SlideShare a Scribd company logo
1 of 41
Download to read offline
Power System Cybersecurity
Threats, Challenges, and Barriers
Nathan	Wallace,	PhD,	CSSA	
Cybersecurity	Research	Engineer	
	
05	Jan.	2017
Personal	Background	
Volunteering:		
EE	Intern	 EE	Intern	 Associate	Engineer	 Research	Associate	 VisiHng	Lecturer	
Staff	Engineer	 Cybersecurity	Researcher
Overview	
•  Why			
State	of	Affairs:	Grid	&	Cyberspace		
Cybersecurity	=>	Safety			
Misconcep.ons	&	Challenges		
	
	
•  What	are	we	missing	
Cyber	aware	devices	and	systems	
80	–	95%	of	
the	Grid’s	
Cyber	Assets	
Fall	Outside	
NERC-CIP	
80	–	90%	of	
the	Grid’s	
Cyber	Assets	
are	Outside	
NERC-CIP	
Most	Violated:		
NERC-CIP	
&	
NERC-PRC
Security:			“The	facet	of	reliability	that	relates	to	the	degree	of	certainty	that	a	
				relay	or	relay	system	will	not	operate	incorrectly.”		cyber	device	or					
Na.on	States	
Hackers	
Vendors	
Inten.onal	
Insider	
Accident	
Insider	
Misconfigura.on	
Cyber	
Security	
Cybersecurity	=	Physical	+	EMI	+	Digital[Compu.ng	&	Communica.ons]
Two	Infrastructures		
Residen.al		 Industrial	Commercial	
GeneraHon	 Transmission	
DistribuHon	
•  Physical	
•  Cyber	
Control	Center	
Distribu.on	
Control	Center	
RTOs/ISO
2016	Tech	Expo:	Virtual	reality	used	to	fix		
																														a	steam	turbine	that’s	located	hours	away.
State	of	Affairs:	The	Grid	
Monitoring	Points	 Control	Point	
Markets	 OperaHons	 Service	Provider	
GeneraHon	
Transmission	 DistribuHon	
Customer
State	of	Affairs:	The	Grid	
Communica.on	
CYBER	
Northeast	
Outage	2003	
Arizona	
Outage	2007	
FPL	
Outage	2008	
Ukraine		
AXack	2016	
Load	Lost	 61,800	MW	 400	MW	 4,300	MW	 230,000	Customers	
Intent	 Uninten.onal	 Uninten.onal	 Uninten.onal	 Inten.onal	
Cyber	
Caused	
Yes	 Yes	 Yes	 Yes	
Computa.onal
“Our	expecta.ons	is	that	the	modernized	electricity	grid	
will	be	100	to	1000	.mes	larger	than	the	Internet”																	
						 	 	 	 	–	CISCO	VP	
Advanced	
Metering	
Electric		
Vehicles	
Distributed		
Genera.on	
Grid	Moderniza.on	
Distribu.on	
Automa.on	
State	of	Affairs:	The	Grid	
‘Grid	of	Things’
State	of	Affairs	Cyberspace	
hmp://map.ipviking.com/	
•  Avg	price	per	0-Day:		
	
•  Avg	number	of	days	0-day	remains	private:	
•  Avg	number	of	days	.ll	patch	is	issued:		
•  Avg	of	newly	created	malware	per	day:	
	
