SlideShare a Scribd company logo
Identifying Risks and Assessing Vulnerabilities
Analytics for Smart Grid Cybersecurity
This work was funded by the Cooperative Agreement between the Masdar Institute of Science and Technology (Masdar Institute), Abu Dhabi, UAE
and the Massachusetts Institute of Technology (MIT), Cambridge, MA, USA - 02/MI/MIT/CP/11/07633/GEN/G/00.
Nazli Choucri
Professor of Political Science
Gaurav Agarwal
SM - Engineering and Management ’10
Boston Global Citizenship Forum
Page 2
Source: United States Government Accountability Office, “Electricity grid
modernization, GAO-11-117, January 2011.
Analytics for Smart Grid Cybersecurity: Identifying Risks and Assessing Vulnerabilities
N Choucri and G Agarwal, September 22
Smart Grid of Power Systems
Highlights of Smart Grid Cybersecurity Risk Management Practice
Enterprise Risk
Management Practice
Cybersecurity Risk
Management Practice
Other Risk
Management Practice
NIST Supply Chain RMP
DoE RMP
Compliance to Technical
Standards
Compliance to Federal
Regulations
Implementation of
Capability Maturity Models
DoE C2M2 Guide
DoE C2M2
NIST Cybersecurity
Framework
White House Executive
Order: 13636
NIST 7628 Guidelines
NIST 800:53
NIST 1108R3
CIM/61850 for DGM
SGIP Framework
mapping to Guidelines
US CERT Cyber Resilience Review
ICS CERT Cyber Security Evaluation Tool
Primary Documents
Supporting
Documents
Other Documents
Focus on
Smart Grid
①
②
③
④
⑤
⑥
Advancing Cybersecurity and Sustainability for Critical Infrastructure: Ecosystem
of Cybersecurity Risk Management Practices – Situating NIST Initiatives and
Expanding Capabilities. • April 17, 2016
Page 3
Smart Grid Cyber
Security Focus
RMP stands for Risk Management Practice
Page 4
Smart Grid Elements – in numbers
Domains : 7
Actors (Nodes) : 47
Logical Interfaces (Edges) : 130
Security Requirements Types: 180
Vulnerabilities Classes: 53
Spatial distance between nodes is importance and
distance to other nodes.
Node represents an actor.
Node color based on domain.
Node size based on eigenvector centrality of node in the network.
Edge represents a logical interface (or connection) between two actors.
Interface strength – illustrated by thickness of connection
Impact scale and scope, defined in system-wide terms – represented by edge color.
•
Network View of NIST Guidelines from Design Structure Matrix (DSM)
Analytics for Smart Grid Cybersecurity: Identifying Risks and Assessing Vulnerabilities
N Choucri and G Agarwal September 22, 2016
Page 5
HIGHMODERATELOW
ConfidentialityIntegrityAvailability
SecurityObjectives
Impact Levels
Analytics for Smart Grid Cybersecurity: Identifying Risks and Assessing Vulnerabilities •
N Choucri and G Agarwal, September 22,, 2016
These images: (1) provide greater transparency, (2) identify high threat areas,
(3) support selection of priority actions, and (4) help align resources to goals
Risk Identification and Assessment based on NIST Guidelines 7628 R1

More Related Content

What's hot

Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense
NESslides
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
ClubHack
 
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...
sidhota
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
Jishnu Pradeep
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
IJEACS
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
P K Agarwal
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
WPICPE
 
How I Learned To Stop Worrying And Love the Smart Meter
How I Learned To Stop Worrying And Love the Smart MeterHow I Learned To Stop Worrying And Love the Smart Meter
How I Learned To Stop Worrying And Love the Smart Meter
zeroSteiner
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
Sergey Gordeychik
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
IJRES Journal
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
EnergySec
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
EnergySec
 
