ТОП просматриваемых книг сайта:
Building an Effective Security Program for Distributed Energy Resources and Systems. Mariana Hentea
Читать онлайн.Название Building an Effective Security Program for Distributed Energy Resources and Systems
Год выпуска 0
isbn 9781119070436
Автор произведения Mariana Hentea
Жанр Физика
Издательство John Wiley & Sons Limited
Table of Contents
1 Cover
5 Foreword
8 Part I: Understanding Security and Privacy Problem 1 Security 1.1 Introduction 1.2 Smart Grid 1.3 Distributed Energy Resources 1.4 Scope of Security and Privacy 1.5 Computing and Information Systems for Business and Industrial Applications 1.6 Integrated Systems in a Smart Grid 1.7 Critical Smart Grid Systems 1.8 Standards, Guidelines, and Recommendations 2 Advancing Security 2.1 Emerging Technologies 2.2 Cybersecurity 2.3 Advancing Cybersecurity 2.4 Smart Grid Cybersecurity: A Perspective on Comprehensive Characterization 2.5 Security as a Personal, Organizational, National, and Global Priority 2.6 Cybersecurity for Electrical Sector as a National Priority 2.7 The Need for Security and Privacy Programs 2.8 Standards, Guidelines, and Recommendations References Part 1
9 Part II: Applying Security Principles to Smart Grid 3 Principles of Cybersecurity 3.1 Introduction 3.2 Information Security 3.3 Security‐Related Concepts 3.4 Characteristics of Information 3.5 Information System Characteristics 3.6 Critical Information Systems 3.7 Information Security Models 3.8 Standards, Guidelines, and Recommendations 4 Applying Security Principles to Smart Grid 4.1 Smart Grid Security Goals 4.2 DERInformation Security Characteristics 4.3 Infrastructure 4.4 Smart Grid Infrastructure 4.5 Building an Information Infrastructure for Smart Grid 4.6 IT Systems Versus Industrial Control System Infrastructure 4.7 Convergence Trends 4.8 Standards, Guidelines, and Recommendations 5 Planning Security Protection 5.1 Threats and Vulnerabilities 5.2 Attacks 5.3 Energy Sector: Threats, Vulnerabilities, and Attacks Overview 5.4 Security Controls 5.5 Security Training and Skills 5.6 Planning for Security and Privacy 5.7 Legal and Ethical Issues 5.8 Standards, Guidelines, and Recommendations References Part 2
10
Part III: Security of Critical Infrastructure
6 Critical Infrastructure
6.1 Introduction
6.2 Associated Industries with Critical Infrastructure
6.3 Critical Infrastructure Components
6.4 Energy Sector
6.5 Critical Infrastructure Interdependencies
6.6 Electrical Power System
6.7 Recent Threats and Vulnerabilities
6.8 Standards, Guidelines, and Recommendations
7 Critical Infrastructure Protection
7.1 Critical Infrastructure Attacks and Challenges
7.2 The Internet as a Critical Infrastructure
7.3 Critical Infrastructure Protection
7.4 Information Security Frameworks
7.5 NIST Privacy Framework
7.6 Addressing Security of Control Systems
7.7 Emerging Technologies and Impacts
7.8 Standards,