logo

Cyber Security Term Paper 2022

   

Added on  2022-09-29

5 Pages838 Words36 Views
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author’s Note

CYBER SECURITY1
Wang, W. and Lu, Z., 2013. Cyber security in the smart grid: Survey and
challenges. Computer networks, 57(5), pp.1344-1371.
Smart Grid is the power system of next generation, which is considered as the evolutionary and
revolutionary governance of the existing power grid. With the coordination of the
communication technologies and the advance computing system, the smart city enhances the
reliability and the efficiency of the future power grid using the resources of renewable energy,
demand responses and the distributed intelligence. With the smart grid, cyber security is growing
for being critical concern as the electronic devices are interconnected with various networks with
the various power facilities. It has an impact on the reliability of the wide infrastructure. This this
paper, the survey of the cyber security concerns for the Smart Grid is presented. This paper
focuses on the discussion and review of the secure communication, security requirements, and
countermeasures of risks, network vulnerabilities, and safe protocol for the Smart Grid. This
paper aims to provide the profound understanding of the security risks and mitigation techniques
in Smart Grid and it focuses on the future research for the security of the Smart Grid.
Abawajy, J., 2014. User preference of cyber security awareness delivery
methods. Behaviour & Information Technology, 33(3), pp.237-248.
The programs and the operating system are protected in today’s world. The hackers have the
intention to change the system to human elements for breaking the information system of any
organization. There are various frequencies of the cyber-attacks, which is designed for taking the
benefits of any uncertain personnel that is increasing, as the information security of human factor
is not possible to understand. For countering the cyber-attacks, which are designed to exploit the
information system security chain, awareness of information security with the objective for
minimizing the security risks of the information system. This paper evaluates and discusses

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Strategies in Smart Grid Presentation 2022
|19
|1170
|27

Whale Optimization Algorithm-trained Artificial Neural Network Article 2022
|15
|8872
|22

Cyber Security Strategies in Smart Grid Name of the University Preliminary Report
|46
|10914
|50

Comparative Study for Secured Smart Grid Communications
|12
|4135
|412

Assignment On Analysis Of Research Paper
|8
|1581
|19

Cyber Security Management Assignment 2022
|19
|1135
|45