•  Avg	dwell	.me	.ll	detec.on:			
USD	$40,000	-	$160,000	
151	days	
300,000	
205	days	
120	days
State	of	Affairs	Cyberspace	&	Cyberwar		
“Global Cyber Weapon Market
Expected to Reach
USD 522 billion in 2021.”
-	Global	Newswire,	2015	
		Transparency	Market	Research	Report
Cybersecurity		=>	Safety			
21	Lines	of	Code	
Aurora	Generator	Test
Distribu.on		
System	Operator	
Virtual		
Power	Plant	
Cybersecurity		=>	Safety
Common	MisconcepHons	
•  We	are	not	a	target.		
•  Minimum	security	needed,	we	are	low	impact.	
•  We	are	not	connected	to	the	Internet.			
Ipviking,	Shodan,	ICS-CERT,	Foreign	FTP	servers			
Ukraine,	Changing	Standards,	State	Regula.ons		
Stuxnet,	Repor.ng	capacity	to	RTO,	Firewalls		
Challenges
MisconcepHon:	We	are	not	a	target.		
	 Ipviking,
MisconcepHon:	We	are	not	a	target.		
	 Ipviking,		Shodan,
MisconcepHon:	We	are	not	a	target.		
	 Ipviking,		Shodan,		ICS-CERT,		
0	
50	
100	
150	
200	
250	
300	
350	
2012	 2013	 2014	 2015	
Incidents
MisconcepHon:	We	are	not	a	target.		
	 Ipviking,		Shodan,		ICS-CERT,		
•  Passwords,	electrical	drawings,	communica.on	drawings	(IP,	Protocols),	etc	
•  File	servers	contained	malicious	code		
71	Genera.on	Plants	
~20,000	Files	
Genera.on,	Transmission,		
Distribu.on	Systems	
“From	New	York	to	California”		
Source:	AP	Inves.ga.on:	US	Power	Grid	Vulnerable	to	Foreign	Hacks.	Dec.	21,	2015						
“Digital	clues	pointed	to		
foreign	hackers.”	
Seven	file	(FTP)	servers		
with	no	authoriza.on		
FTP	servers
MisconcepHon:	Minimum	security	needed,	we	are	low	impact.		
	 Ukraine,		
30	Sta.ons	De-energized	
•  7						110	kV	sta.ons	
•  23				35	kV	sta.ons	
•  ~3	to	6	hrs	to	re-energize	
•  230,000	customers	impacted	
•  Telephone	denial	of	service	
•  Breached	6	months	prior	
•  Altered	firmware	at	substa.ons		
“We	were	blinded”	
Dec	23	2015	
Control	Center	Operator	
Source:	E-ISAC.	Analysis	of	the	Cyber	Amack	on	the	Ukrainian	Power	Grid.	March	18,	2016
MisconcepHon:	Minimum	security	needed,	we	are	low	impact.		
	 Ukraine,		Changing	Standards,		
NERC	
Physical	
Security	v3	
Voluntary		 Mandatory	
2000	
Metcalf	
Amack	
Ukraine	
2015	
Dec	
2013	
Apr	
Stuxnet	
Discovered	
2010	
1st	IEEE	
Substa.on	
Sec	Standard	
2002	
Energy	
Policy	Act	
2005	
2005	
NERC		
updates	
Asset	ID	
CIP-002	v4	
2010	
FERC	
designates	
NERC	as	ERO	
2007	
FERC		
Approves	
Asset	ID	
CIP-002	v4	
2012	 2015	
NERC		
Effec.ve	
Asset	ID	
CIP-002	v5.1	
2017	
	FERC	to	
Approve	
NERC	
CIP	v7	
‘Code	moves	faster	than	Policy’
MisconcepHon:	Minimum	security	needed,	we	are	low	impact.		
	 Ukraine,		Changing	Standards,			State	Regula.ons
MisconcepHon:	We	are	not	connected	to	the	Internet.			
		
	
Stuxnet,
MisconcepHon:	We	are	not	connected	to	the	Internet.			
		
	
Stuxnet,		 Repor.ng	Capacity	to	RTO,
MisconcepHon:	We	are	not	connected	to	the	Internet.			
		
