Power Grids' Cyber Security (Part - II)
- CEO, SASPL.
- Aug 21, 2020
- 2 min read
Grid Security Modeling
Framework -
Security in secondary systems should be supported by both organizational and operational processes that manage the critical infrastructures. This ensures stakeholders (e.g., utility site teams, suppliers, site maintenance and commissioning teams) are well informed and sensitive to those security measures that are in place.
These stakeholders must be made to use and maintain the secured system baseline while performing daily operations.
Basic Security Models:
1. Availability, Integrity, and Confidentiality (AIC),
2. Authorization, Authentication and Audit-ability (AAA)
The first framework ensures that the system's availability remains integral to its original use in a way that the system's operational and information data is protected and is only accessible confidentially to authorized parties or points.
The second framework ensures the same functionality as above but with an emphasis on Audit and Feedback of the systems.
Model establishment parameters

Defining Policy -
Policy will be based on:
Available infrastructure in the scope of security framework
Available of data architecture - hardware, software, dbms, data enablers, data editors, data users and data viewers
Information classification and access points
Network and security protocols
Escalation Procedure
Response Plan
Designing Processes -
Assessing and establishing system baseline
Periodic risk assessment and systems analysis
Resolving risk issues
Patch design and applications
Testing of patches
Revision of security and systems baseline
Selecting appropriate technology -
A “Secure by design” approach which is based on international standards like IEC 62351 and IEEE 1686 (as opposed to a “Bolt-on security” approach) can help to further reduce risk when securing control system components.
Documentation -
Including -
detailed procedures
processes
network diagrams
security architectures
product, system technical and user documentation supplied by vendors
Top providers of security solutions for Power Grids

Next in line:
Security Strategy
Risk Assessment
Vulnerability Testing
Cloud Threat Detection
Secure Channels (VPN)
End Point Security
Physical Updates
Learning Security Systems (AI ML based Systems)
Part I - Link : https://www.sourceadvisory.in/post/power-grid-cyber-security
I think cyber-security forums are not working as diligently as they should be. I’ve been scammed from two online sites and it was the third time that I found a reliable site from where I could Pay Someone To Take My Online Class For Me. I think such scam sites must be removed from the forums as soon as possible.
Graph showing that the things have gone deeply resist, all the major organization turn the things on. During this period you have to see all the basic needs. Once you have assigned an online PhD thesis writing service then you can’t see other services.
Cyber Security is a very advanced technology in the modern era. Many students are researching this technology. And this is also my university project. I have not been able to attend the rest of my class. If anyone has take my online class for me, it will be very easy for me to complete my project.
It was always incredibly easy to lose your head in the myriads of online pavilions you may find online, each one of which is seeking to engage further guests into World777 playing. The effects to mind when opting the point where you play are as follows