Cyber Security and Information Systems Information Analysis Center
ثبت نشده
چکیده
The Efficacy and Challenges of SCADA and Smart Grid Integration The advent and evolution of the Smart Grid initiative to improve the electric utility power infrastructure has brought with it a number of opportunities for improving efficiencies, but along with those benefits come challenges in the effort to assure safety, security, and reliability for utilities and consumers alike. One of the considerations in designing the capabilities of the Smart Grid is the integration of Supervisory Control and Data Acquisition (SCADA) systems to allow the utility to remotely monitor and control network devices as a means of achieving reliability and demand efficiencies for the utility as a whole. Given the ability of these systems to control the flow of electricity throughout the network, additional planning and forethought is required to ensure all possible measures for pre‐ venting compromise are considered. This work discusses the overall architecture(s) used today and some of the measures currently implemented to secure those architectures as they evolve. More importantly, it considers simplifying the complexity of implementing the many standards put forth by applicable standards and regulatory bodies as a means to achieve realistic governance.
منابع مشابه
The impact of information technology on health
Information Technology (IT) is the study of systems especially computers for storing, retrieving, and sending information. It uses any networking and other physical devices, infrastructures to secure and exchange all forms of electronic data. IT is used globally as a major portion of daily life and we use it nearly every day within organizations for many reasons. Our computers, mobile phones an...
متن کاملJingming Wang: Iteration Composition Analysis of Noninter-ference in Cyber
At present, a rather big challenge to model cyber-physical systems is to stand for the interactions between physical level and cyber level. Researchers are faced with the trouble in the analysis of information security property of noninterference in cyber-physical systems because of the physical components and behavior appended to cyber components and systems. A new method is put forward with P...
متن کاملJINGMING WANG et al: PARALLEL COMPOSITION ANALYSIS OF NON-INTERFERENCE IN CYBER
At present, a rather big challenge to model cyber-physical systems is to stand for the interactions between physical level and cyber level. Researchers are faced with the trouble in the analysis of information security property of noninterference in cyber-physical systems because of the physical components and behavior appended to cyber components and systems. A new method is put forward with P...
متن کاملA Systems Engineering Approach for Assured Cyber Systems
Systems Engineering (SE) has gained favor as a means to tame the complexity of modern systems, specifically the design, analysis, and development of complex systems. This paper describes a SE approach for system assurance of modern Information Technology (IT) centric “cyber systems”. In this paper, we discuss recent trends in information security towards the establishment of security patterns a...
متن کاملAn Authorization Framework for Database Systems
Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...
متن کاملCritical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)
The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...
متن کامل