	
Stuxnet,		Repor.ng	Capacity	to	RTO,		 Firewall	
Aug	13th	2016,	accidental	release	of	0-day	vulnerabili.es	kept	by	a	Govt.	(Cisco,	
Juniper,	etc.)
Challenges	 No	Longer	Can	
Set	It	and	Forget	It
Challenges	
Cybersecurity:	Who’s	Responsibility	is	it?	
IT	Dept.	 OT	Dept.	
t	
-  So$ware	to	determine	how	power	flows	and	when	breakers	open/closes	
-  Apache,	Telnet,	SSH,	MySQL,	FTP,	LDAP,	Embedded	Linux,	Windows,	etc.		
-  Virtual	Power	Plants	and	protec.on	relays,	so$ware	defined	networking
Challenges	 Complexity	and	Age	
Power	Grid	Space	Sta.on	
VS	
TV	Integrated	Circuit	
•  Age	is	physical	and	
						has	visual	indicators			
•  Age	is	an	abstrac.on	and		
	exists	in	so$ware
Challenges	 Vendor	Confusion/Sales	Pitches	
Example	1:	Install	smart	meter	to	‘side-step	cybersecurity	requirements’			
					Issue:	How	are	the	values	being	used	when	received… 	
Example	2:	
Issue:	So$ware	and	protocols	have	a	tendency	to	become		
	 	vulnerable	over	.me.	(Poodle,	Heartbleed,	Shellshock,	etc)
What	are	we	missing
Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity
Vision: By	2020,	resilient	energy	delivery	systems	are	designed,	installed,	operated,	and	
maintained	to	survive	a	cyber	incident	while	sustaining	cri.cal	func.ons.		
Strategies:	 Build	Culture	
of	Security		
Asses	and	
Monitor	Risk	
Protec.ve	
Measures	to	
Reduce	Risk	
Manage		
Incidents		
Sustain	
Security		
Improvements	
Near-term
(0–3 years)
By 2013	
Mid-term
(4–7 years)
By 2017
Long-term
(8–10
years)
By 2020
Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity
Vision: By	2020,	resilient	energy	delivery	systems	are	designed,	installed,	operated,	and	
maintained	to	survive	a	cyber	incident	while	sustaining	cri.cal	func.ons.		
Near-term
(0–3 years)
By 2013	
3.1 Capabilities to evaluate the robustness and
survivability of platforms, systems, networks, and systems
Strategies:	 Build	Culture	
of	Security		
Asses	and	
Monitor	Risk	
Protec.ve	
Measures	to	
Reduce	Risk	
Manage		
Incidents		
Sustain	
Security		
Improvements
Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity
Vision: By	2020,	resilient	energy	delivery	systems	are	designed,	installed,	operated,	and	
maintained	to	survive	a	cyber	incident	while	sustaining	cri.cal	func.ons.		
Near-term
(0–3 years)
By 2013	
4.1 Tools to identify cyber events across all levels of
energy delivery system networks
4.2 Tools to support and implement cyber attack
response decision making for the human operator
Strategies:	 Build	Culture	
of	Security		
Asses	and	
Monitor	Risk	
Protec.ve	
Measures	to	
Reduce	Risk	
Manage		
Incidents		
Sustain	
Security		
Improvements
Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity
Vision: By	2020,	resilient	energy	delivery	systems	are	designed,	installed,	operated,	and	
maintained	to	survive	a	cyber	incident	while	sustaining	cri.cal	func.ons.		
4.4	Real-.me	forensics	capabili.es	
	
4.5	Cyber	event	detec.on	tools	that	evolve	
with	the	dynamic	threat	landscape	 		
Strategies:	 Build	Culture	
of	Security		
Asses	and	
Monitor	Risk	
Protec.ve	
Measures	to	
Reduce	Risk	
Manage		
Incidents		
Sustain	
Security		
Improvements	
Mid-term
(4–7 years)
By 2017
Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity
Vision: By	2020,	resilient	energy	delivery	systems	are	designed,	installed,	operated,	and	
maintained	to	survive	a	cyber	incident	while	sustaining	cri.cal	func.ons.		
Strategies:	 Build	Culture	
of	Security		
Asses	and	
Monitor	Risk	
Protec.ve	
Measures	to	
Reduce	Risk	
Manage		
Incidents		
Sustain	
Security		
Improvements	
2.3	Tools	for	real-.me	security	state	
monitoring	and	risk	assessment	of	all	energy	
delivery	system	architecture	levels	and	across	
cyber-physical	domains.		
Long-term
(8–10
years)
By 2020
Exhibit 4.1.1 Strategies for Achieving Energy Delivery Systems Cybersecurity
Vision: By	2020,	resilient	energy	delivery	systems	are	designed,	installed,	operated,	and	
maintained	to	survive	a	cyber	incident	while	sustaining	cri.cal	func.ons.		
Strategies:	 Build	Culture	
of	Security		
Asses	and	
Monitor	Risk	
Protec.ve	
Measures	to	
Reduce	Risk	
Manage		
Incidents		
Sustain	
Security		
Improvements	
4.7	Capabili.es	for	automated	response	to	
cyber	incidents.	 		
Long-term
(8–10
years)
By 2020
Business	Layer	
Life-Cycle	Management	Layer	
OperaHons	Layer	
Physical	Layer	
Cyber-Physical	Layer	
Requirements		 Regula.ons	 Incen.ves	
Design	 Upgrades	 Ops	 Disposal	
Design	
Sensors	
Compu.ng	
Plaxorm	
Models	
Power	System	State	
Controller	
Monitor	 Control	
Disposal	
Current	 New		
Models	
Cyber	 Phys.	
CPS	
Phys.	
Econ.	
What	are	we	missing
Cyber	Infrastructure		
(ComputaHon	&	CommunicaHon)	
ProtecHon	and	Control		
Detec.on,	Processing,	
Manipula.on			
Physical	Infrastructure	
(Flow	of	Power)		
Inputs:	Currents,	Voltages,	Impedance,	
Status	(open,close,	lockout)	
Output:	Open/Close	Bkr,		+/-	Vars,		
Inputs:	Topology,	traffic	flows,		
deep	packet	inspec.on,	communica.on	
state,	state	of	physical	power	system		
Output:	NOTHING!	
What	are	we	missing
Ques.ons	&	Thoughts?	
Nathan	Wallace,	PhD,	CSSA	
nathanwallace@computer.org	
@NathanSWallace	
Safety?
IEEE Computer Society
New Orleans Chapter
MeeHng		
Ideas	
MeeHng		
LocaHons	
Take	our	Survey	
What	are	your	Interests	and	Ideas?		
The scope of the Computer Society shall encompass all aspects of theory,
design, practice, and application relating to computer and information
processing science and technology.
hXp://sites.ieee.org/neworleans/cs-survey/

