SlideShare a Scribd company logo
Cyber Security for the  Smart Grid Dr. Clifford Neuman Center for Computer Systems Security Information Sciences Institute University of Southern California Southern California Smart Grid Research Symposium USC, Los Angeles October 6, 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Trends in Power Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Federation in Power Systems
[object Object],[object Object],[object Object],[object Object],Traditional Security and the Smart Grid
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Traditional Security and the Smart Grid
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Traditional Security and the Smart Grid Internet Interconnect Distribution Neighborhood HAN M
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Modeling Security in the Smart Grid
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Understanding Smart Grid Security
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Securing the Smart Grid
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Some Examples
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How We Might Get it Wrong
[object Object],[object Object],[object Object],[object Object],[object Object],Securing The Smart Grid
[object Object],[object Object],[object Object],[object Object],[object Object],Cyber Isolation for the Smart Grid
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Note on Simulation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Summary
For More Information ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
SIVA SASTHRI
 
Smart grid technologies
Smart grid technologiesSmart grid technologies
Smart grid technologies
Vaibhav Bhargava
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
tanzir3
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
Smarak Suman
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
Mihir Acharya
 
Smart grid challenge
Smart grid challengeSmart grid challenge
Smart grid challenge
Abhishek Kumar
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Leonardo ENERGY
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
nickitran
 
SMART GRID
SMART GRIDSMART GRID
SMART GRID
Debasis Mohanty
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
P K Agarwal
 
Smart grid(v1)
Smart grid(v1)Smart grid(v1)
Smart grid(v1)
sahar148
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
Hamza AlBzoor
 
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPTMicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
 Abin Baby
 
Power Quality Audit.pptx
Power Quality Audit.pptxPower Quality Audit.pptx
Power Quality Audit.pptx
KarthikeyanK816516
 
Smart grid
Smart gridSmart grid
Smart grid
Abhishek Kumar
 
Smart grid in india
Smart grid in indiaSmart grid in india
Smart grid in india
Abhishek Kumar Gupta
 
CYBERSECURITY FOR POWER SYSTEMS
CYBERSECURITY FOR POWER SYSTEMSCYBERSECURITY FOR POWER SYSTEMS
CYBERSECURITY FOR POWER SYSTEMS
Power System Operation
 
Microgrid Presentation
Microgrid PresentationMicrogrid Presentation
Microgrid Presentation
Shahab Khan
 
Interconnection issue in microgrid
Interconnection issue in microgridInterconnection issue in microgrid
Interconnection issue in microgrid
Amarjeet S Pandey
 

What's hot (20)

Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
Smart grid technologies
Smart grid technologiesSmart grid technologies
Smart grid technologies
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Smart grid challenge
Smart grid challengeSmart grid challenge
Smart grid challenge
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
 
Presentation on Smart Grid
Presentation on Smart GridPresentation on Smart Grid
Presentation on Smart Grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
SMART GRID
SMART GRIDSMART GRID
SMART GRID
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
Smart grid(v1)
Smart grid(v1)Smart grid(v1)
Smart grid(v1)
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
 
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPTMicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
 
Power Quality Audit.pptx
Power Quality Audit.pptxPower Quality Audit.pptx
Power Quality Audit.pptx
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart grid in india
Smart grid in indiaSmart grid in india
Smart grid in india
 
CYBERSECURITY FOR POWER SYSTEMS
CYBERSECURITY FOR POWER SYSTEMSCYBERSECURITY FOR POWER SYSTEMS
CYBERSECURITY FOR POWER SYSTEMS
 
Microgrid Presentation
Microgrid PresentationMicrogrid Presentation
Microgrid Presentation
 
Interconnection issue in microgrid
Interconnection issue in microgridInterconnection issue in microgrid
Interconnection issue in microgrid
 

Viewers also liked

Smart grid ppt
Smart grid pptSmart grid ppt
Smart grid ppt
Ravish Pandey
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
ClubHack
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
Gavan Howe
 
Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Castlebridge Associates
 
Alliander robin hagemans daniel peyron
Alliander robin hagemans daniel peyronAlliander robin hagemans daniel peyron
Alliander robin hagemans daniel peyron
BigDataExpo
 
Security and smart grid what you need to know john chowdhury 2012 final
Security and smart grid what you need to know   john chowdhury 2012 finalSecurity and smart grid what you need to know   john chowdhury 2012 final
Security and smart grid what you need to know john chowdhury 2012 final
John Chowdhury
 
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES UPES Dehradun
 
Security challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresSecurity challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructures
P K Agarwal
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
Dr. Mazlan Abbas
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction Nilesh Dhage
 
PPT - Powerful Presentation Techniques
PPT - Powerful Presentation TechniquesPPT - Powerful Presentation Techniques
PPT - Powerful Presentation Techniques
University of Wisconsin Milwaukee
 
Paris ML meetup
Paris ML meetupParis ML meetup
Paris ML meetup
Yves Raimond
 
Finding Our Happy Place in the Internet of Things
Finding Our Happy Place in the Internet of ThingsFinding Our Happy Place in the Internet of Things
Finding Our Happy Place in the Internet of Things
Pamela Pavliscak
 
IT in Healthcare
IT in HealthcareIT in Healthcare
IT in Healthcare
NetApp
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
InterQuest Group
 

Viewers also liked (17)

Smart grid ppt
Smart grid pptSmart grid ppt
Smart grid ppt
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
 
Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)Data Protection in Big Data world (EDW lighting talk)
Data Protection in Big Data world (EDW lighting talk)
 
Alliander robin hagemans daniel peyron
Alliander robin hagemans daniel peyronAlliander robin hagemans daniel peyron
Alliander robin hagemans daniel peyron
 
