Analyzing Cyber Security Strategies for Smart Grid Technologies

Verified

Added on  2022/09/22

|19
|1170
|27
Presentation
AI Summary
This presentation analyzes cyber security strategies within smart grid technologies. It begins by identifying key cyber security issues, such as false data injection attacks, attacks on AGC, and database vulnerabilities. The presentation then critically examines various strategies, including secure management, efficiency, scalability, and evolve-ability through key management protocols. It explores different approaches like defense-in-depth and the use of malware protection, network intrusion prevention systems, and VPN architectures. The methodology involves a qualitative approach using online journals, books, and articles with thematic analysis. The discussion and analysis highlight vulnerabilities in SCADA systems and the use of protocols like IEC 870-5-10x. The study concludes with recommendations for enhancing security concerns in smart grids, such as article validation, data protection, and the use of cryptography. References to relevant research papers and articles are also provided.
Document Page
Cyber Security Strategies
in Smart Grid
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
Grid connected systems have been pressurized
to meet power requirements in the market.
The power shortage has been a major
problems for all over the world.
Smart grid is an electric network which can
intelligently integrate actions of users
connected in the network.
Document Page
Aim and Objectives
This research has focused on analyzing cyber security
strategies in smart grid technologies.
Following are objectives of the research:
To identify cyber security issues in smart grid
To critically analyze cyber security strategies in smart
grid
To recommend strategies for enhancing security
concerns in smart grid
Document Page
Research Questions
Following are research questions:
What are cyber security issues in smart grid?
What cyber security strategies can be applied in smart grid?
How these cyber security strategies can be enhanced in smart grid?
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Literature Review
Prevention of unauthorized access by
adversary for hugely secured information
like price information, power usage, control
commands which imposes customer’s
privacy and revealing of proprietary
information related to utilities is known as
confidentiality
Document Page
Smart Grid
Smart grid engage with a class of
technology that are utilizing electricity
delivery system with computers that are
based on automation and remote control.
These are the systems that have helped
in communication technology that is two-
way, and processing which has been
used in industry.
Traditionally, power grid used to be
designed for transporting power from the
power generation plant to end users.
.
Document Page
Presentation Name 7
Security Issues
False Data Injection Attack
Attacks on AGC
Attacks on database of the Smart Grid Systems
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Presentation Name 8
Cyber Security Threats
Attenuation and Risk Inspection
Expected Attack Points and Required
Action
Distribution System
Telemetry Infrastructure
Document Page
Presentation Name 9
Make Smart grids
survivable
Employ a defense in
depth approach
Providing scalable
security measures
Embed Security Controls
by design
Enhance traditional
security measures
Click icon to add chart
Cyber security strategies for smart grid
Document Page
Presentation Name 10
Secure Management: For providing integrity and confidentiality.
Efficiency: With respect to communication, storage and
computation.
Scalability: The objects which share key and the distance covered
by them are to be taken into account by the key management for
the smart grid’s large scale.
Evolve-ability: There exists new technologies and legacy systems
in networks of smart grid. Protocols for key management are used
for accommodating existing devices and evolve for accommodating
future technologies (Cintuglu et al. 2016).
Key management
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Presentation Name 11
Qualitative approach has been
selected in the study.
Data has been collected using
online journals, books and
articles.
Thematic analysis has been
done with three themes created
using research methodology.
Methodology
Document Page
Presentation Name 12
Activities 1-2 weeks 3-4 weeks 5-6 weeks 7-8 weeks 9-10 weeks 10-11 weeks 11-12 weeks
Research
planning
Literature
review
Methodology
Data collection
Data analysis
Research
closure
Timeline
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]