECHNOLOGY & ENGINEERING Electrical. bisacsh Computer networks Security measures fast |
topic_facet | Smart power grids Security measures. Computer networks Security measures. Réseaux électriques intelligents Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. TECHNOLOGY & ENGINEERING Electrical. Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=486628 https://www.sciencedirect.com/science/book/9781597499989 |
work_keys_str_mv | AT knappericd appliedcybersecurityandthesmartgridimplementingsecuritycontrolsintothemodernpowerinfrastructure AT samaniraj appliedcybersecurityandthesmartgridimplementingsecuritycontrolsintothemodernpowerinfrastructure |