ТОП просматриваемых книг сайта:
Building an Effective Security Program for Distributed Energy Resources and Systems. Mariana Hentea
Читать онлайн.Название Building an Effective Security Program for Distributed Energy Resources and Systems
Год выпуска 0
isbn 9781119070436
Автор произведения Mariana Hentea
Жанр Физика
Издательство John Wiley & Sons Limited
3 Chapter 3Table 3.1 Examples of data characteristics.Table 3.2 System development – quality attributes.Table 3.3 Information security goals.Table 3.4 RMIS model security goals.Table 3.5 List of organizations developing relevant standards for Smart Grid.
4 Chapter 4Table 4.1 Examples of outsourced services.Table 4.2 Detailed architecture services and prioritization.Table 4.3 ICS infrastructure versus IT infrastructure.
5 Chapter 5Table 5.1 Categories of evolving threats to information security.Table 5.2 An example of annual change in threats ranking.Table 5.3 Examples of threats to energy sector and electrical utilities.Table 5.4 Common SCADA vulnerabilities.Table 5.5 AMI security domain description.Table 5.6 Control families.
6 Chapter 6Table 6.1 Examples of critical infrastructure definitions.
7 Chapter 7Table 7.1 Current lead agency assignments.
8 Chapter 8Table 8.1 Comparison of features for the current utility and future utility.Table 8.2 Legacy and Smart Grid functionality comparison.Table 8.3 Today's grid comparison with Smart Grid.
9 Chapter 9Table 9.1 Stability study time frames.Table 9.2 Robustness vs. resilience in power systems.
10 Chapter 10Table 10.1 Entities including and interfacing DERs.
11 Chapter 11Table 11.1 Security program functions.
12 Chapter 12Table 12.1 Capability maturity model (CMM) scale.
13 ATable A.1 Comparison of security terms defined in different glossaries or sta...Table A.2 Recommended definitions of most common security terms.Table A.3 Examples of cybersecurity glossaries provided by different organiza...
14 BTable B.1 Multiscale time hierarchy of power systems.Table B.2 Power grid glossaries.
15 DTable D.1 Examples of smart grid glossaries.
List of Illustrations
1 Chapter 1Figure 1.1 Traditional electricity delivery system.Figure 1.2 Functions of the electricity sector.Figure 1.3 Evolution of the electric power grid.Figure 1.4 SmartGrids concept.Figure 1.5 Future network vision.Figure 1.6 General layout of electricity networks.Figure 1.7 Common Smart Grid components.Figure 1.8 NIST conceptual reference model.Public Domain.Figure 1.9 View of the actors within domains of NIST conceptual reference mo...Figure 1.10 Legacy application types within NIST conceptual domains.Publ...Figure 1.11 Smart Grid communication infrastructure.Figure 1.12 Relationships on secure energy infrastructure.Figure 1.13 DER locations scenario.Public Domain.Figure 1.14 Alternative microgrid configurations.Figure 1.15 VPP schematic view.Figure 1.16 Illustration of connected virtual power plants.Figure 1.17 Information systems classification.Figure 1.18 Smart Grid characteristics vs. traditional power system.Figure 1.19 Stylized electricity sector value chain.Figure 1.20 ICT application domains in the Smart Grid.Figure 1.21 OT and IT integration. ERP, Enterprise Resources Planning; EAM, ...Figure 1.22 SCADA general diagram.Public Domain.
2 Chapter 2Figure 2.1 Technology road map.Figure 2.2 A smart meter application in two scenarios.Figure 2.3 Infographic of Internet of Everything.Figure 2.4 ABI Research Market Forecast for Internet of Everything.Figure 2.5 Internet of Everything connected in a large distributed network....Figure 2.6 A perspective of the Wi‐Fi Internet of Everything – core attribut...Figure 2.7 Simple cyber‐physical representation.Figure 2.8 NIST CPS conceptual model.Figure 2.9 Components of CPS for smart transportation.Figure 2.10 Cyber–physical system – simple structure.Figure 2.11 Security concepts and relationships.Figure 2.12 Information security and cybersecurity relationship.Figure 2.13 Forces shaping cybersecurity.Figure 2.14 Interdependencies across the economy.
3 Chapter 3Figure 3.1 Components of information security.Figure 3.2 A view of security measure relationships with other concepts.Figure 3.3 Data transformation.Figure 3.4 DIKW pyramid: data, information, knowledge, and wisdom.Figure 3.5 The pyramid of knowledge.Figure 3.6 Dimensions of dependability.Figure 3.7 Information life cycle.Figure 3.8 CIA information security model.Figure 3.9 McCumber cube.Figure 3.10 NSTISSC model.Figure 3.11 The information assurance model.Figure 3.12 IA model with time dimension.Figure 3.13 RMIAS model.
4 Chapter 4Figure 4.1 The information system infrastructure.Figure 4.2 Examples of cloud services.Figure 4.3 Cloud provider major activities.Public Domain.Figure 4.4 The conceptual cloud computing reference model.Public Domain....Figure 4.5 Smart Grid basic electric structure.Figure 4.6 A view of Smart Grid components evolution.Figure 4.7 Key components of an ISO infrastructure.Figure 4.8 Complex networks in Smart Grid market.Figure 4.9 Smart Grid: a complex of interconnected components.Figure 4.10 DERs interconnection.Figure 4.11 A smart infrastructure view.Figure 4.12 Smart Grid technologies and capabilities.Figure 4.13 Utility integrated network.Figure 4.14 Different spatial scales of the electric power system.Figure 4.15 ICS operation.Figure 4.16 Integrated SCADA architecture.Figure