Preview

Cyber Security

Good Essays
Open Document
Open Document
1903 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security
CYBER-PHYSICAL SYSTEMS SECURITY FOR THE SMART GRID
A. C´ardenas , R. Moreno, “Cyber-Physical Systems security for the Smart Grid,” CPS Workshop 2011.

         

The authors focus on giving a brief overview of why traditional security mechanisms for power systems are inadequate and the need for CPS security. They briefly describe the functional areas of the grid: State estimation-need for SE, mathematically modeling it, testing bad measurements. Constructing the network topology based on data from sensors. Electricity markets-describing the need and the association with SE. Control signals sent to automatic devices/equipment in the grid , based on processed data. The work surveyed is mainly about false data injection attacks and defense at different functional stages of the power systems if present and they open discussions . The authors in a broad sense describe only the principle of the works. They discuss limitations that they find in the works that have surveyed and talk about problems and challenges that have not been covered in literature previously. The authors do not provide a specific solution to the security problem , however, they provide general suggestions on what CPS defense mechanisms could focus on.

FUNCTIONS IN THE CYBER LAYER OF THE GRID
 Collecting information from sensors and constructing a model.  State estimation of the power system based on measurements Computation and delivery of LMPs(Locational marginal pricing (LMP) is a mechanism for using market-based prices for managing transmission congestion .It involves the marginal cost of supplying ,at least cost, t he next increment of electric demand at a location along with other factors.) for electricity markets  Transmission automation-control signals sent to automated devices in the grid  The authors survey recent work, find limitations and present them.  They discuss open problems and challenges in new research in areas of EMS that have not been considered

You May Also Find These Documents Helpful

  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The Department of Homeland Security are wide-ranging, and their goal is clear: “A safer, more secure America, which is resilient against terrorism and other potential threats.” The three key concepts form the foundation of our national homeland security strategy designed to achieve this vision: The three are as follows 1) Security 2), Resilience 3), Custom and Exchange. These concepts drive broad areas of activity that the Quadrennial Homeland Security Review (QHSR) process defines as homeland security missions. It prevent, to protect, to respond, and recover, as well as to build in security, to ensure resilience, and to facilitate customs and exchange. The responsibility falls on hundreds of thousands of people from across the federal government, state, local, tribal, and territorial…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Electric grids, power plants, hospitals, etc., rely largely on computers and the internet to store and access data. If the security to these facilities are breached, skewed data and power outages are a real possibility. Therefore, it could lead to serious economic problems, and possibly, even death. With all that said, cyberwarfare is not something to be taken lightly, in fact, the dangers are extremely significant. Additionally, since technology is so prominent, it is a convenient method of…

    • 445 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Bibliography: Kim, David and Michael G. Solomon. “Fundamentals of Information Systems Security.”, 15-42. Sunbury, MA: jones and Bartlett Learning, 2012.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    National Airspace System

    • 1022 Words
    • 5 Pages

    • Williams, James H. (February 2011). National Airspace System Security Cyber Architecture. Retrieved March 16, 2013 from The Mitre Corporation website: http://www.mitre.org/work/tech_papers/2011/10_4169/10_4169.pdf…

    • 1022 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    In the physical control simulation for the Magnolia Utility Citizen’s Cooperative I had to survey the entire building’s structure thoroughly and interviewed the staff while in their working environments for the best data for the physical control form needed for the completion of the project for Magnolia V.P of finance for the project's approval. From the visual standpoint the challenge of improving the reliability of the physical networked infrastructures presents us with significant analytical and decision-making complexities, with both technical and policy relevant dimensions. In this security survey I will be using predominantly examples from the staff’s interviews and other security elapses that present two perspectives on these complexities. First is to present critical human error infrastructures as complex adaptive systems, which share certain characteristics that policy makers and managers need to account for. Secondly, the balance of the paper outlines will focus on improvements of the analytical and decision-making complexity, and presents the research and policy-making agendas that need to be addressed if we are to significantly improve the reliability of physical infrastructures.…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize the major security concerns associated with these systems and steps than can be taken to enhance their…

    • 1137 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Computer Security

    • 549 Words
    • 3 Pages

    In discussing crime trends, it is important to understand the economic and political factors at the time that may have influenced the crime rate (example: economic recession; war; economic prosperity; etc). What variety of factors do you think influence the crime rate? Where do you think crime is most prevalent and why? In your postings be certain to discuss the issues of race, class, and gender.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cyberslacking

    • 387 Words
    • 2 Pages

    “A recent survey sponsored by the American Management Association and the ePolicy Institute reported that more than one-quarter of employers have fired employees for the misuse of email, and about one-third have fired employees for misusing the Internet”, stated by the authors Ivancevich, J., Konopaske R., Matteson, M., (2011)(p.229). Chapter 8 discusses different misbehaviors in the job environment. One of those misbehaviors is cyberslacking; this term is referred to employees who surf the internet, while at work for personal reasons such as: “Viewing pornographic sites and news sites, shopping, stock trading, vacation planning, gaming, chatting, in other words, engaging in general non-business Internet activities on company time and using company resources”, stated W. Block (2001)(p.33).…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber Threats

    • 1222 Words
    • 4 Pages

    Every day advances in technology happen. In the last few decades, computer technology has advanced past many technological barriers. Almost every aspect of everyone’s life has some dealing with computers in it. With all this being said, computer cyber threats are on a rise in every economy in the world. Cyber threats in America, have caused the government to try and control American internet access, have cost American’s a lot of money, and have everyone worried about the many infrastructures that are ran by the cyberspace, from being attacked.…

    • 1222 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 874 Words
    • 4 Pages

    A threat agent is the facilitator of an attack however; a threat is a constant danger to an asset.…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Cyber Security

    • 635 Words
    • 3 Pages

    The Merriam-Webster’s Dictionary defines cyber security measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Most people think that hackers are just people that want to mess up your computer, but real hackers break into systems because they want to see what they can do, then they might leave a message on the victims computer, but that’s it. So, the computer security people protect from those other hackers that want to mess up peoples computers. The means we take can as individual to protect ourselves in the cyber world is be anyomous on websites, don’t post your personal information ,have virus protection install on your computer, get spy ware , get spam guard protect towards your email accounts, and have firewall software protection on your computer.…

    • 635 Words
    • 3 Pages
    Good Essays
  • Better Essays

    One of the issues that should be considered when developing a smart grid is the cost. According to Laudon & Laudon (2012), estimated costs are running as high as seventy-five billion dollars and the cost of each meter is estimated to costs between two hundred fifty to five hundred dollars. Before spending this much money, energy companies must consider the consumer’s willingness to foot the bill. The privacy issue must…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    1) How do smart grids differ from the current electricity infrastructure in the United States?…

    • 812 Words
    • 4 Pages
    Good Essays