SlideShare a Scribd company logo
1 of 19
Cyber Security and the Smart Grid
George W. Arnold, Eng.Sc.D.
National Institute of Standards and Technology (NIST)
U.S. Department of Commerce
george.arnold@nist.gov
2Addressing security challenges on a global scaleGeneva, 6-7 December 2010
The Electric Grid
3
One of the largest, most complex infrastructures ever built
“The supreme engineering achievement of the 20th
century”
- National Academy of Engineering
Electric Grid in the U.S.
• 3,200 electric utility
companies
• 17,000 power plants
• 800 gigawatt peak
demand
• 266,000 km of high-
voltage lines
• 10 million km of
distribution lines
• 140 million meters
• $1 trillion in assets
• $350 billion annual
revenues
4
The Electric Grid Today
Markets and Operations
Generation
Transmission Distribution Customer Use
One-way flow of electricity
•Centralized, bulk generation, mainly coal and natural gas
•Responsible for 40% of human-caused CO2 production
•Controllable generation and predictable loads
•Limited automation and situational awareness
•Lots of customized proprietary systems
•Lack of customer-side data to manage and reduce energy use
Smart Grid Goals
• Enable customers to
reduce energy use
• Increase use of
renewable sources
• Improve reliability and
security
• Facilitate
infrastructure for
electric vehicles
6
What Will the Smart Grid Look Like?
7
High use of variable renewables
Distributed generation and
microgrids
Ubiquitous networked
sensors
Smart meters and
real time usage
data
Dynamic pricing
Energy management systems
Smart
appliances
Distributed
storage
Bidirectional
metering
Electric
vehicles
Smart Grid: The “Energy Internet”
Graphics courtesy of EPRI
2-way flow of electricity and information
Standards Provide a Critical Foundation
9
Current Grid Environment
• Legacy SCADA systems
• Limited cyber security controls currently in
place
– Specified for specific domains – bulk power
distribution, metering
• Vulnerabilities might allow an attacker to
– Penetrate a network,
– Gain access to control software, or
– Alter load conditions to destabilize the grid in
unpredictable ways
• Even unintentional errors could result in
destabilization of the grid
10
Threats to the Grid
• Deliberate attacks
– Disgruntled employees
– Industrial espionage
– Unfriendly states
– Organized crime
• Inadvertent threats
– Equipment failures
– User/Administrator errors
• Natural phenomena
– Weather – hurricanes, earthquakes
– Solar activity
11
New Risks
• Greater complexity increases exposure to
potential attackers and unintentional errors
• Linked networks introduce common
vulnerabilities
• “Denial of Service” – type attacks
• Increased number of entry points and paths
• Compromise of data confidentiality or
customer privacy
Ensuring Security and Privacy
12
1313
Smart Grid – an Opportunity
• Modernization provides an opportunity to
improve security of the Grid
• Integration of new IT and networking
technologies
– Brings new risks as well as an array of security
standards, processes, and tools
• Architecture is key
– Security must be designed in – it cannot be added
on later
14
Cyber Security Working Group
• Building cyber security in from the start
has been a paramount concern
• Permanent Working Group
– Over 460 public and private sector
participants
• August 2010 NIST publishes:
Guidelines for Smart Grid Cyber
Security
– Reflects Comments on Sept 2009 and
Feb 2010 Draft Smart Grid Cyber
Security Strategy and Requirements
• Guideline includes:
– Risk assessment guidance for
implementers
– Recommended security requirements
– Privacy recommendations
15
Guidelines for Smart Grid Cyber Security
• NIST Interagency Report 7628 - August 2010
– Development of the document lead by NIST
– Represents significant coordination among
• Federal agencies
• Private sector
• Regulators
• Academics
– Document includes material that will be used in selecting
and modifying security requirements
15
16
16
NISTIR 7628 – What it IS and IS NOT
What it IS
• A tool for organizations that are researching, designing, developing, and
implementing Smart Grid technologies
• May be used as a guideline to evaluate the overall cyber risks to a Smart
Grid system during the design phase and during system implementation
and maintenance
• Guidance for organizations
– Each organization must develop its own cyber security strategy (including a
risk assessment methodology) for the Smart Grid.
What it IS NOT
• It does not prescribe particular solutions
• It is not mandatory
17
NISTIR 7628 Content
The NISTIR includes the following
• Executive Summary
• Chapter 1 - Overall cyber security strategy for the
Smart Grid
• Chapter 2 – High level and logical security
architecture
• Chapter 3 – High level security requirements
• Chapter 4 – Cryptography and key management
17
18
NISTIR 7628 Content (Continued)
• Chapter 5 - Privacy and the Smart Grid
• Chapter 6 Bottom-up security analysis of the Smart Grid
• Chapter 7 – R&D themes for cyber security in the Smart
Grid
• Chapter 8 – Overview of the standards review
• Chapter 9 – Key power system use cases for security
requirements
• Appendices A - J
18
Further Information
• Web portal: http://www.nist.gov/smartgrid
• Contact:
– George Arnold, National Coordinator
– Email: george.arnold@nist.gov
– Telephone: +1.301.975.2232
19

