Securing the electric power infrastructure

被引:1
|
作者
Katz, J. S. [1 ]
Allor, P. G. [2 ]
Dougherty, S. A. [3 ]
Duffy, S. P. [4 ]
Riccetti, S. [5 ]
Chantz, H. D. [6 ]
Kisch, M. [7 ]
Oxford, B. S. [8 ]
Snowdon, J. L. [9 ]
机构
[1] IBM Commun Sect, Global Staff, Hartford, CT 06103 USA
[2] IBM Secur Strategy, Atlanta, GA 30328 USA
[3] IBM Secur Energy & Util Ctr Competency, Sacramento, CA 95833 USA
[4] IBM Crit Infrastruct Secur Serv, Bedford, NH 03110 USA
[5] IBM Secur Serv, I-20090 Milan, Italy
[6] IBM Secur Risk & Compliance Serv, Armonk, NY 10504 USA
[7] IBM Ind Secur, D-50968 Cologne, Germany
[8] IBM Crit Infrastruct Secur Serv, Columbia, SC 29201 USA
[9] US Fed, Washington, DC 20005 USA
关键词
GRID SECURITY;
D O I
10.1147/JRD.2015.2498819
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smarter electrical power systems-which include the addition of local intelligence in transmission and distribution substations, intelligent electrical devices, and computerized control systems in generating plants-collectively provide additional resilience in the electricity production and consumption chain. As part of national critical infrastructure, this set of computing and network capabilities requires careful thought regarding cybersecurity as part of the overall system architecture and development. This paper provides a summary of current security engineering in the power system. Further, it addresses recent project developments from IBM on security of the electrical infrastructure. The real-time and distributed nature of the power grid is unique in its breadth of potential security issues. Actions from the U.S. Federal Government, beginning in 1996 and more recently in 2012, to identify the energy industry as the most popular threat target and thus encourage appropriate security practices testify to the importance of grid security. The European Union has reacted similarly. In this paper, we also provide a discussion of the resilience of the grid from a reliability perspective, as well as maintaining the physical security of electrical grid equipment.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Securing the infrastructure and the workloads of linux containers
    Mattetti, Massimiliano
    Shulman-Peleg, Alexandra
    Allouche, Yair
    Corradi, Antonio
    Dolev, Shlomi
    Foschini, Luca
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 559 - 567
  • [32] Securing Critical Infrastructure with Smart Grids
    Niglia, Alessandro
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2017, : 223 - 225
  • [33] Securing Cloud Infrastructure through PKI
    Ijaz, Imran
    Aslam, Abroo
    Bukhari, Bushra
    Javed, Rabia
    Anees, Sumaira
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [34] Progress Toward Securing the Routing Infrastructure
    Murphy, Sandra
    Weiler, Samuel
    CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 39 - 48
  • [35] Securing IoT Surveillance Airport Infrastructure
    Aranzazu-Suescun, Catalina
    Zapata-Rivera, Luis Felipe
    Saenz, Owen Guerra-Mondragon
    Christensen, Jacob Michael
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [36] Securing the Information Infrastructure for EV Charging
    van den Broek, Fabian
    Poll, Erik
    Vieira, Barbara
    WIRELESS AND SATELLITE SYSTEMS (WISATS 2015), 2015, 154 : 61 - 74
  • [37] Securing Cellular Infrastructure Challenges and Opportunities
    Traynor, Patrick
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 77 - 79
  • [38] Who is responsible for securing critical infrastructure?
    Everett C.
    Computer Fraud and Security, 2010, 2010 (10): : 5 - 8
  • [39] The SCADA challenge: securing critical infrastructure
    Gold, Steve
    Network Security, 2009, 2009 (08): : 18 - 20
  • [40] Distributing the cost of securing a transportation infrastructure
    Chawathe, Sudarshan S.
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 596 - 601