SlideShare a Scribd company logo
Running head: SMART GRID
1
SMART GRID 2
SMART GRID 1
CSIA 459: Evaluating Emerging Technologies
Technology Review #2: Emerging Application of Technology in
a Critical Infrastructure
Annotated Bibliography for Smart Grid
11/25/2018
Introduction
The Smart Grid is the evolution of our current electric grid,
using new technologies to optimize power conservation and
delivery. The “Grid” refers to the electric grid, a network of
transmission lines, substations, transformers and more that
supply our homes or businesses with electricity from the power
plant. The digital technology that enables two - way
communication between the utility and its customers and the
transmission line sensing is what makes the grid smart. Like the
Internet, the Smart Grid consist of controls, computers,
automation and new technologies and equipment working
together, but in this case, these technologies work with the
electrical grid to meet our rapidly changing electrical demand
digitally. The Smart Grid is a unique opportunity to transform
the energy industry into a new era of efficiency, affordability
and reliability that will add value to our society.
Today, the demand for power continues to grow rapidly using
more electronic devices than ever before and the current
electrical system is outdated and totally depends on equipment
nearing the end of its lifetime of use. Smart grids update this
infrastructure to ensure that safety issues are addressed, and
power is consistently delivered and that the system is managed
competently. Without intelligent grid improvements, the old
system, which is already close to capacity, will not be able to
meet the future challenges. Cybersecurity solutions for critical
energy infrastructure are essential in order to deliver reliable
energy. In today's increasingly connected world, where cyber
threats are highly sophisticated, it is unwise to think that energy
supply systems are isolated or immune from compromise, but
the Smart grid offers so many fundamental changes in human
intelligence, prevention, management and recovery that, despite
the introduction of new vulnerabilities, it essentially makes the
electrical system safer.
Annotated Bibliography for Smart Grid
1. Pesesky, J. L. (2016). The vulnerabilities of the advanced
metering infrastructure in the smart grid (Order No. 10154802).
Available from ProQuest Dissertations & Theses Global.
(1836799165). Retrieved from
http://ezproxy.umuc.edu/login?url=https://search-proquest-
com.ezproxy.umuc.edu/docview/1836799165?accountid=14580
Justine Pesesky in his dissertation, talks about how the
intelligent grid uses innovative technology to improve the
experience of the consumer. The intelligent grid features allow
intelligent appliances and smart meters to transmit information
wirelessly to electrical utilities, and how the confidentiality of
the consumer, as well as the accessibility and integrity of
electricity from the Smart Grid, could be compromised by an
attacker. In his research, he how the smart meters can be
infiltrated due to the amount of personal data stored in it, and
how a smart meter lets consumers communicate with the Smart
Grid. The intelligent meter replaces mechanical meters and
records data transferred to supplied energy. Hel also mention
how a cyber attack can threaten the consumer with the
availability and integrity of electricity from the intelligent grid
and how it will affect the confidentiality of the consumers. The
confidentiality, integrity and availability of AMI security
concerns focus on three main areas. Confidentiality refers to the
privacy of customer information on smart meters. The integrity
of the advanced metering system means that changes in smart
meter data are prevented. The three areas are most critical
because some applications and systems deal directly with the
availability of power to consumers. He suggested that to
decrease Smart Grid cyber-attacks solution should include
recognition of attack before it surfaces and improved safety
features could increase security of consumer and the systems.
2. Mishra, S. (2016). Cyber-security in smart grid (Order No.
10679151). Available from ProQuest Dissertations & Theses
Global. (1992469368). Retrieved from
http://ezproxy.umuc.edu/login?url=https://search-proquest-
com.ezproxy.umuc.edu/docview/1992469368?accountid=14580
Subhankar Mishra in his dissertation, talks about how the Smart
grid is considered to be a revolutionary and evolutionary power
grid regime. In addition to the passive features of the Smart
Grid, cyber security is a critical problem because millions of
electronic devices are linked via communication networks
across electrical power plants, which have an enormous impact
on the accuracy of such a widespread infrastructure. He stated
that the first cyber security problem is the packet-based attacks
and the Optimal Inspection Points (OIP) problem in the
Supervisory Control and Data Acquisition (SCADA) system,
which seeks to find a subset of nodes in a given network to
perform the Deep Packet Inspection to maximize the number of
scanned packets while meeting the delay limit. Smart grid
energy efficiency depends on customers who know how to
respond to demand and are actively involved in products and
technologies. A more intelligent social power attack using
spiraling shortcomings to increase the impact is proposed and
its two variations of continuous and discontinuous selection are
identified. Controlled shedding of loads as a protection strategy
to reduce the impact of cascade failures.
3. Hahn, A. L. (2013). Cyber security of the smart grid: Attack
exposure analysis, detection algorithms, and testbed evaluation
(Order No. 3566005). Available from ProQuest Dissertations &
Theses Global. (1418014634). Retrieved from
http://ezproxy.umuc.edu/login?url=https://search-proquest-
com.ezproxy.umuc.edu/docview/1418014634?accountid=14580
Adam Hahn in his dissertation, talks about how intelligent grid
technologies are used to improve grid resilience and efficiency,
they are also more dependent on cyber resources that can be
vulnerable to attacks. His thesis introduces three components