More Related Content

What's hot

Technology: Built for Attack : Dr. Emma Garrison-Alexander
Technology: Built for Attack: Dr. Emma Garrison-AlexanderTechnology: Built for Attack: Dr. Emma Garrison-Alexander
Technology: Built for Attack : Dr. Emma Garrison-Alexander EC-Council
 
iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...
iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...
iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...iwatchjr
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015Paul F. Roberts
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSOAndy Bochman
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Tech 2 Tech - security
Tech 2 Tech - securityTech 2 Tech - security
Tech 2 Tech - securityJisc
 
Results of IT Security Analysis
Results of IT Security AnalysisResults of IT Security Analysis
Results of IT Security Analysiszohraz
 
Introduction to CSIRTs
Introduction to CSIRTsIntroduction to CSIRTs
Introduction to CSIRTsAPNIC
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010Andy Bochman
 
Control in Cyber-Physical Systems
Control in Cyber-Physical SystemsControl in Cyber-Physical Systems
Control in Cyber-Physical SystemsBob Marcus
 
Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
Infosec 2014: Finding and Understanding the Risk Impact of Firewall ChangesInfosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
Infosec 2014: Finding and Understanding the Risk Impact of Firewall ChangesSkybox Security
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercisesisc2-hellenic
 
Cyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandCyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandHighervista
 
Cyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillanCyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillanTWCA
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical SystemsBob Marcus
 

What's hot (19)

Technology: Built for Attack : Dr. Emma Garrison-Alexander
Technology: Built for Attack: Dr. Emma Garrison-AlexanderTechnology: Built for Attack: Dr. Emma Garrison-Alexander
Technology: Built for Attack : Dr. Emma Garrison-Alexander
 
iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...
iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...
iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSO
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Tech 2 Tech - security
Tech 2 Tech - securityTech 2 Tech - security
Tech 2 Tech - security
 
Results of IT Security Analysis
Results of IT Security AnalysisResults of IT Security Analysis
Results of IT Security Analysis
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Introduction to CSIRTs
Introduction to CSIRTsIntroduction to CSIRTs
Introduction to CSIRTs
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
 
Control in Cyber-Physical Systems
Control in Cyber-Physical SystemsControl in Cyber-Physical Systems
Control in Cyber-Physical Systems
 
Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
Infosec 2014: Finding and Understanding the Risk Impact of Firewall ChangesInfosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 
Cyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandCyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarland
 
Cyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillanCyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillan
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 

Similar to T063500000200201 ppte

Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
 
Security challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresSecurity challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresP K Agarwal
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsSchneider Electric
 
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPSecurity of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPEnergySec
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalSyam Madanapalli
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction Nilesh Dhage
 
Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility EnergyTech2015
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid systemamaljose949563
 
Cybersecurity of powergrid
Cybersecurity of powergrid Cybersecurity of powergrid
Cybersecurity of powergrid Rajesh Sawale
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power gridP K Agarwal
 
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsHow to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
Smart Grid Training for Non Engineers : Tonex Training
Smart Grid Training for Non Engineers : Tonex TrainingSmart Grid Training for Non Engineers : Tonex Training
Smart Grid Training for Non Engineers : Tonex TrainingBryan Len
 
Critical Infrastructure and Security
Critical Infrastructure and SecurityCritical Infrastructure and Security
Critical Infrastructure and SecurityCan Demirel
 

Similar to T063500000200201 ppte (20)

Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 
Nreca kickoff meeting
Nreca kickoff meetingNreca kickoff meeting
Nreca kickoff meeting
 
Security challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresSecurity challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructures
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPSecurity of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIP
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 
Smart grid.pptx
Smart grid.pptxSmart grid.pptx
Smart grid.pptx
 
Smart grid
Smart gridSmart grid
Smart grid
 
Smart Grid Introduction
Smart Grid Introduction Smart Grid Introduction
Smart Grid Introduction
 
Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
Cybersecurity of powergrid
Cybersecurity of powergrid Cybersecurity of powergrid
Cybersecurity of powergrid
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsHow to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of Things
 
Smart Grid Training for Non Engineers : Tonex Training
Smart Grid Training for Non Engineers : Tonex TrainingSmart Grid Training for Non Engineers : Tonex Training
Smart Grid Training for Non Engineers : Tonex Training
 
Critical Infrastructure and Security
Critical Infrastructure and SecurityCritical Infrastructure and Security
Critical Infrastructure and Security
 

Recently uploaded

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Recently uploaded (20)