Substation Cyber Security
Substation Cyber SecuritySubstation Cyber Security
Substation Cyber Security
Schneider Electric
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
ijsrd.com
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 
A Defense-in-depth Cybersecurity for Smart Substations
A Defense-in-depth Cybersecurity for Smart SubstationsA Defense-in-depth Cybersecurity for Smart Substations
A Defense-in-depth Cybersecurity for Smart Substations
IJECEIAES
 

What's hot (20)

Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
1678 1683
1678 16831678 1683
1678 1683
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
How I Learned To Stop Worrying And Love the Smart Meter
How I Learned To Stop Worrying And Love the Smart MeterHow I Learned To Stop Worrying And Love the Smart Meter
How I Learned To Stop Worrying And Love the Smart Meter
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 
Substation Cyber Security
Substation Cyber SecuritySubstation Cyber Security
Substation Cyber Security
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
A Defense-in-depth Cybersecurity for Smart Substations
A Defense-in-depth Cybersecurity for Smart SubstationsA Defense-in-depth Cybersecurity for Smart Substations
A Defense-in-depth Cybersecurity for Smart Substations
 

Viewers also liked

BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
Boston Global Forum
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
Boston Global Forum
 
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. ReefBGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
Boston Global Forum
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
Invincea, Inc.
 
Threats to the Grid | Cyber Challenges Impacting the Energy Sector
Threats to the Grid | Cyber Challenges Impacting the Energy Sector Threats to the Grid | Cyber Challenges Impacting the Energy Sector
Threats to the Grid | Cyber Challenges Impacting the Energy Sector
Invincea, Inc.
 
Cyber attacks in Ukraine
Cyber attacks in UkraineCyber attacks in Ukraine
Cyber attacks in Ukraine
Nick Bilogorskiy
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017
Marina Krotofil
 
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil DefenseBGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
Boston Global Forum
 
Electricity retailing: location-based approach for quality customer experiences
Electricity retailing: location-based approach for quality customer experiencesElectricity retailing: location-based approach for quality customer experiences
Electricity retailing: location-based approach for quality customer experiences
Hervé Senot
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
Dr David Probert
 
Competencias comunicativas
Competencias comunicativasCompetencias comunicativas
Competencias comunicativas
Rochy Montenegro
 
Problemas metodo simplex
Problemas metodo simplexProblemas metodo simplex
Problemas metodo simplexLeidyEnriquez
 
Topes para llantas
Topes para llantasTopes para llantas
Topes para llantas
Lili Tipantaxi
 
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
MIT Office of Sustainability
 
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability  Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
MIT Office of Sustainability
 
Welcoming Remarks: EVPT, Israel Ruiz
  Welcoming Remarks: EVPT, Israel Ruiz  Welcoming Remarks: EVPT, Israel Ruiz
Welcoming Remarks: EVPT, Israel Ruiz
MIT Office of Sustainability
 

Viewers also liked (20)

BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
 
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. ReefBGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
 
Threats to the Grid | Cyber Challenges Impacting the Energy Sector
Threats to the Grid | Cyber Challenges Impacting the Energy Sector Threats to the Grid | Cyber Challenges Impacting the Energy Sector
Threats to the Grid | Cyber Challenges Impacting the Energy Sector
 
Cyber attacks in Ukraine
Cyber attacks in UkraineCyber attacks in Ukraine
Cyber attacks in Ukraine
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Ht f42
Ht f42Ht f42
Ht f42
 
S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017
 
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil DefenseBGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
 
Electricity retailing: location-based approach for quality customer experiences
Electricity retailing: location-based approach for quality customer experiencesElectricity retailing: location-based approach for quality customer experiences
Electricity retailing: location-based approach for quality customer experiences
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Lorena
LorenaLorena
Lorena
 
Competencias comunicativas
Competencias comunicativasCompetencias comunicativas
Competencias comunicativas
 
Problemas metodo simplex
Problemas metodo simplexProblemas metodo simplex
Problemas metodo simplex
 
Topes para llantas
Topes para llantasTopes para llantas
Topes para llantas
 
Dafwebkon 2017
Dafwebkon 2017Dafwebkon 2017
Dafwebkon 2017
 
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
 
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability  Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
 