which offer new ways to improve the cyber security of the smart
grid. Although all critical infrastructure domains acquire certain
risks from cyber-attacks, the electricity grid is probably the
most critical and vulnerable of these. The electric grid is a key
foundation of our society and it is essential for all other critical
infrastructure sectors to operate. The grid is also more
vulnerable to cyber-attacks than many domains due to its large
number of parties involved, mainly private ownership and
strongly interdependent communications systems. He concluded
with how critical infrastructure has become increasingly caused
the tech world to worry about future cyber-attacks and how the
electrical grid relies heavily on cyber infrastructures for
electronic control and monitoring. This paper talks about the
increased automation and how it aims to improve the reliability
of critical control and protection systems. However, if an
attacker can access substation systems, breakers can cause
serious damage to the grid.
4. I. Darwish, O. Igbe, O. Celebi, T. Saadawi and J. Soryal,
"Smart Grid DNP3 Vulnerability Analysis and
Experimentation," 2015 IEEE 2nd International Conference on
Cyber Security and Cloud Computing (CSCloud)(CSCLOUD),
New York, NY, USA, 2015, pp. 141-
147.doi:10.1109/CSCloud.2015.86
https://www.computer.org.ezproxy.umuc.edu/csdl/proceedings/c
scloud/2015/9300/00/9300a141-abs.html
This paper highlights various security threats and
vulnerabilities in smart grids using the Distributed Network
Protocol (DNP3) as a real - time communication protocol. The
paper talks about how the protocol DNP3 is a widely used
protocol for communication. North America power system.
Originally designed for traditional power grid and operation.
Smart grid, the current communication protocols are reused.
This paper also spoke about the use of intrusion detection
system will be necessary to identify attackers targeting different
part of the smart grid infrastructure.
5. McCary, E. (2015). Home area network security and
accountability in the smart grid (Order No. 3726101). Available
from ProQuest Dissertations & Theses Global. (1733231165).
Retrieved from
http://ezproxy.umuc.edu/login?url=https://search-proquest-
com.ezproxy.umuc.edu/docview/1733231165?accountid=14580
Eric Mccary, in his dissertation, talks about the Internet of
Things has applications has become one of the new technologies
for smart grids. One of the beneficiaries of such applications is
smart home appliances. The Smart grid security landscape and
work on creating a more accountable environment in the smart
grid home network. The intelligent grid is one of the most
crucial and fast-growing technologies in the electric power
system. The paper talked about how the intelligent grid is a
system that incorporates information and communication
network technologies with the traditional power grid. This paper
presented a thorough review of home networks and smart home
architecture. It discussed wireless and wired communications
technologies most commonly used in HANs. The Home area
network security have been found to play a key role in smart
home appliance technology designed on the basis of the Internet
of Things (IoT) concepts.
6. E. U. Haq, H. Xu, L. Pan and M. I. Khattak, "Smart Grid
Security: Threats and
Solution
s," 2017 13th International Conference on Semantics,
Knowledge and Grids (SKG), Beijing, China, 2018, pp. 188-
193. doi:10.1109/SKG.2017.00039
https://www-computer-
org.ezproxy.umuc.edu/csdl/proceedings/skg/2017/2558/00/2558
01a188-abs.html
The article talks about the improvement of the existing
electricity infrastructure with intelligent grid technology
compounds existing threats with new ones. The detection of
security threats to the next generation of smart grids is crucial
for the implementation of a safer national power grid. The
advantages of the smart grid are obvious, but we have to make
sure that we move deliberately and in stages so that no loop-
hole will be missed and all security measures are in place to roll
out the necessary infrastructure. The objectives of the smart
grid are based on greater efficiency, reliability and safety.
While securing the smart grid is an apparently overwhelming
task, continuous security efforts are essential to ensure that the
smart grid benefits outweigh the risks. By identifying threats,
we can develop cyber security defense strategies that include
preventing, detecting, responding and recovering them.
7. Fan, X., & Gong, G. (2013). Security challenges in smart-
grid metering and control systems. Technology Innovation
Management Review, 3(7), 42-49. Retrieved from
http://ezproxy.umuc.edu/login?url=https://search-proquest-
com.ezproxy.umuc.edu/docview/1614472799?accountid=14580
This technology review talks about how the Smart grid is an
updated electricity network based on two-way electronic
communications between supplier and consumer, which in turn
supports extremely intelligent metering and monitoring systems.
In the review, the authors talked about it a challenge to design
technologically advanced and robust security mechanisms that
can easily be deployed to protect communications between the
various layers of the smart grid. In view of the growing
importance of energy utilities in our everyday lives, smart grid
technology presents new security challenges that need to be
resolved. I have to agree with the review, and more needs to be
done to prevent all systems and consumers cyber-attacks and
new security measures must be developed to address these
threats. The electrical sector's cyber security is a national
concern. As the power system becomes increasingly challenging
and depends on information technology and communication
infrastructures, the concern is growing. This dependence has
seen a noticeable increase in the vulnerability of the power
system to cyber-attacks. The management and security of these
components and systems in energy assurance plans should be
addressed because of the potential for power outages caused by
cyber-attacks.
.
8. Deb Nath, A. P. (2016). Hardware-based authentication and
