top of page

Grid's Cyber-Security Part (III)

Creating a Security Strategy

Creating a security strategy requires two important steps:

  • Knowing your Vulnerabilities

  • Knowing potential resolution to those vulnerabilities

Following is a presentation of both these aspects with a brief description:


Simply put, all generation, transmission and distribution systems could have technical and non-technical vulnerabilities caused deliberately or spontaneously. These vulnerabilities could pose high, moderate or low levels of threat to systems' integrity. Resolving such threats would require measures at each level to maintain systems' integrity, such that the systems function as desired.


Cost Assessment of Risk:


Assessing where the risk lies in the systems and how much would their impact be, is again one concept, that is essential before placing technology to prevent the damage that could occur. Since, the risks in the red zone require more investments and those in the green zone could be prevented by just reinforcing current systems. Hence, it is essential to do the Cost benefit Analysis of threats posing long-lasting and short-term risks.


Here to analyze the benefit of using a method to resolve the risks posed by a threat has been calculated as the difference between cost the the risk poses and the cost of method of resolution of that risk. Following is a very simplified example of the same:




Next in Line:


  • Vulnerability Testing

  • Cloud Threat Detection

  • Secure Channels (VPN)

  • End Point Security

  • Physical Updates

  • Learning Security Systems (AI ML based Systems)



3 Comments


jack mary
jack mary
Jan 17, 2022

The cyber security thing is very tight by the way because there are so many threads I have to retained, also the security were being very strong due to it’s consequences and although the searches. Well, ahead of that I really need british essay writing things because there are so many things I have to do.

Like

elizabethjohn6654
Dec 17, 2021

Cyber security these days is very important due to the online scams and to theft control, I am doing a research on the cyber security to put on the engineering management dissertation topics so that the thesis can be useful for others as well.

Like

With lethal shots that kill all of a sudden, best airsoft sniper military sharpshooters break both the adversary's will and capacity to battle. When there is no particular evenhanded, a rifleman will search for focuses of chance.

Like
  • LinkedIn Social Icon
  • Twitter
  • Facebook
  • logo-instagram-png-13547

Contact Us

Thanks for submitting!

© 2024 by Source Advisory and Services Pvt. Ltd.

bottom of page