More Related Content

What's hot

DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentationguest85a34f
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiClubHack
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar Nnull The Open Security Community
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToJim Gilsinn
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...EnergySec
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksMaurice Dawson
 
Consequence Informed Cyber Security
Consequence Informed Cyber Security Consequence Informed Cyber Security
Consequence Informed Cyber Security Dragos, Inc.
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...EnergySec
 
Securing Electric Utility Infrastructure
Securing Electric Utility InfrastructureSecuring Electric Utility Infrastructure
Securing Electric Utility InfrastructureDragos, Inc.
 
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...SparkCognition
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyEnclaveSecurity
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustryDragos, Inc.
 
RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTLee Wei Yeong
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...EnergySec
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to SecurityPriyanka Aash
 

What's hot (20)

DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber Attacks
 
Consequence Informed Cyber Security
Consequence Informed Cyber Security Consequence Informed Cyber Security
Consequence Informed Cyber Security
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
 
Securing Electric Utility Infrastructure
Securing Electric Utility InfrastructureSecuring Electric Utility Infrastructure
Securing Electric Utility Infrastructure
 
Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
 
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
 
RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APT
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to Security
 

Viewers also liked

IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetNathan Wallace, PhD, PE
 
Smart grid cyber
Smart grid cyberSmart grid cyber
Smart grid cyberDale Butler
 
Border security 2013
Border security 2013Border security 2013
Border security 2013Dale Butler
 
Connected Identity: Benefits, Risks & Challenges
Connected Identity: Benefits, Risks & ChallengesConnected Identity: Benefits, Risks & Challenges
Connected Identity: Benefits, Risks & ChallengesWSO2
 
Global Cyber Security on Earth + in Space
Global Cyber Security on Earth + in SpaceGlobal Cyber Security on Earth + in Space
Global Cyber Security on Earth + in SpaceDIGIJAKS
 
How to design a linear control system
How to design a linear control systemHow to design a linear control system
How to design a linear control systemAlireza Mirzaei
 
Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16Mark Goldstein
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Iot(internet of things)
Iot(internet of things)Iot(internet of things)
Iot(internet of things)又瑋 賴
 
Internet of things for agriculture
Internet of things for agricultureInternet of things for agriculture
Internet of things for agricultureKG2
 
IOT based smart security and monitoring devices for agriculture
IOT based smart security and monitoring devices for agriculture IOT based smart security and monitoring devices for agriculture
IOT based smart security and monitoring devices for agriculture sneha daise paulson
 
IoT for Agriculture - Drones / UAV
IoT for Agriculture - Drones / UAVIoT for Agriculture - Drones / UAV
IoT for Agriculture - Drones / UAVStart and Growth
 
The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.Laurie Lamberth
 
Jose fernando temú santiago 4to electricidad.. powe pont
Jose fernando temú santiago 4to electricidad.. powe pontJose fernando temú santiago 4to electricidad.. powe pont
Jose fernando temú santiago 4to electricidad.. powe pontFernando Santiago
 

Viewers also liked (19)

IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
 
Smart grid cyber
Smart grid cyberSmart grid cyber
Smart grid cyber
 
Border security 2013
Border security 2013Border security 2013
Border security 2013
 
Connected Identity: Benefits, Risks & Challenges
Connected Identity: Benefits, Risks & ChallengesConnected Identity: Benefits, Risks & Challenges
Connected Identity: Benefits, Risks & Challenges
 