security for advanced metering infrastructure (Order No.
10473853). Available from ProQuest Dissertations & Theses
Global. (1877964746). Retrieved from
http://ezproxy.umuc.edu/login?url=https://search-proquest-
com.ezproxy.umuc.edu/docview/1877964746?accountid=14580
This dissertation talks about how America's power system
infrastructure has undergone a crucial transition. The huge
change in infrastructure from the private and public sectors to
fossil - fuel power plants, solar power plants and wind farms
affects every single entity. Changes in the energy supply chain
present new obstacles for the current grid. The paper also talks
about the introduction of information technology (IT), industrial
control systems (ICS) and advanced security infrastructure in
the traditional power system can play an important role in the
necessary changes without interfering with the safety of end
users of electricity. However, to meet the basic safety
requirements of the smart grid, smart meters need to be safely
authenticated and authenticated by other parties and devices and
to handle private information securely. As information
technology (IT) and telecommunications networks are directly
involved in the smart grid, the challenges associated with these
sectors have become security risks to the evolving power
system. Cybersecurity must protect the grid system not only
from attacks by angered employees, industrial extortion secret
agents and terrorists, but also from unintentional compromises
of vital information and power blackouts due to user errors,
equipment failures and natural disasters.
9. Yan, J. (2017). Smart grid security against massive blackouts
(Order No. 10289192). Available from ProQuest Dissertations
& Theses Global. (1925957297). Retrieved from
http://ezproxy.umuc.edu/login?url=https://search-proquest-
com.ezproxy.umuc.edu/docview/1925957297?accountid=14580
This dissertation talks about how the safety of the intelligent
grid is a significant challenge in cyber and physical fields. The
National Institute of Standards and Technologies (NIST)
categorizes the monolithic electricity infrastructure into seven
domains: generation, storage, allocation, deployment, electricity
markets, providers and consumers. It also mentioned how the
smart grid includes complicated cyber-physical energy systems
in a diverse power, energy, control, sensory, computer and
communication network. The emerging intelligent grid
comprises legacy hardware and software systems, operates
under multiple entities and regulations, faces increased system
stress and uncertainty and attracts deceptive criminals.
Electricity grids are complex networked systems that are
vulnerable to internal and external disturbances, including
stress, failure of equipment, malfunction and natural disasters.
The interconnected power and energy systems, however, have
presented physical safety analysis challenges. Cybersecurity has
been widely acknowledged as a key feature and challenge in
smart grid development. Utilities have followed the principles
of transparency, credibility and availability to install secure
public and corporate networks. In the meantime, the intelligent
grid is still far from being immune from cyber penetration.
Cybersecurity features in both control centers and field devices
are often insufficient, obsolete or missing in legacy power
systems.
10. Bloomer, P. (2016). Hacking internet of things to disrupt the
supply of power (Order No. 10248561). Available from
ProQuest Dissertations & Theses Global. (1862183277).
Retrieved from
http://ezproxy.umuc.edu/login?url=https://search-proquest-
com.ezproxy.umuc.edu/docview/1862183277?accountid=14580
This dissertation talks about what the potential impact on the
Power Grid is if terrorists choose to attack devices outside the
Smart Grid or in power generation / distribution points on the
consumer Internet of Things (IoT). The paper also talks about
how the IoT security is important for analysis, as these devices
can have a substantial impact of many Americans and others
worldwide, even if they do not use IoT devices at home. These
devices are susceptible to many attack methods and may affect
power companies ' ability to distribute power to consumers.
Even the Federal Government has several relevant agencies in
addressing the problem of CPS cyber security on the power grid
and physical systems. Attacks on IoT have been taking place for
many years, but attacks on consumer IoT devices have been
limited due to the relatively small market that currently
comprises approximately 4 billion devices according to Gartner
research. The number of IoT devices used in the household is
expanding. All these devices are full of insecurities with many
security vulnerabilities that can be controlled on every device. I
believe If the security is not increased or tightened on these
devices, they can be intentionally used to disable or to
manipulate the device to change CPS settings that use electrical
energy and that can cause a major disaster.
References
Bloomer, P. (2016). Hacking internet of things to disrupt the
supply of power (Order No. 10248561). Available from
ProQuest Dissertations & Theses Global. (1862183277).
Retrieved from
http://ezproxy.umuc.edu/login?url=https://search-proquest-
com.ezproxy.umuc.edu/docview/1862183277?accountid=14580
Darwish, O. Igbe, O. Celebi, T. Saadawi and J. Soryal, "Smart
Grid DNP3 Vulnerability Analysis and Experimentation," 2015
IEEE 2nd International Conference on Cyber Security and
Cloud Computing (CSCloud)(CSCLOUD), New York, NY,
USA, 2015, pp. 141-147.doi:10.1109/CSCloud.2015.86
Retrieved from
https://www.computer.org.ezproxy.umuc.edu/csdl/proceedings/c
scloud/2015/9300/00/9300a141-abs.html
Deb Nath, A. P. (2016). Hardware-based authentication and
security for advanced metering infrastructure (Order No.
10473853). Available from ProQuest Dissertations & Theses
Global. (1877964746). Retrieved from
http://ezproxy.umuc.edu/login?url=https://search-proquest-
com.ezproxy.umuc.edu/docview/1877964746?accountid=14580
E. U. Haq, H. Xu, L. Pan and M. I. Khattak, "Smart Grid
Security: Threats and

