Cyber Security Management and the Smart Grid: A Case Study

Verified

Added on  2022/10/11

|19
|1135
|45
Presentation
AI Summary
This presentation analyzes cyber security management within the context of smart grids, with a specific focus on the Brazilian energy utility sector. The presentation begins by introducing the importance of energy and the smart grid system, highlighting its complexities and vulnerabilities. It defines the cyber environment and critical cyber assets, outlining the goals of a smart grid system and its associated risks. The presentation delves into the MNG (Management, Normative, Governance) model, explaining its role in protecting cyber assets and environments. The methodology involves the Delphi technique to create a theoretical and methodological model, followed by data collection, statistical analysis, and validation. The presentation also covers strategic planning, risk management, asset management, human resource management, and operational security. The conclusion emphasizes the need for active operational cyber security planning, detection, and response to vulnerabilities and threats within the Brazilian energy utility sector, emphasizing the importance of integrating cyber security into all aspects of smart grid operations.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber security
management
and the smart grid
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
Energy is an essential element for
sustainable development and social
inclusion.
The safety of a smart grids in the operational
and physical layers.
The supreme engineering achievement of
the 20th century (de Almeida, Moura and
Quaresma 2019)”
- National Academy of Engineering
Electric grid in Brazil
Document Page
The Smart Grid
The smart grid system is used for transmitting
electronic grid
The most largest and complex infrastructure
Distributed using monitoring, remote sensing,
and bidirectional communication
(Di Santo & et al 2015)
The electronic control system incorporates
telecommunication and information
technologies.
It keeps tracks entire energy value chain.
Document Page
Lack in electric grid
Centralized, natural gas, mainly cool and bulk generation
Responsible for producing 40% of human caused carbon di-oxide production
Predictable loads and controllable generation
Situational awareness and limited automation
Followed by customized proprietary methods
Lack of data (such as consumers data) to use and manage energy resource
Knowles & et al 2015
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cyber Environment and Critical Cyber Asset
Cyber environment is the cyber space in
which cyber threat actors conduct malicious
activity.
Criticality within the information reflects by
the criticality within the assets in the process
of data exchange, is referred to as critical
cyber assets.
Increase level of automation
Increase system intelligence
Document Page
Cyberspace and threats in organizational
environments
Communication network
Supports data control within the system
Actual physical process
Utilized internal network of computer
Utilize non critical operations
(Govinda, Shav and Prakash 2018)
Utilize administrative task
Document Page
Goals of Smart Grid System
Enables consumers to reduce use of energy
Ensure the operational efficiency
Improve security and reliability.
Performs dynamic operations and optimizing
resources towards cyber security.
Incorporating and developing real time
technologies.
Interactive and automatized technologies
Generate energy for peak shaving, and
advanced power storage (Mylrea 2017).
Facilitate atmosphere for electronic vehicles
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
MNG (Management, Normative, Governance) model
MNG models refers approaches to provide protection to cyber assts
and cyber environment
-to protect system
-to protect information
-to protect network, from accidental and deliberate attacks
This model consists of a collection of policies, tools,
security concepts, guidelines, safeguards, risk management
methodologies,
trainng, actions, technologies and best practices
Document Page
Theoretical and methodological model
Document Page
Delphi Methodology
The technique originates from the
Identification of the empirical phenomenon
Synthesizing and constructing methodological path
Composing dimensions of theoretical methodological model
Validate instrument measurement and tested from Brazilian electric
utility sector
Apply statistics tests - sphericity, factor analysis, levene, varienec
analysis and Mann-Whithne
Structure and validate questionnaire
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Data collection
Description and identification of
dimensions
Composing cyber security management and
governance (Pardini, Heinisch. and Parreiras
2017)
Orientation concerning company
governance
Academics and institutional research for
management of cyber security
Data treatment
Statistical data are store on spreadsheet
using Survey Monket tool
Analysis of consequences of related
variables
Calculate the median and the quartiles]
Document Page
Validation of the methodology
Check adequateness of group of variables
Factor analysis of nine dimensions
Practicing or not practicing of variable utility
Importance of variable utility
Implications of variable performance
Decrease the risks factor
Document Page
Cyber security analysis in Brazilian energy utilities
Validation of the methodology
Check adequateness of group of variables
Factor analysis of nine dimensions
Practicing or not practicing of variable utility
Importance of variable utility
Implications of variable performance
Decrease the risks factor
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber security management
Strategic planning
Perform energy utilities
Previous planning for establishment of proper cyber security
Consult with suppliers, partnerships and consumers for energy
Integrating cyber security schemes for organization, Smart Grid
Proper monitoring of every actions toward the cyber security
Plan for continuity of services
Enhance performance
Document Page
Risk management
Analysis business risk
Operational cybernetic risk
Adapt communication and information technology
Predictive risks, regularly tested, revised and monitored
(Proskuryakova 2017)
Observe risk associated with vulnerabilities, natural disaster,
invasions of electric system
Observe operational risks for destroying critical cyber assets and
establish security risk management
Document Page
Asset management
Monitor critical cyber security
assets including power system
and communication assets for
energy utilities
Control physical, logical and
permission access for information technology
Manage changes and configuration in operational technology and
information technology assets
And Compatibility associated with risks factors for critical energy
environment.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Management of human resources
Implementation of organizations best practices (including plans,
technologies, procedures and controls)
Create infrastructure for cyber security
Clear attribution of responsibilities in cyber security
Socialization strategy for the awareness of old and new employees
Outsources people for plans, technologies, procedures, controls in
operational cyber-security for Smart-Grids (Silva 2019)
Operational security for hiring new people
Describe positions and roles for operational cyber-security
Document Page
Conclusion
The Brazilian energy utility sector is not active in the operational
cyber security.
They processes security planning with operational initiatives to
cooperate governance, management of cyber-security, for smart-grids.
The Brazilian energy system plans for identification, analysis,
detection and feedback to vulnerabilities and threats in operational
cyber-security.
Document Page
References
de Almeida, A., Moura, P. and Quaresma, N., 2019. Energy-efficient off-grid systems. Energy Efficiency, pp.1-28.
Di Santo, K.G., Kanashiro, E., Di Santo, S.G. and Saidel, M.A., 2015. A review on smart grids and experiences in Brazil.
Renewable and Sustainable Energy Reviews, 52, pp.1072-1082.
Govinda, K., Shav, R. and Prakash, S., 2018. Energy Theft Identification in Smart Grid. In Silicon Photonics & High
Performance Computing (pp. 9-15). Springer, Singapore.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber security management in industrial
control systems. International journal of critical infrastructure protection, 9, pp.52-80.
Mylrea, M., 2017. Smart energy-internet-of-things opportunities require smart treatment of legal, privacy and
cybersecurity challenges. The Journal of World Energy Law & Business, 10(2), pp.147-158.
Pardini, D.J., Heinisch, A.M.C. and Parreiras, F.S., 2017. Cyber security governance and management for smart grids in
brazilian energy utilities. JISTEM-Journal of Information Systems and Technology Management, 14(3), pp.385-400.
Proskuryakova, L., 2017. Energy technology foresight in emerging economies. Technological Forecasting and Social Change,
119, pp.205-210.
Silva, M.G.D., 2019. Cyber Security: A case Study of Brazil.
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]