Security and smart grid what you need to know john chowdhury 2012 final
Security and smart grid what you need to know   john chowdhury 2012 finalSecurity and smart grid what you need to know   john chowdhury 2012 final
Security and smart grid what you need to know john chowdhury 2012 final
 
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
 
ppt on Smart Grid
ppt on Smart Gridppt on Smart Grid
ppt on Smart Grid
 
Security challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresSecurity challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructures
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
 
PPT - Powerful Presentation Techniques
PPT - Powerful Presentation TechniquesPPT - Powerful Presentation Techniques
PPT - Powerful Presentation Techniques
 
Paris ML meetup
Paris ML meetupParis ML meetup
Paris ML meetup
 
Finding Our Happy Place in the Internet of Things
Finding Our Happy Place in the Internet of ThingsFinding Our Happy Place in the Internet of Things
Finding Our Happy Place in the Internet of Things
 
IT in Healthcare
IT in HealthcareIT in Healthcare
IT in Healthcare
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
 

Similar to Cyber security for the smart grid, Clifford Neuman, Information Sciences Institute, USC

smart grid
smart gridsmart grid
smart grid
Gundu Durgarao
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSO
Andy Bochman
 
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
Sandia National Laboratories: Energy & Climate: Renewables
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
Durgarao Gundu
 
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
IRJET Journal
 
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Shakas Technologies
 
Smart Grid & SCADA Systems
Smart Grid & SCADA SystemsSmart Grid & SCADA Systems
Smart Grid & SCADA Systems
Pratim Chakrabortty
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
IRJET Journal
 
Cyber Physical System: Architecture, Applications and Research Challenges
Cyber Physical System: Architecture, Applicationsand Research ChallengesCyber Physical System: Architecture, Applicationsand Research Challenges
Cyber Physical System: Architecture, Applications and Research Challenges
Syed Hassan Ahmed
 
Secure final
Secure finalSecure final
Secure final
Vinoth Barithi
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
International journal of engineering issues vol 2015 - no 2 - paper2
International journal of engineering issues   vol 2015 - no 2 - paper2International journal of engineering issues   vol 2015 - no 2 - paper2
International journal of engineering issues vol 2015 - no 2 - paper2
sophiabelthome
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
Dharmendrasingh417
 
The efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationThe efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integration
Faizal Faizi
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 

Similar to Cyber security for the smart grid, Clifford Neuman, Information Sciences Institute, USC (20)

02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
smart grid
smart gridsmart grid
smart grid
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSO
 
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
3.3_Cyber Security R&D for Microgrids_Stamp_EPRI/SNL Microgrid
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Smart metering and control of transmission system
Smart metering and control of transmission systemSmart metering and control of transmission system
Smart metering and control of transmission system
 
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
 
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
 
Smart Grid & SCADA Systems
Smart Grid & SCADA SystemsSmart Grid & SCADA Systems
Smart Grid & SCADA Systems
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
Safeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory TechniqueSafeguard the Automatic Generation Control using Game Theory Technique
Safeguard the Automatic Generation Control using Game Theory Technique
 
Cyber Physical System: Architecture, Applications and Research Challenges
Cyber Physical System: Architecture, Applicationsand Research ChallengesCyber Physical System: Architecture, Applicationsand Research Challenges
Cyber Physical System: Architecture, Applications and Research Challenges
 
Secure final
Secure finalSecure final
Secure final
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
International journal of engineering issues vol 2015 - no 2 - paper2
International journal of engineering issues   vol 2015 - no 2 - paper2International journal of engineering issues   vol 2015 - no 2 - paper2
International journal of engineering issues vol 2015 - no 2 - paper2
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
 
The efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integrationThe efficacy and challenges of scada and smart grid integration
The efficacy and challenges of scada and smart grid integration
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 

More from University of Southern California

Energy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMD
Energy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMDEnergy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMD
Energy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMDUniversity of Southern California
 
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'University of Southern California
 
Ubiquitous sustainable cities, Roger Ghanem University of Southern California
Ubiquitous sustainable cities, Roger Ghanem University of Southern CaliforniaUbiquitous sustainable cities, Roger Ghanem University of Southern California
Ubiquitous sustainable cities, Roger Ghanem University of Southern CaliforniaUniversity of Southern California
 

More from University of Southern California (6)

Energy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMD
Energy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMDEnergy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMD
Energy efficient transport in 2020, Paul Wuebben, Clean fuels officer, AQMD
 
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
 
SCE smart grid development, Paul De Martini, SCE
SCE smart grid development, Paul De Martini,  SCESCE smart grid development, Paul De Martini,  SCE
SCE smart grid development, Paul De Martini, SCE
 
Ubiquitous sustainable cities, Roger Ghanem University of Southern California
Ubiquitous sustainable cities, Roger Ghanem University of Southern CaliforniaUbiquitous sustainable cities, Roger Ghanem University of Southern California
Ubiquitous sustainable cities, Roger Ghanem University of Southern California
 
Creating a low carbon future by Von Dollen, EPRI
Creating a low carbon future by Von Dollen, EPRICreating a low carbon future by Von Dollen, EPRI
Creating a low carbon future by Von Dollen, EPRI
 
Draft Agenda for Southern Caifornia Smart Grid Symposium
Draft Agenda for Southern Caifornia Smart Grid SymposiumDraft Agenda for Southern Caifornia Smart Grid Symposium
Draft Agenda for Southern Caifornia Smart Grid Symposium
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Cyber security for the smart grid, Clifford Neuman, Information Sciences Institute, USC

  • 1. Cyber Security for the Smart Grid Dr. Clifford Neuman Center for Computer Systems Security Information Sciences Institute University of Southern California Southern California Smart Grid Research Symposium USC, Los Angeles October 6, 2009
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.