More Related Content

Similar to Running head SMART GRID .docx

Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Power System Operation
 
Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...John-André Bjørkhaug
 
Ijmsr 2016-09
Ijmsr 2016-09Ijmsr 2016-09
Ijmsr 2016-09ijmsr
 
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...IRJET Journal
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
 
Advancement in Smart grid by Embedding a Last meter in a Internet of Things P...
Advancement in Smart grid by Embedding a Last meter in a Internet of Things P...Advancement in Smart grid by Embedding a Last meter in a Internet of Things P...
Advancement in Smart grid by Embedding a Last meter in a Internet of Things P...IRJET Journal
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
 
Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...TELKOMNIKA JOURNAL
 
Substation communication architecture to realize the future smart grid
Substation communication architecture to realize the future smart gridSubstation communication architecture to realize the future smart grid
Substation communication architecture to realize the future smart gridAlexander Decker
 
Analysis of Smart Grid Interoperability
Analysis of Smart Grid InteroperabilityAnalysis of Smart Grid Interoperability
Analysis of Smart Grid Interoperabilityijtsrd
 
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Power System Operation
 
Real-time monitoring of the prototype design of electric system by the ubido...
Real-time monitoring of the prototype design of electric  system by the ubido...Real-time monitoring of the prototype design of electric  system by the ubido...
Real-time monitoring of the prototype design of electric system by the ubido...IJECEIAES
 
Advantages and recent advances of smart energy grid
Advantages and recent advances of smart energy gridAdvantages and recent advances of smart energy grid
Advantages and recent advances of smart energy gridjournalBEEI
 
Report on smart metering& control of transmission system
Report on smart metering& control of transmission systemReport on smart metering& control of transmission system
Report on smart metering& control of transmission systemDurgarao Gundu
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA NetworksIJRES Journal
 
Smart Grid Paper by Rahul Mehra
Smart Grid Paper by Rahul MehraSmart Grid Paper by Rahul Mehra
Smart Grid Paper by Rahul MehraRahul Mehra
 

Similar to Running head SMART GRID .docx (20)

Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
 
Smart grid jenifer 120316
Smart grid jenifer 120316Smart grid jenifer 120316
Smart grid jenifer 120316
 
Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...
 
9517cnc08
9517cnc089517cnc08
9517cnc08
 
Ijmsr 2016-09
Ijmsr 2016-09Ijmsr 2016-09
Ijmsr 2016-09
 
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Advancement in Smart grid by Embedding a Last meter in a Internet of Things P...
Advancement in Smart grid by Embedding a Last meter in a Internet of Things P...Advancement in Smart grid by Embedding a Last meter in a Internet of Things P...
Advancement in Smart grid by Embedding a Last meter in a Internet of Things P...
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...Salsa20 based lightweight security scheme for smart meter communication in sm...
Salsa20 based lightweight security scheme for smart meter communication in sm...
 