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 

T063500000200201 ppte

  • 1.
  • 2. Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce george.arnold@nist.gov 2Addressing security challenges on a global scaleGeneva, 6-7 December 2010
  • 3. The Electric Grid 3 One of the largest, most complex infrastructures ever built “The supreme engineering achievement of the 20th century” - National Academy of Engineering
  • 4. Electric Grid in the U.S. • 3,200 electric utility companies • 17,000 power plants • 800 gigawatt peak demand • 266,000 km of high- voltage lines • 10 million km of distribution lines • 140 million meters • $1 trillion in assets • $350 billion annual revenues 4
  • 5. The Electric Grid Today Markets and Operations Generation Transmission Distribution Customer Use One-way flow of electricity •Centralized, bulk generation, mainly coal and natural gas •Responsible for 40% of human-caused CO2 production •Controllable generation and predictable loads •Limited automation and situational awareness •Lots of customized proprietary systems •Lack of customer-side data to manage and reduce energy use
  • 6. Smart Grid Goals • Enable customers to reduce energy use • Increase use of renewable sources • Improve reliability and security • Facilitate infrastructure for electric vehicles 6
  • 7. What Will the Smart Grid Look Like? 7 High use of variable renewables Distributed generation and microgrids Ubiquitous networked sensors Smart meters and real time usage data Dynamic pricing Energy management systems Smart appliances Distributed storage Bidirectional metering Electric vehicles
  • 8. Smart Grid: The “Energy Internet” Graphics courtesy of EPRI 2-way flow of electricity and information Standards Provide a Critical Foundation
  • 9. 9 Current Grid Environment • Legacy SCADA systems • Limited cyber security controls currently in place – Specified for specific domains – bulk power distribution, metering • Vulnerabilities might allow an attacker to – Penetrate a network, – Gain access to control software, or – Alter load conditions to destabilize the grid in unpredictable ways • Even unintentional errors could result in destabilization of the grid
  • 10. 10 Threats to the Grid • Deliberate attacks – Disgruntled employees – Industrial espionage – Unfriendly states – Organized crime • Inadvertent threats – Equipment failures – User/Administrator errors • Natural phenomena – Weather – hurricanes, earthquakes – Solar activity
  • 11. 11 New Risks • Greater complexity increases exposure to potential attackers and unintentional errors • Linked networks introduce common vulnerabilities • “Denial of Service” – type attacks • Increased number of entry points and paths • Compromise of data confidentiality or customer privacy
  • 12. Ensuring Security and Privacy 12
  • 13. 1313 Smart Grid – an Opportunity • Modernization provides an opportunity to improve security of the Grid • Integration of new IT and networking technologies – Brings new risks as well as an array of security standards, processes, and tools • Architecture is key – Security must be designed in – it cannot be added on later
  • 14. 14 Cyber Security Working Group • Building cyber security in from the start has been a paramount concern • Permanent Working Group – Over 460 public and private sector participants • August 2010 NIST publishes: Guidelines for Smart Grid Cyber Security – Reflects Comments on Sept 2009 and Feb 2010 Draft Smart Grid Cyber Security Strategy and Requirements • Guideline includes: – Risk assessment guidance for implementers – Recommended security requirements – Privacy recommendations
  • 15. 15 Guidelines for Smart Grid Cyber Security • NIST Interagency Report 7628 - August 2010 – Development of the document lead by NIST – Represents significant coordination among • Federal agencies • Private sector • Regulators • Academics – Document includes material that will be used in selecting and modifying security requirements 15
  • 16. 16 16 NISTIR 7628 – What it IS and IS NOT What it IS • A tool for organizations that are researching, designing, developing, and implementing Smart Grid technologies • May be used as a guideline to evaluate the overall cyber risks to a Smart Grid system during the design phase and during system implementation and maintenance • Guidance for organizations – Each organization must develop its own cyber security strategy (including a risk assessment methodology) for the Smart Grid. What it IS NOT • It does not prescribe particular solutions • It is not mandatory
  • 17. 17 NISTIR 7628 Content The NISTIR includes the following • Executive Summary • Chapter 1 - Overall cyber security strategy for the Smart Grid • Chapter 2 – High level and logical security architecture • Chapter 3 – High level security requirements • Chapter 4 – Cryptography and key management 17
  • 18. 18 NISTIR 7628 Content (Continued) • Chapter 5 - Privacy and the Smart Grid • Chapter 6 Bottom-up security analysis of the Smart Grid • Chapter 7 – R&D themes for cyber security in the Smart Grid • Chapter 8 – Overview of the standards review • Chapter 9 – Key power system use cases for security requirements • Appendices A - J 18
  • 19. Further Information • Web portal: http://www.nist.gov/smartgrid • Contact: – George Arnold, National Coordinator – Email: george.arnold@nist.gov – Telephone: +1.301.975.2232 19