Global Cyber Security on Earth + in Space
Global Cyber Security on Earth + in SpaceGlobal Cyber Security on Earth + in Space
Global Cyber Security on Earth + in Space
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
How to design a linear control system
How to design a linear control systemHow to design a linear control system
How to design a linear control system
 
Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
IoT in agri-food
IoT in agri-foodIoT in agri-food
IoT in agri-food
 
Graffiti fur
Graffiti furGraffiti fur
Graffiti fur
 
Smart city and agriculture
Smart city and agricultureSmart city and agriculture
Smart city and agriculture
 
Iot(internet of things)
Iot(internet of things)Iot(internet of things)
Iot(internet of things)
 
Internet of things for agriculture
Internet of things for agricultureInternet of things for agriculture
Internet of things for agriculture
 
IOT based smart security and monitoring devices for agriculture
IOT based smart security and monitoring devices for agriculture IOT based smart security and monitoring devices for agriculture
IOT based smart security and monitoring devices for agriculture
 
IoT for Agriculture - Drones / UAV
IoT for Agriculture - Drones / UAVIoT for Agriculture - Drones / UAV
IoT for Agriculture - Drones / UAV
 
The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.
 
Presentación infor
Presentación inforPresentación infor
Presentación infor
 
Jose fernando temú santiago 4to electricidad.. powe pont
Jose fernando temú santiago 4to electricidad.. powe pontJose fernando temú santiago 4to electricidad.. powe pont
Jose fernando temú santiago 4to electricidad.. powe pont
 

Similar to Power System Cybersecurity: Threats, Challenges, and Barriers

Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Dave Darnell
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsSteven SIM Kok Leong
 
2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph MartinezReenergize
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar PresentationCertrec
 
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power SystemsNathan Wallace, PhD, PE
 
ITBN 2008 - Evolution of Key Risks - Dr. Richard Reiner - 200808.pptx
ITBN 2008 - Evolution of Key Risks - Dr. Richard Reiner - 200808.pptxITBN 2008 - Evolution of Key Risks - Dr. Richard Reiner - 200808.pptx
ITBN 2008 - Evolution of Key Risks - Dr. Richard Reiner - 200808.pptxssuser332fc01
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...promediakw
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Yokogawa1
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
Session 4B - Marty Howell
Session 4B - Marty HowellSession 4B - Marty Howell
Session 4B - Marty HowellReenergize
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdfdhanywahyudi17
 
CIP Version 5 Immersion Workshop
CIP Version 5 Immersion WorkshopCIP Version 5 Immersion Workshop
CIP Version 5 Immersion WorkshopEnergySec
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...promediakw
 
The Future of Cybersecurity in Energy Sector
 The Future of Cybersecurity in Energy Sector The Future of Cybersecurity in Energy Sector
The Future of Cybersecurity in Energy Sectoracinfotec
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Cohesive Networks
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementPriyanka Aash
 

Similar to Power System Cybersecurity: Threats, Challenges, and Barriers (20)

Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical Threats
 
2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems
2018 SEL MSPSC Panel Slides on Creating Inherently Safe Cyber Power Systems
 
ITBN 2008 - Evolution of Key Risks - Dr. Richard Reiner - 200808.pptx
ITBN 2008 - Evolution of Key Risks - Dr. Richard Reiner - 200808.pptxITBN 2008 - Evolution of Key Risks - Dr. Richard Reiner - 200808.pptx
ITBN 2008 - Evolution of Key Risks - Dr. Richard Reiner - 200808.pptx
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
What is NOC?
What is NOC?What is NOC?
What is NOC?
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Session 4B - Marty Howell
Session 4B - Marty HowellSession 4B - Marty Howell
Session 4B - Marty Howell
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
CIP Version 5 Immersion Workshop
CIP Version 5 Immersion WorkshopCIP Version 5 Immersion Workshop
CIP Version 5 Immersion Workshop
 
SCADA Security in CDIC 2009
SCADA Security in CDIC 2009SCADA Security in CDIC 2009
SCADA Security in CDIC 2009
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
The Future of Cybersecurity in Energy Sector
 The Future of Cybersecurity in Energy Sector The Future of Cybersecurity in Energy Sector
The Future of Cybersecurity in Energy Sector
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 

Recently uploaded

Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

Power System Cybersecurity: Threats, Challenges, and Barriers