Substation communication architecture to realize the future smart grid
Substation communication architecture to realize the future smart gridSubstation communication architecture to realize the future smart grid
Substation communication architecture to realize the future smart grid
 
Analysis of Smart Grid Interoperability
Analysis of Smart Grid InteroperabilityAnalysis of Smart Grid Interoperability
Analysis of Smart Grid Interoperability
 
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...
 
Real-time monitoring of the prototype design of electric system by the ubido...
Real-time monitoring of the prototype design of electric  system by the ubido...Real-time monitoring of the prototype design of electric  system by the ubido...
Real-time monitoring of the prototype design of electric system by the ubido...
 
Advantages and recent advances of smart energy grid
Advantages and recent advances of smart energy gridAdvantages and recent advances of smart energy grid
Advantages and recent advances of smart energy grid
 
Capstone Paper
Capstone PaperCapstone Paper
Capstone Paper
 
Report on smart metering& control of transmission system
Report on smart metering& control of transmission systemReport on smart metering& control of transmission system
Report on smart metering& control of transmission system
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Smart Grid Paper by Rahul Mehra
Smart Grid Paper by Rahul MehraSmart Grid Paper by Rahul Mehra
Smart Grid Paper by Rahul Mehra
 
Aa4101160164
Aa4101160164Aa4101160164
Aa4101160164
 

More from todd521

Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docxRunning head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docxtodd521
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docxtodd521
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docxtodd521
 
Running head SEMESTER PAPER .docx
Running head SEMESTER PAPER                                  .docxRunning head SEMESTER PAPER                                  .docx
Running head SEMESTER PAPER .docxtodd521
 
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxRunning Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxtodd521
 
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxRunning Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxtodd521
 
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxRunning head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxtodd521
 
Running Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxRunning Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxtodd521
 
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxRunning Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxtodd521
 
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docxRunning head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docxtodd521
 
Running head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxRunning head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxtodd521
 
Running head SETTING UP COMPANY 1SETTING UP .docx
Running head SETTING UP COMPANY                 1SETTING UP .docxRunning head SETTING UP COMPANY                 1SETTING UP .docx
Running head SETTING UP COMPANY 1SETTING UP .docxtodd521
 
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxRunning head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxtodd521
 
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxRunning Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxtodd521
 
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxRunning Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxtodd521
 
Running Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxRunning Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxtodd521
 
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxRunning head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxtodd521
 
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxRunning head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxtodd521
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxtodd521
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxtodd521
 

More from todd521 (20)

Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docxRunning head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
 
Running head SEMESTER PAPER .docx
Running head SEMESTER PAPER                                  .docxRunning head SEMESTER PAPER                                  .docx
Running head SEMESTER PAPER .docx
 
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxRunning Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
 
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxRunning Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
 
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxRunning head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
 
Running Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxRunning Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docx
 
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxRunning Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
 
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docxRunning head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
 
Running head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxRunning head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docx
 
Running head SETTING UP COMPANY 1SETTING UP .docx
Running head SETTING UP COMPANY                 1SETTING UP .docxRunning head SETTING UP COMPANY                 1SETTING UP .docx
Running head SETTING UP COMPANY 1SETTING UP .docx
 
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxRunning head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
 
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxRunning Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
 
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxRunning Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
 
Running Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxRunning Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docx
 
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxRunning head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
 
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxRunning head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
 

Recently uploaded

Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativePeter Windle
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasGeoBlogs
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptxJosvitaDsouza2
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 

Recently uploaded (20)

Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 

Running head SMART GRID .docx

  • 1. Running head: SMART GRID 1 SMART GRID 2 SMART GRID 1 CSIA 459: Evaluating Emerging Technologies Technology Review #2: Emerging Application of Technology in a Critical Infrastructure Annotated Bibliography for Smart Grid 11/25/2018 Introduction The Smart Grid is the evolution of our current electric grid, using new technologies to optimize power conservation and delivery. The “Grid” refers to the electric grid, a network of transmission lines, substations, transformers and more that supply our homes or businesses with electricity from the power plant. The digital technology that enables two - way communication between the utility and its customers and the transmission line sensing is what makes the grid smart. Like the
  • 2. Internet, the Smart Grid consist of controls, computers, automation and new technologies and equipment working together, but in this case, these technologies work with the electrical grid to meet our rapidly changing electrical demand digitally. The Smart Grid is a unique opportunity to transform the energy industry into a new era of efficiency, affordability and reliability that will add value to our society. Today, the demand for power continues to grow rapidly using more electronic devices than ever before and the current electrical system is outdated and totally depends on equipment nearing the end of its lifetime of use. Smart grids update this infrastructure to ensure that safety issues are addressed, and power is consistently delivered and that the system is managed competently. Without intelligent grid improvements, the old system, which is already close to capacity, will not be able to meet the future challenges. Cybersecurity solutions for critical energy infrastructure are essential in order to deliver reliable energy. In today's increasingly connected world, where cyber threats are highly sophisticated, it is unwise to think that energy supply systems are isolated or immune from compromise, but the Smart grid offers so many fundamental changes in human intelligence, prevention, management and recovery that, despite the introduction of new vulnerabilities, it essentially makes the electrical system safer. Annotated Bibliography for Smart Grid 1. Pesesky, J. L. (2016). The vulnerabilities of the advanced metering infrastructure in the smart grid (Order No. 10154802). Available from ProQuest Dissertations & Theses Global. (1836799165). Retrieved from http://ezproxy.umuc.edu/login?url=https://search-proquest- com.ezproxy.umuc.edu/docview/1836799165?accountid=14580 Justine Pesesky in his dissertation, talks about how the intelligent grid uses innovative technology to improve the experience of the consumer. The intelligent grid features allow intelligent appliances and smart meters to transmit information
  • 3. wirelessly to electrical utilities, and how the confidentiality of the consumer, as well as the accessibility and integrity of electricity from the Smart Grid, could be compromised by an attacker. In his research, he how the smart meters can be infiltrated due to the amount of personal data stored in it, and how a smart meter lets consumers communicate with the Smart Grid. The intelligent meter replaces mechanical meters and records data transferred to supplied energy. Hel also mention how a cyber attack can threaten the consumer with the availability and integrity of electricity from the intelligent grid and how it will affect the confidentiality of the consumers. The confidentiality, integrity and availability of AMI security concerns focus on three main areas. Confidentiality refers to the privacy of customer information on smart meters. The integrity of the advanced metering system means that changes in smart meter data are prevented. The three areas are most critical because some applications and systems deal directly with the availability of power to consumers. He suggested that to decrease Smart Grid cyber-attacks solution should include recognition of attack before it surfaces and improved safety features could increase security of consumer and the systems. 2. Mishra, S. (2016). Cyber-security in smart grid (Order No. 10679151). Available from ProQuest Dissertations & Theses Global. (1992469368). Retrieved from http://ezproxy.umuc.edu/login?url=https://search-proquest- com.ezproxy.umuc.edu/docview/1992469368?accountid=14580 Subhankar Mishra in his dissertation, talks about how the Smart grid is considered to be a revolutionary and evolutionary power grid regime. In addition to the passive features of the Smart Grid, cyber security is a critical problem because millions of electronic devices are linked via communication networks across electrical power plants, which have an enormous impact on the accuracy of such a widespread infrastructure. He stated that the first cyber security problem is the packet-based attacks and the Optimal Inspection Points (OIP) problem in the Supervisory Control and Data Acquisition (SCADA) system,
  • 4. which seeks to find a subset of nodes in a given network to perform the Deep Packet Inspection to maximize the number of scanned packets while meeting the delay limit. Smart grid energy efficiency depends on customers who know how to respond to demand and are actively involved in products and technologies. A more intelligent social power attack using spiraling shortcomings to increase the impact is proposed and its two variations of continuous and discontinuous selection are identified. Controlled shedding of loads as a protection strategy to reduce the impact of cascade failures. 3. Hahn, A. L. (2013). Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation (Order No. 3566005). Available from ProQuest Dissertations & Theses Global. (1418014634). Retrieved from http://ezproxy.umuc.edu/login?url=https://search-proquest- com.ezproxy.umuc.edu/docview/1418014634?accountid=14580 Adam Hahn in his dissertation, talks about how intelligent grid technologies are used to improve grid resilience and efficiency, they are also more dependent on cyber resources that can be vulnerable to attacks. His thesis introduces three components which offer new ways to improve the cyber security of the smart grid. Although all critical infrastructure domains acquire certain risks from cyber-attacks, the electricity grid is probably the most critical and vulnerable of these. The electric grid is a key foundation of our society and it is essential for all other critical infrastructure sectors to operate. The grid is also more vulnerable to cyber-attacks than many domains due to its large number of parties involved, mainly private ownership and strongly interdependent communications systems. He concluded with how critical infrastructure has become increasingly caused the tech world to worry about future cyber-attacks and how the electrical grid relies heavily on cyber infrastructures for electronic control and monitoring. This paper talks about the increased automation and how it aims to improve the reliability of critical control and protection systems. However, if an
  • 5. attacker can access substation systems, breakers can cause serious damage to the grid. 4. I. Darwish, O. Igbe, O. Celebi, T. Saadawi and J. Soryal, "Smart Grid DNP3 Vulnerability Analysis and Experimentation," 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud)(CSCLOUD), New York, NY, USA, 2015, pp. 141- 147.doi:10.1109/CSCloud.2015.86 https://www.computer.org.ezproxy.umuc.edu/csdl/proceedings/c scloud/2015/9300/00/9300a141-abs.html This paper highlights various security threats and vulnerabilities in smart grids using the Distributed Network Protocol (DNP3) as a real - time communication protocol. The paper talks about how the protocol DNP3 is a widely used protocol for communication. North America power system. Originally designed for traditional power grid and operation. Smart grid, the current communication protocols are reused. This paper also spoke about the use of intrusion detection system will be necessary to identify attackers targeting different part of the smart grid infrastructure. 5. McCary, E. (2015). Home area network security and accountability in the smart grid (Order No. 3726101). Available from ProQuest Dissertations & Theses Global. (1733231165). Retrieved from http://ezproxy.umuc.edu/login?url=https://search-proquest- com.ezproxy.umuc.edu/docview/1733231165?accountid=14580 Eric Mccary, in his dissertation, talks about the Internet of Things has applications has become one of the new technologies for smart grids. One of the beneficiaries of such applications is smart home appliances. The Smart grid security landscape and work on creating a more accountable environment in the smart grid home network. The intelligent grid is one of the most crucial and fast-growing technologies in the electric power system. The paper talked about how the intelligent grid is a system that incorporates information and communication
  • 6. network technologies with the traditional power grid. This paper presented a thorough review of home networks and smart home architecture. It discussed wireless and wired communications technologies most commonly used in HANs. The Home area network security have been found to play a key role in smart home appliance technology designed on the basis of the Internet of Things (IoT) concepts. 6. E. U. Haq, H. Xu, L. Pan and M. I. Khattak, "Smart Grid Security: Threats and Solution s," 2017 13th International Conference on Semantics, Knowledge and Grids (SKG), Beijing, China, 2018, pp. 188- 193. doi:10.1109/SKG.2017.00039 https://www-computer- org.ezproxy.umuc.edu/csdl/proceedings/skg/2017/2558/00/2558 01a188-abs.html The article talks about the improvement of the existing electricity infrastructure with intelligent grid technology compounds existing threats with new ones. The detection of security threats to the next generation of smart grids is crucial for the implementation of a safer national power grid. The advantages of the smart grid are obvious, but we have to make sure that we move deliberately and in stages so that no loop- hole will be missed and all security measures are in place to roll out the necessary infrastructure. The objectives of the smart
  • 7. grid are based on greater efficiency, reliability and safety. While securing the smart grid is an apparently overwhelming task, continuous security efforts are essential to ensure that the smart grid benefits outweigh the risks. By identifying threats, we can develop cyber security defense strategies that include preventing, detecting, responding and recovering them. 7. Fan, X., & Gong, G. (2013). Security challenges in smart- grid metering and control systems. Technology Innovation Management Review, 3(7), 42-49. Retrieved from http://ezproxy.umuc.edu/login?url=https://search-proquest- com.ezproxy.umuc.edu/docview/1614472799?accountid=14580 This technology review talks about how the Smart grid is an updated electricity network based on two-way electronic communications between supplier and consumer, which in turn supports extremely intelligent metering and monitoring systems. In the review, the authors talked about it a challenge to design technologically advanced and robust security mechanisms that can easily be deployed to protect communications between the various layers of the smart grid. In view of the growing importance of energy utilities in our everyday lives, smart grid technology presents new security challenges that need to be resolved. I have to agree with the review, and more needs to be done to prevent all systems and consumers cyber-attacks and new security measures must be developed to address these threats. The electrical sector's cyber security is a national
