Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security strategy that should be ado...
~
Gerra, Arun.
Linked to FindBook
Google Book
Amazon
博客來
Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry./
Author:
Gerra, Arun.
Description:
83 p.
Notes:
Source: Masters Abstracts International, Volume: 49-01, page: 6720.
Contained By:
Masters Abstracts International49-01.
Subject:
Information Technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1481134
ISBN:
9781124222189
Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry.
Gerra, Arun.
Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry.
- 83 p.
Source: Masters Abstracts International, Volume: 49-01, page: 6720.
Thesis (M.S.)--University of Colorado at Boulder, 2010.
It is important for Power Industry to understand the serious consequences of cyber-attacks before deploying Smart Grid Technology. Smart Grid has taken edge over couple of years; utilities have already begun experimenting with the technology without any defined industry security standards in place for the technology. Power industry cannot reap the benefits of smart grid unless they plan on securing it at every phase of its deployment. Lack of security in Industrial Control Systems (ICS), deployment of Advanced Metering Infrastructure (AMI), real-time interaction with consumers using smart meters, etc. will expose the power grid to cyber-attacks ranging from information systems to control systems. To prevent the cyber-attacks on power industry deploying smart grid, there is a need to build a strategy that incorporates both the Power and IT industry, there has to be understanding with respect to both of their operations, needs, roles, and responsibilities.
ISBN: 9781124222189Subjects--Topical Terms:
1030799
Information Technology.
Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry.
LDR
:02967nam a2200301 4500
001
1968234
005
20141203120916.5
008
150210s2010 ||||||||||||||||| ||eng d
020
$a
9781124222189
035
$a
(MiAaPQ)AAI1481134
035
$a
AAI1481134
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Gerra, Arun.
$3
2105374
245
1 0
$a
Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry.
300
$a
83 p.
500
$a
Source: Masters Abstracts International, Volume: 49-01, page: 6720.
500
$a
Adviser: Frank Barnes.
502
$a
Thesis (M.S.)--University of Colorado at Boulder, 2010.
520
$a
It is important for Power Industry to understand the serious consequences of cyber-attacks before deploying Smart Grid Technology. Smart Grid has taken edge over couple of years; utilities have already begun experimenting with the technology without any defined industry security standards in place for the technology. Power industry cannot reap the benefits of smart grid unless they plan on securing it at every phase of its deployment. Lack of security in Industrial Control Systems (ICS), deployment of Advanced Metering Infrastructure (AMI), real-time interaction with consumers using smart meters, etc. will expose the power grid to cyber-attacks ranging from information systems to control systems. To prevent the cyber-attacks on power industry deploying smart grid, there is a need to build a strategy that incorporates both the Power and IT industry, there has to be understanding with respect to both of their operations, needs, roles, and responsibilities.
520
$a
The purpose of this thesis is to fill the gap between the need of power industry incorporating information technology bearing in mind the cyber security issues. This document proposes the need for creating boundaries to reduce the risks of cyber-attacks during and after deploying smart grid technology using proposed security strategy framework.
520
$a
The boundaries were created after taking into consideration the sources of information that can help smart grid achieve its goals along with the need for demand-response, peak loads since smart grid requires modernization of transmission and distribution systems. After creating boundaries, each segment was analyzed on the basis of what systems or assets are needed to keep the power grid active, risk and impact these assets have on power grid, and how to mitigate or reduce these risks. After planning protection in place for critical segments, and securing being a continuous process there is need for monitoring and analyzing the complete grid with respect to grid stability, intrusion detection, and operations.
590
$a
School code: 0051.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0489
690
$a
0544
710
2
$a
University of Colorado at Boulder.
$b
Telecommunications.
$3
1030579
773
0
$t
Masters Abstracts International
$g
49-01.
790
$a
0051
791
$a
M.S.
792
$a
2010
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1481134
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9263240
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login