Welcoming Remarks: EVPT, Israel Ruiz
  Welcoming Remarks: EVPT, Israel Ruiz  Welcoming Remarks: EVPT, Israel Ruiz
Welcoming Remarks: EVPT, Israel Ruiz
 

Similar to Analytics for Smart Grid Cyber security

Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
IJCNCJournal
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
IJCNCJournal
 
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetRisk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
IOSR Journals
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
IJCNCJournal
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
IJCNCJournal
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
IRJET Journal
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET Journal
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
IRJET Journal
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Network
ijircee
 
Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022
IJNSA Journal
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
vidyapol01
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
ijctet
 
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkApplication of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
IRJET Journal
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
IAESIJAI
 

Similar to Analytics for Smart Grid Cyber security (20)

Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
 
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetRisk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Network
 
Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkApplication of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
 

More from Boston Global Forum

The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
The Artificial Intelligence Chronicle – Open to feedback  3-6-2020The Artificial Intelligence Chronicle – Open to feedback  3-6-2020
The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
Boston Global Forum
 
Hunermund causal inference in ml and ai
Hunermund   causal inference in ml and aiHunermund   causal inference in ml and ai
Hunermund causal inference in ml and ai
Boston Global Forum
 
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common SenseDark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Boston Global Forum
 
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of MechanismsGeneralizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
Boston Global Forum
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebecca
Boston Global Forum
 
Marc Rotenberg AIWS
Marc Rotenberg AIWSMarc Rotenberg AIWS
Marc Rotenberg AIWS
Boston Global Forum
 
MIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systemsMIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systems
Boston Global Forum
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
Boston Global Forum
 
Professor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of DesignProfessor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of Design
Boston Global Forum
 
Aiws united-nation charter day lecture
Aiws united-nation charter day lectureAiws united-nation charter day lecture
Aiws united-nation charter day lecture
Boston Global Forum
 
Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019
Boston Global Forum
 
Agenda aiws g7 summit 2019
Agenda aiws g7 summit 2019Agenda aiws g7 summit 2019
Agenda aiws g7 summit 2019
Boston Global Forum
 
Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...
Boston Global Forum
 
Catalog cho bgf g7 summit initaitive 2017
Catalog cho bgf  g7 summit initaitive 2017Catalog cho bgf  g7 summit initaitive 2017
Catalog cho bgf g7 summit initaitive 2017
Boston Global Forum
 
The digital battle
The digital battleThe digital battle
The digital battle
Boston Global Forum
 
Agenda of bgf g7 summit initiatve 2017
Agenda of bgf   g7 summit initiatve 2017Agenda of bgf   g7 summit initiatve 2017
Agenda of bgf g7 summit initiatve 2017
Boston Global Forum
 
Stride gender
Stride genderStride gender
Stride gender
Boston Global Forum
 
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Boston Global Forum
 
Global Citizen Network
Global Citizen NetworkGlobal Citizen Network
Global Citizen Network
Boston Global Forum
 
Education for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for allEducation for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for all
Boston Global Forum
 

More from Boston Global Forum (20)

The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
The Artificial Intelligence Chronicle – Open to feedback  3-6-2020The Artificial Intelligence Chronicle – Open to feedback  3-6-2020
The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
 
Hunermund causal inference in ml and ai
Hunermund   causal inference in ml and aiHunermund   causal inference in ml and ai
Hunermund causal inference in ml and ai
 
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common SenseDark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
 
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of MechanismsGeneralizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebecca
 
Marc Rotenberg AIWS
Marc Rotenberg AIWSMarc Rotenberg AIWS
Marc Rotenberg AIWS
 
MIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systemsMIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systems
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Professor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of DesignProfessor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of Design
 
Aiws united-nation charter day lecture
Aiws united-nation charter day lectureAiws united-nation charter day lecture
Aiws united-nation charter day lecture
 
Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019
 
Agenda aiws g7 summit 2019
Agenda aiws g7 summit 2019Agenda aiws g7 summit 2019
Agenda aiws g7 summit 2019
 
Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...
 
