Preview

Cyber Security

Good Essays
Open Document
Open Document
1903 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security
CYBER-PHYSICAL SYSTEMS SECURITY FOR THE SMART GRID
A. C´ardenas , R. Moreno, “Cyber-Physical Systems security for the Smart Grid,” CPS Workshop 2011.

         

The authors focus on giving a brief overview of why traditional security mechanisms for power systems are inadequate and the need for CPS security. They briefly describe the functional areas of the grid: State estimation-need for SE, mathematically modeling it, testing bad measurements. Constructing the network topology based on data from sensors. Electricity markets-describing the need and the association with SE. Control signals sent to automatic devices/equipment in the grid , based on processed data. The work surveyed is mainly about false data injection attacks and defense at different functional stages of the power systems if present and they open discussions . The authors in a broad sense describe only the principle of the works. They discuss limitations that they find in the works that have surveyed and talk about problems and challenges that have not been covered in literature previously. The authors do not provide a specific solution to the security problem , however, they provide general suggestions on what CPS defense mechanisms could focus on.

FUNCTIONS IN THE CYBER LAYER OF THE GRID
 Collecting information from sensors and constructing a model.  State estimation of the power system based on measurements Computation and delivery of LMPs(Locational marginal pricing (LMP) is a mechanism for using market-based prices for managing transmission congestion .It involves the marginal cost of supplying ,at least cost, t he next increment of electric demand at a location along with other factors.) for electricity markets  Transmission automation-control signals sent to automated devices in the grid  The authors survey recent work, find limitations and present them.  They discuss open problems and challenges in new research in areas of EMS that have not been considered

You May Also Find These Documents Helpful

  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    The Department of Homeland Security are wide-ranging, and their goal is clear: “A safer, more secure America, which is resilient against terrorism and other potential threats.” The three key concepts form the foundation of our national homeland security strategy designed to achieve this vision: The three are as follows 1) Security 2), Resilience 3), Custom and Exchange. These concepts drive broad areas of activity that the Quadrennial Homeland Security Review (QHSR) process defines as homeland security missions. It prevent, to protect, to respond, and recover, as well as to build in security, to ensure resilience, and to facilitate customs and exchange. The responsibility falls on hundreds of thousands of people from across the federal government, state, local, tribal, and territorial…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Bibliography: Kim, David and Michael G. Solomon. “Fundamentals of Information Systems Security.”, 15-42. Sunbury, MA: jones and Bartlett Learning, 2012.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    National Airspace System

    • 1022 Words
    • 5 Pages

    • Williams, James H. (February 2011). National Airspace System Security Cyber Architecture. Retrieved March 16, 2013 from The Mitre Corporation website: http://www.mitre.org/work/tech_papers/2011/10_4169/10_4169.pdf…

    • 1022 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Electric grids, power plants, hospitals, etc., rely largely on computers and the internet to store and access data. If the security to these facilities are breached, skewed data and power outages are a real possibility. Therefore, it could lead to serious economic problems, and possibly, even death. With all that said, cyberwarfare is not something to be taken lightly, in fact, the dangers are extremely significant. Additionally, since technology is so prominent, it is a convenient method of…

    • 445 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    Chen, P.-Y., Cheng, S.-M., & Chen, K.-C. (2012). Smart Attacks in Smart Grid Communication Networks. IEEE Communications Magazine, 50(8), 24-29.…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Computer Security

    • 810 Words
    • 4 Pages

    The difference between laws and ethics is laws are mandated and ethics are the basis of laws and the “right or wrongs” a person believes in.…

    • 810 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Security

    • 368 Words
    • 2 Pages

    I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace, prevention always has been my goal. I have security protection in place against attacks such as viruses, spam, malware, spyware, and adware and I ensure that the protection is up-to-date as it is essential part of prevention is to remain current. Other security measures an average user may do is to maintain their system is to allow Microsoft Windows to perform automatic updates. These updates can provide additional security measures to the system info structure. Running regular maintenance such as a system defragmentation will keep the system up-to-date and in proper order. The average user should also password protect their personal information. If the wireless network James used had been password protected James would not have had the opportunity to enter the network without first inputting the password.. I would feel violated to know that someone was using my wireless network without my authorization I would be horrified to know that individual was plundering through my private things. Securing a personal computer and a wireless network with a password is extremely important otherwise the system is open and vulnerable toward an attack. Furthermore, James was placing himself at risk by entering an unknown unsecured network. When I review the network settings on my wireless network I am able to view data, websites and activity going through my network. I enjoy this feature because I am able to see what my children are doing when they are online. I teach my boys how to protect themselves while online. In the future I plan to remain aware of any potential treats and I will review any new…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cyberslacking

    • 387 Words
    • 2 Pages

    “A recent survey sponsored by the American Management Association and the ePolicy Institute reported that more than one-quarter of employers have fired employees for the misuse of email, and about one-third have fired employees for misusing the Internet”, stated by the authors Ivancevich, J., Konopaske R., Matteson, M., (2011)(p.229). Chapter 8 discusses different misbehaviors in the job environment. One of those misbehaviors is cyberslacking; this term is referred to employees who surf the internet, while at work for personal reasons such as: “Viewing pornographic sites and news sites, shopping, stock trading, vacation planning, gaming, chatting, in other words, engaging in general non-business Internet activities on company time and using company resources”, stated W. Block (2001)(p.33).…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber Threats

    • 1222 Words
    • 4 Pages

    Every day advances in technology happen. In the last few decades, computer technology has advanced past many technological barriers. Almost every aspect of everyone’s life has some dealing with computers in it. With all this being said, computer cyber threats are on a rise in every economy in the world. Cyber threats in America, have caused the government to try and control American internet access, have cost American’s a lot of money, and have everyone worried about the many infrastructures that are ran by the cyberspace, from being attacked.…

    • 1222 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 874 Words
    • 4 Pages

    A threat agent is the facilitator of an attack however; a threat is a constant danger to an asset.…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Cyber Security

    • 635 Words
    • 3 Pages

    The Merriam-Webster’s Dictionary defines cyber security measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Most people think that hackers are just people that want to mess up your computer, but real hackers break into systems because they want to see what they can do, then they might leave a message on the victims computer, but that’s it. So, the computer security people protect from those other hackers that want to mess up peoples computers. The means we take can as individual to protect ourselves in the cyber world is be anyomous on websites, don’t post your personal information ,have virus protection install on your computer, get spy ware , get spam guard protect towards your email accounts, and have firewall software protection on your computer.…

    • 635 Words
    • 3 Pages
    Good Essays
  • Better Essays

    One of the issues that should be considered when developing a smart grid is the cost. According to Laudon & Laudon (2012), estimated costs are running as high as seventy-five billion dollars and the cost of each meter is estimated to costs between two hundred fifty to five hundred dollars. Before spending this much money, energy companies must consider the consumer’s willingness to foot the bill. The privacy issue must…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    1) How do smart grids differ from the current electricity infrastructure in the United States?…

    • 812 Words
    • 4 Pages
    Good Essays