Cyber Security Management and the Smart Grid: A Case Study

Verified

Added on  2022/10/11

|19
|1135
|45
Presentation
AI Summary
This presentation analyzes cyber security management within the context of smart grids, with a specific focus on the Brazilian energy utility sector. The presentation begins by introducing the importance of energy and the smart grid system, highlighting its complexities and vulnerabilities. It defines the cyber environment and critical cyber assets, outlining the goals of a smart grid system and its associated risks. The presentation delves into the MNG (Management, Normative, Governance) model, explaining its role in protecting cyber assets and environments. The methodology involves the Delphi technique to create a theoretical and methodological model, followed by data collection, statistical analysis, and validation. The presentation also covers strategic planning, risk management, asset management, human resource management, and operational security. The conclusion emphasizes the need for active operational cyber security planning, detection, and response to vulnerabilities and threats within the Brazilian energy utility sector, emphasizing the importance of integrating cyber security into all aspects of smart grid operations.
Document Page
Cyber security
management
and the smart grid
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
Energy is an essential element for
sustainable development and social
inclusion.
The safety of a smart grids in the operational
and physical layers.
The supreme engineering achievement of
the 20th century (de Almeida, Moura and
Quaresma 2019)”
- National Academy of Engineering
Electric grid in Brazil
Document Page
The Smart Grid
The smart grid system is used for transmitting
electronic grid
The most largest and complex infrastructure
Distributed using monitoring, remote sensing,
and bidirectional communication
(Di Santo & et al 2015)
The electronic control system incorporates
telecommunication and information
technologies.
It keeps tracks entire energy value chain.
Document Page
Lack in electric grid
Centralized, natural gas, mainly cool and bulk generation
Responsible for producing 40% of human caused carbon di-oxide production
Predictable loads and controllable generation
Situational awareness and limited automation
Followed by customized proprietary methods
Lack of data (such as consumers data) to use and manage energy resource
Knowles & et al 2015
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber Environment and Critical Cyber Asset
Cyber environment is the cyber space in
which cyber threat actors conduct malicious
activity.
Criticality within the information reflects by
the criticality within the assets in the process
of data exchange, is referred to as critical
cyber assets.
Increase level of automation
Increase system intelligence
Document Page
Cyberspace and threats in organizational
environments
Communication network
Supports data control within the system
Actual physical process
Utilized internal network of computer
Utilize non critical operations
(Govinda, Shav and Prakash 2018)
Utilize administrative task
Document Page
Goals of Smart Grid System
Enables consumers to reduce use of energy
Ensure the operational efficiency
Improve security and reliability.
Performs dynamic operations and optimizing
resources towards cyber security.
Incorporating and developing real time
technologies.
Interactive and automatized technologies
Generate energy for peak shaving, and
advanced power storage (Mylrea 2017).
Facilitate atmosphere for electronic vehicles
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MNG (Management, Normative, Governance) model
MNG models refers approaches to provide protection to cyber assts
and cyber environment
-to protect system
-to protect information
-to protect network, from accidental and deliberate attacks
This model consists of a collection of policies, tools,
security concepts, guidelines, safeguards, risk management
methodologies,
trainng, actions, technologies and best practices
Document Page
Theoretical and methodological model
Document Page
Delphi Methodology
The technique originates from the
Identification of the empirical phenomenon
Synthesizing and constructing methodological path
Composing dimensions of theoretical methodological model
Validate instrument measurement and tested from Brazilian electric
utility sector
Apply statistics tests - sphericity, factor analysis, levene, varienec
analysis and Mann-Whithne
Structure and validate questionnaire
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Data collection
Description and identification of
dimensions
Composing cyber security management and
governance (Pardini, Heinisch. and Parreiras
2017)
Orientation concerning company
governance
Academics and institutional research for
management of cyber security
Data treatment
Statistical data are store on spreadsheet
using Survey Monket tool
Analysis of consequences of related
variables
Calculate the median and the quartiles]
Document Page
Validation of the methodology
Check adequateness of group of variables
Factor analysis of nine dimensions
Practicing or not practicing of variable utility
Importance of variable utility
Implications of variable performance
Decrease the risks factor
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]