Catalog cho bgf g7 summit initaitive 2017
Catalog cho bgf  g7 summit initaitive 2017Catalog cho bgf  g7 summit initaitive 2017
Catalog cho bgf g7 summit initaitive 2017
 
The digital battle
The digital battleThe digital battle
The digital battle
 
Agenda of bgf g7 summit initiatve 2017
Agenda of bgf   g7 summit initiatve 2017Agenda of bgf   g7 summit initiatve 2017
Agenda of bgf g7 summit initiatve 2017
 
Stride gender
Stride genderStride gender
Stride gender
 
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
 
Global Citizen Network
Global Citizen NetworkGlobal Citizen Network
Global Citizen Network
 
Education for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for allEducation for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for all
 

Recently uploaded

ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 

Recently uploaded (20)

ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 

Analytics for Smart Grid Cyber security

  • 1. Identifying Risks and Assessing Vulnerabilities Analytics for Smart Grid Cybersecurity This work was funded by the Cooperative Agreement between the Masdar Institute of Science and Technology (Masdar Institute), Abu Dhabi, UAE and the Massachusetts Institute of Technology (MIT), Cambridge, MA, USA - 02/MI/MIT/CP/11/07633/GEN/G/00. Nazli Choucri Professor of Political Science Gaurav Agarwal SM - Engineering and Management ’10 Boston Global Citizenship Forum
  • 2. Page 2 Source: United States Government Accountability Office, “Electricity grid modernization, GAO-11-117, January 2011. Analytics for Smart Grid Cybersecurity: Identifying Risks and Assessing Vulnerabilities N Choucri and G Agarwal, September 22 Smart Grid of Power Systems
  • 3. Highlights of Smart Grid Cybersecurity Risk Management Practice Enterprise Risk Management Practice Cybersecurity Risk Management Practice Other Risk Management Practice NIST Supply Chain RMP DoE RMP Compliance to Technical Standards Compliance to Federal Regulations Implementation of Capability Maturity Models DoE C2M2 Guide DoE C2M2 NIST Cybersecurity Framework White House Executive Order: 13636 NIST 7628 Guidelines NIST 800:53 NIST 1108R3 CIM/61850 for DGM SGIP Framework mapping to Guidelines US CERT Cyber Resilience Review ICS CERT Cyber Security Evaluation Tool Primary Documents Supporting Documents Other Documents Focus on Smart Grid ① ② ③ ④ ⑤ ⑥ Advancing Cybersecurity and Sustainability for Critical Infrastructure: Ecosystem of Cybersecurity Risk Management Practices – Situating NIST Initiatives and Expanding Capabilities. • April 17, 2016 Page 3 Smart Grid Cyber Security Focus RMP stands for Risk Management Practice
  • 4. Page 4 Smart Grid Elements – in numbers Domains : 7 Actors (Nodes) : 47 Logical Interfaces (Edges) : 130 Security Requirements Types: 180 Vulnerabilities Classes: 53 Spatial distance between nodes is importance and distance to other nodes. Node represents an actor. Node color based on domain. Node size based on eigenvector centrality of node in the network. Edge represents a logical interface (or connection) between two actors. Interface strength – illustrated by thickness of connection Impact scale and scope, defined in system-wide terms – represented by edge color. • Network View of NIST Guidelines from Design Structure Matrix (DSM) Analytics for Smart Grid Cybersecurity: Identifying Risks and Assessing Vulnerabilities N Choucri and G Agarwal September 22, 2016
  • 5. Page 5 HIGHMODERATELOW ConfidentialityIntegrityAvailability SecurityObjectives Impact Levels Analytics for Smart Grid Cybersecurity: Identifying Risks and Assessing Vulnerabilities • N Choucri and G Agarwal, September 22,, 2016 These images: (1) provide greater transparency, (2) identify high threat areas, (3) support selection of priority actions, and (4) help align resources to goals Risk Identification and Assessment based on NIST Guidelines 7628 R1