  • 8. concern. As the power system becomes increasingly challenging and depends on information technology and communication infrastructures, the concern is growing. This dependence has seen a noticeable increase in the vulnerability of the power system to cyber-attacks. The management and security of these components and systems in energy assurance plans should be addressed because of the potential for power outages caused by cyber-attacks. . 8. Deb Nath, A. P. (2016). Hardware-based authentication and security for advanced metering infrastructure (Order No. 10473853). Available from ProQuest Dissertations & Theses Global. (1877964746). Retrieved from http://ezproxy.umuc.edu/login?url=https://search-proquest- com.ezproxy.umuc.edu/docview/1877964746?accountid=14580 This dissertation talks about how America's power system infrastructure has undergone a crucial transition. The huge change in infrastructure from the private and public sectors to fossil - fuel power plants, solar power plants and wind farms affects every single entity. Changes in the energy supply chain present new obstacles for the current grid. The paper also talks about the introduction of information technology (IT), industrial control systems (ICS) and advanced security infrastructure in the traditional power system can play an important role in the
  • 9. necessary changes without interfering with the safety of end users of electricity. However, to meet the basic safety requirements of the smart grid, smart meters need to be safely authenticated and authenticated by other parties and devices and to handle private information securely. As information technology (IT) and telecommunications networks are directly involved in the smart grid, the challenges associated with these sectors have become security risks to the evolving power system. Cybersecurity must protect the grid system not only from attacks by angered employees, industrial extortion secret agents and terrorists, but also from unintentional compromises of vital information and power blackouts due to user errors, equipment failures and natural disasters. 9. Yan, J. (2017). Smart grid security against massive blackouts (Order No. 10289192). Available from ProQuest Dissertations & Theses Global. (1925957297). Retrieved from http://ezproxy.umuc.edu/login?url=https://search-proquest- com.ezproxy.umuc.edu/docview/1925957297?accountid=14580 This dissertation talks about how the safety of the intelligent grid is a significant challenge in cyber and physical fields. The National Institute of Standards and Technologies (NIST) categorizes the monolithic electricity infrastructure into seven domains: generation, storage, allocation, deployment, electricity markets, providers and consumers. It also mentioned how the
  • 10. smart grid includes complicated cyber-physical energy systems in a diverse power, energy, control, sensory, computer and communication network. The emerging intelligent grid comprises legacy hardware and software systems, operates under multiple entities and regulations, faces increased system stress and uncertainty and attracts deceptive criminals. Electricity grids are complex networked systems that are vulnerable to internal and external disturbances, including stress, failure of equipment, malfunction and natural disasters. The interconnected power and energy systems, however, have presented physical safety analysis challenges. Cybersecurity has been widely acknowledged as a key feature and challenge in smart grid development. Utilities have followed the principles of transparency, credibility and availability to install secure public and corporate networks. In the meantime, the intelligent grid is still far from being immune from cyber penetration. Cybersecurity features in both control centers and field devices are often insufficient, obsolete or missing in legacy power systems. 10. Bloomer, P. (2016). Hacking internet of things to disrupt the supply of power (Order No. 10248561). Available from ProQuest Dissertations & Theses Global. (1862183277). Retrieved from http://ezproxy.umuc.edu/login?url=https://search-proquest-
  • 11. com.ezproxy.umuc.edu/docview/1862183277?accountid=14580 This dissertation talks about what the potential impact on the Power Grid is if terrorists choose to attack devices outside the Smart Grid or in power generation / distribution points on the consumer Internet of Things (IoT). The paper also talks about how the IoT security is important for analysis, as these devices can have a substantial impact of many Americans and others worldwide, even if they do not use IoT devices at home. These devices are susceptible to many attack methods and may affect power companies ' ability to distribute power to consumers. Even the Federal Government has several relevant agencies in addressing the problem of CPS cyber security on the power grid and physical systems. Attacks on IoT have been taking place for many years, but attacks on consumer IoT devices have been limited due to the relatively small market that currently comprises approximately 4 billion devices according to Gartner research. The number of IoT devices used in the household is expanding. All these devices are full of insecurities with many security vulnerabilities that can be controlled on every device. I believe If the security is not increased or tightened on these devices, they can be intentionally used to disable or to manipulate the device to change CPS settings that use electrical energy and that can cause a major disaster.
  • 12. References Bloomer, P. (2016). Hacking internet of things to disrupt the supply of power (Order No. 10248561). Available from ProQuest Dissertations & Theses Global. (1862183277). Retrieved from http://ezproxy.umuc.edu/login?url=https://search-proquest- com.ezproxy.umuc.edu/docview/1862183277?accountid=14580 Darwish, O. Igbe, O. Celebi, T. Saadawi and J. Soryal, "Smart Grid DNP3 Vulnerability Analysis and Experimentation," 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud)(CSCLOUD), New York, NY, USA, 2015, pp. 141-147.doi:10.1109/CSCloud.2015.86 Retrieved from https://www.computer.org.ezproxy.umuc.edu/csdl/proceedings/c scloud/2015/9300/00/9300a141-abs.html Deb Nath, A. P. (2016). Hardware-based authentication and security for advanced metering infrastructure (Order No.
  • 13. 10473853). Available from ProQuest Dissertations & Theses Global. (1877964746). Retrieved from http://ezproxy.umuc.edu/login?url=https://search-proquest- com.ezproxy.umuc.edu/docview/1877964746?accountid=14580 E. U. Haq, H. Xu, L. Pan and M. I. Khattak, "Smart Grid Security: Threats and