gogogo
Syndetics cover image
Image from Syndetics

Securing the smart grid [electronic book] : next generation power grid security / Tony Flick, Justin Morehouse.

By: Contributor(s): Material type: TextTextPublication details: Amsterdam ; Boston : Syngress, c2011.Description: xxv, 290 p. : ill. ; 24 cmISBN:
  • 1597495700 (electronic bk.)
  • 9781597495707 (electronic bk.)
Subject(s): Genre/Form: Additional physical formats: Print version:: Securing the smart grid.Online resources:
Contents:
Smart grid : what is it? -- Threats and impacts : consumers -- Threats and impacts : utility companies and beyond -- Federal effort to secure smart grids -- State and local security initiatives -- Public and private companies -- Attacking the utility companies -- Securing the utility companies -- Third-party services -- Mobile applications and devices -- Social networking and the smart grid -- Attacking smart meters -- Attacking smart devices -- What's next?
Summary: "The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of Computer Security, Dakota State University. "Easy to read and full of valuable information, this book provides a wide-eyed view of our future and the security challenges we will be facing in our day-to-day lives. Exploring everything from home systems to large-scale power plants, this is a must-read for everyone in our technological society."-- Thomas Wilhelm, ISSMP, CISSP, SCSECA, SCNA, SCSA, IEM, IAM Smart Grids are the future of energy. By creating networks from power plant to home, utility companies will be able to regulate power consumption making sure that consumers are receiving the amount that is needed, no more or less. While this new use of networking technology and unique applications such as smart meters will help to conserve energy it also opens up a pipeline, that was regulated manually, into the computer world of interconnected networks. The infrastructure that is being built will need to have robust security as an attack on this network could create chaos to tens of thousands of power consumers, stop a utility company in its tracks, or be used in a cyberwar. Securing the Smart Grid takes a look at grid security today, how it is developing and being deployed into now over 10 million households in the US alone. Direct attacks to smart meters as well as attacks via the networks will be detailed along with suggestions for defense against them. A framework for how security should be implemented throughout this growing system will be included directing security consultants, and system and network architects on how to keep the grid strong against attackers big and small. Details how old and new hacking techniques can be used against the grid and how to defend against them Discusses current security initiatives and how they fall short of what is needed Find out how hackers can use the new infrastructure against itself.
No physical items for this record

Enhanced descriptions from Syndetics:

Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers.

The book discusses different infrastructures in a smart grid, such as the automatic metering infrastructure (AMI). It also discusses the controls that consumers, device manufacturers, and utility companies can use to minimize the risk associated with the smart grid. It explains the smart grid components in detail so readers can understand how the confidentiality, integrity, and availability of these components can be secured or compromised. This book will be a valuable reference for readers who secure the networks of smart grid deployments, as well as consumers who use smart grid devices.

Includes bibliographical references and index.

Smart grid : what is it? -- Threats and impacts : consumers -- Threats and impacts : utility companies and beyond -- Federal effort to secure smart grids -- State and local security initiatives -- Public and private companies -- Attacking the utility companies -- Securing the utility companies -- Third-party services -- Mobile applications and devices -- Social networking and the smart grid -- Attacking smart meters -- Attacking smart devices -- What's next?

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of Computer Security, Dakota State University. "Easy to read and full of valuable information, this book provides a wide-eyed view of our future and the security challenges we will be facing in our day-to-day lives. Exploring everything from home systems to large-scale power plants, this is a must-read for everyone in our technological society."-- Thomas Wilhelm, ISSMP, CISSP, SCSECA, SCNA, SCSA, IEM, IAM Smart Grids are the future of energy. By creating networks from power plant to home, utility companies will be able to regulate power consumption making sure that consumers are receiving the amount that is needed, no more or less. While this new use of networking technology and unique applications such as smart meters will help to conserve energy it also opens up a pipeline, that was regulated manually, into the computer world of interconnected networks. The infrastructure that is being built will need to have robust security as an attack on this network could create chaos to tens of thousands of power consumers, stop a utility company in its tracks, or be used in a cyberwar. Securing the Smart Grid takes a look at grid security today, how it is developing and being deployed into now over 10 million households in the US alone. Direct attacks to smart meters as well as attacks via the networks will be detailed along with suggestions for defense against them. A framework for how security should be implemented throughout this growing system will be included directing security consultants, and system and network architects on how to keep the grid strong against attackers big and small. Details how old and new hacking techniques can be used against the grid and how to defend against them Discusses current security initiatives and how they fall short of what is needed Find out how hackers can use the new infrastructure against itself.

Electronic reproduction. Amsterdam : Elsevier Science & Technology, 2010. Mode of access: World Wide Web. System requirements: Web browser. Title from title screen (viewed on Nov. 3, 2010). Access may be restricted to users at subscribing institutions.

Table of contents provided by Syndetics

  • Chapter 1 Smart Grid: What is it?
  • Chapter 2 Threats and Impacts: Consumers
  • Chapter 3 Threats and Impacts: utility companies & Beyond
  • Chapter 4 Federal Effort to Secure Smart Grids
  • Chapter 5 State and Local Security Initiatives
  • Chapter 6 Public and Private Companies
  • Chapter 7 Attacking the Utility Companies
  • Chapter 8 Securing the Utility Companies
  • Chapter 9 Third-Party Services
  • Chapter 10 Mobile Applications
  • Chapter 11 Social Networking & The Smart Grid
  • Chapter 12 Home Area Network: Smart Meters
  • Chapter 13 Home Area Network: Smart Devices and Interfaces
  • Chapter 14 What's Next?

Author notes provided by Syndetics

Tony Flick has been working in the Information Security field for more than six years and is currently a Principal with FYRM Associates. Mr. Flick has assisted numerous organizations in achieving compliance with federal regulations and industry standards. His expertise includes risk management and compliance, assessments and audits, and research in emerging technologies. Mr. Flick has presented at Black Hat USA, DEFCON, and the OWASP Tampa local chapter on smart grid and application security concepts. Mr. Flick holds the CISSP certification. Additionally, Mr. Flick earned a Bachelors of Science in Computer Science and a Bachelors of Science in Mathematics.

Justin Morehouse is an Information Security professional with over 10 years of experience assisting Fortune 100 companies and Federal Government Agencies mature their Information Security programs. Over the past six years Mr. Morehouse has focused on the areas of attack and penetration, performing nearly 200 Security Assessments utilizing both NIST SP800-42's "Blue Teaming" and "Red Teaming" approaches. Mr. Morehouse is the OWASP Tampa chapter leader and presented at IEEE's EntNet. Mr. Morehouse holds the following degrees and certifications: CISSP, CISM, MCSE, MSIA, and QSA (Former). He is currently an adjunct professor at DeVry University.

Powered by Koha