語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security strategy that should be ado...
~
Gerra, Arun.
FindBook
Google Book
Amazon
博客來
Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry./
作者:
Gerra, Arun.
面頁冊數:
83 p.
附註:
Source: Masters Abstracts International, Volume: 49-01, page: 6720.
Contained By:
Masters Abstracts International49-01.
標題:
Information Technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1481134
ISBN:
9781124222189
Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry.
Gerra, Arun.
Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry.
- 83 p.
Source: Masters Abstracts International, Volume: 49-01, page: 6720.
Thesis (M.S.)--University of Colorado at Boulder, 2010.
It is important for Power Industry to understand the serious consequences of cyber-attacks before deploying Smart Grid Technology. Smart Grid has taken edge over couple of years; utilities have already begun experimenting with the technology without any defined industry security standards in place for the technology. Power industry cannot reap the benefits of smart grid unless they plan on securing it at every phase of its deployment. Lack of security in Industrial Control Systems (ICS), deployment of Advanced Metering Infrastructure (AMI), real-time interaction with consumers using smart meters, etc. will expose the power grid to cyber-attacks ranging from information systems to control systems. To prevent the cyber-attacks on power industry deploying smart grid, there is a need to build a strategy that incorporates both the Power and IT industry, there has to be understanding with respect to both of their operations, needs, roles, and responsibilities.
ISBN: 9781124222189Subjects--Topical Terms:
1030799
Information Technology.
Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry.
LDR
:02967nam a2200301 4500
001
1968234
005
20141203120916.5
008
150210s2010 ||||||||||||||||| ||eng d
020
$a
9781124222189
035
$a
(MiAaPQ)AAI1481134
035
$a
AAI1481134
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Gerra, Arun.
$3
2105374
245
1 0
$a
Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry.
300
$a
83 p.
500
$a
Source: Masters Abstracts International, Volume: 49-01, page: 6720.
500
$a
Adviser: Frank Barnes.
502
$a
Thesis (M.S.)--University of Colorado at Boulder, 2010.
520
$a
It is important for Power Industry to understand the serious consequences of cyber-attacks before deploying Smart Grid Technology. Smart Grid has taken edge over couple of years; utilities have already begun experimenting with the technology without any defined industry security standards in place for the technology. Power industry cannot reap the benefits of smart grid unless they plan on securing it at every phase of its deployment. Lack of security in Industrial Control Systems (ICS), deployment of Advanced Metering Infrastructure (AMI), real-time interaction with consumers using smart meters, etc. will expose the power grid to cyber-attacks ranging from information systems to control systems. To prevent the cyber-attacks on power industry deploying smart grid, there is a need to build a strategy that incorporates both the Power and IT industry, there has to be understanding with respect to both of their operations, needs, roles, and responsibilities.
520
$a
The purpose of this thesis is to fill the gap between the need of power industry incorporating information technology bearing in mind the cyber security issues. This document proposes the need for creating boundaries to reduce the risks of cyber-attacks during and after deploying smart grid technology using proposed security strategy framework.
520
$a
The boundaries were created after taking into consideration the sources of information that can help smart grid achieve its goals along with the need for demand-response, peak loads since smart grid requires modernization of transmission and distribution systems. After creating boundaries, each segment was analyzed on the basis of what systems or assets are needed to keep the power grid active, risk and impact these assets have on power grid, and how to mitigate or reduce these risks. After planning protection in place for critical segments, and securing being a continuous process there is need for monitoring and analyzing the complete grid with respect to grid stability, intrusion detection, and operations.
590
$a
School code: 0051.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0489
690
$a
0544
710
2
$a
University of Colorado at Boulder.
$b
Telecommunications.
$3
1030579
773
0
$t
Masters Abstracts International
$g
49-01.
790
$a
0051
791
$a
M.S.
792
$a
2010
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1481134
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9263240
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入