Font Size: a A A

Security strategy that should be adopted by utilities for Smart Grid implementation before standards hit the industry

Posted on:2011-02-17Degree:M.SType:Thesis
University:University of Colorado at BoulderCandidate:Gerra, ArunFull Text:PDF
GTID:2448390002455157Subject:Information Technology
Abstract/Summary:PDF Full Text Request
It is important for Power Industry to understand the serious consequences of cyber-attacks before deploying Smart Grid Technology. Smart Grid has taken edge over couple of years; utilities have already begun experimenting with the technology without any defined industry security standards in place for the technology. Power industry cannot reap the benefits of smart grid unless they plan on securing it at every phase of its deployment. Lack of security in Industrial Control Systems (ICS), deployment of Advanced Metering Infrastructure (AMI), real-time interaction with consumers using smart meters, etc. will expose the power grid to cyber-attacks ranging from information systems to control systems. To prevent the cyber-attacks on power industry deploying smart grid, there is a need to build a strategy that incorporates both the Power and IT industry, there has to be understanding with respect to both of their operations, needs, roles, and responsibilities.;The purpose of this thesis is to fill the gap between the need of power industry incorporating information technology bearing in mind the cyber security issues. This document proposes the need for creating boundaries to reduce the risks of cyber-attacks during and after deploying smart grid technology using proposed security strategy framework.;The boundaries were created after taking into consideration the sources of information that can help smart grid achieve its goals along with the need for demand-response, peak loads since smart grid requires modernization of transmission and distribution systems. After creating boundaries, each segment was analyzed on the basis of what systems or assets are needed to keep the power grid active, risk and impact these assets have on power grid, and how to mitigate or reduce these risks. After planning protection in place for critical segments, and securing being a continuous process there is need for monitoring and analyzing the complete grid with respect to grid stability, intrusion detection, and operations.
Keywords/Search Tags:Grid, Industry, Security, Technology, Need, Strategy, Cyber-attacks
PDF Full Text Request
Related items