top of page

Power Grids' Cyber Security (Part - II)




Grid Security Modeling

Framework -

Security in secondary systems should be supported by both organizational and operational processes that manage the critical infrastructures. This ensures stakeholders (e.g., utility site teams, suppliers, site maintenance and commissioning teams) are well informed and sensitive to those security measures that are in place.


These stakeholders must be made to use and maintain the secured system baseline while performing daily operations.


Basic Security Models:

1. Availability, Integrity, and Confidentiality (AIC),

2. Authorization, Authentication and Audit-ability (AAA)


The first framework ensures that the system's availability remains integral to its original use in a way that the system's operational and information data is protected and is only accessible confidentially to authorized parties or points.


The second framework ensures the same functionality as above but with an emphasis on Audit and Feedback of the systems.


Model establishment parameters


Defining Policy -

Policy will be based on:

  • Available infrastructure in the scope of security framework

  • Available of data architecture - hardware, software, dbms, data enablers, data editors, data users and data viewers

  • Information classification and access points

  • Network and security protocols

  • Escalation Procedure

  • Response Plan

Designing Processes -

  • Assessing and establishing system baseline

  • Periodic risk assessment and systems analysis

  • Resolving risk issues

  • Patch design and applications

  • Testing of patches

  • Revision of security and systems baseline

Selecting appropriate technology -

A “Secure by design” approach which is based on international standards like IEC 62351 and IEEE 1686 (as opposed to a “Bolt-on security” approach) can help to further reduce risk when securing control system components.


Documentation -

Including -

  • detailed procedures

  • processes

  • network diagrams

  • security architectures

  • product, system technical and user documentation supplied by vendors


Top providers of security solutions for Power Grids



Next in line:

  • Security Strategy

  • Risk Assessment

  • Vulnerability Testing

  • Cloud Threat Detection

  • Secure Channels (VPN)

  • End Point Security

  • Physical Updates

  • Learning Security Systems (AI ML based Systems)

Part I - Link : https://www.sourceadvisory.in/post/power-grid-cyber-security





4 Comments


dianesawyer785
dianesawyer785
Aug 03, 2022

I think cyber-security forums are not working as diligently as they should be. I’ve been scammed from two online sites and it was the third time that I found a reliable site from where I could Pay Someone To Take My Online Class For Me. I think such scam sites must be removed from the forums as soon as possible.

Like

jack mary
jack mary
Jan 17, 2022

Graph showing that the things have gone deeply resist, all the major organization turn the things on. During this period you have to see all the basic needs. Once you have assigned an online PhD thesis writing service then you can’t see other services.

Like

Mandy Angelica
Mandy Angelica
Jan 12, 2022

Cyber ​​Security is a very advanced technology in the modern era. Many students are researching this technology. And this is also my university project. I have not been able to attend the rest of my class. If anyone has take my online class for me, it will be very easy for me to complete my project.

Like

world777id
Dec 03, 2021

It was always incredibly easy to lose your head in the myriads of online pavilions you may find online, each one of which is seeking to engage further guests into World777 playing. The effects to mind when opting the point where you play are as follows


Like
  • LinkedIn Social Icon
  • Twitter
  • Facebook
  • logo-instagram-png-13547

Contact Us

Thanks for submitting!

© 2024 by Source Advisory and Services Pvt. Ltd.

bottom of page