Download presentation
Presentation is loading. Please wait.
Published byMariah Andrews Modified over 9 years ago
1
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 D2-02_12 Comprehensive Cybersecurity strategy for Smartgrid equipment manufacturers SC D2 2013 Colloquium in Mysore, Karnataka, India
2
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 GAP of knowledge Energy knowledge Communication knowledge SMARTGRID Security knowledge
3
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 What is cybersecurity
4
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 Standards for cybersecurity
5
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 SGAM
6
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 Use cases & SGIS Use cases : Split the whole problem into more affordable issues Vs. maximalist approaches At least take into account information assets, owners and actors
7
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 Other aspects Detection Response Prevention Information security is not only prevention Bottom down approach: Penetration testing Awareness
8
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 Conclusions Day to day task Not dealing with securities but probabilities Need to incorporate the body of knowledge of cybersecurity experts Risks Vs. Performance Efforts in different standardization groups Cybersecurity must be part of the design process
9
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 Special report Q2_10: questions What are the recommendations of the authors for integrated operations of end-consumers/ devices with utility systems – given the current state of cyber security maturity in the domain? Can a security breach occur from a consumer appliance or by consumer?
10
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 S.R. Q2_10: contribution (I) Q: What are the recommendations of the authors for integrated operations of end-consumers/ devices with utility systems – given the current state of cyber security maturity in the domain? A: Recommendations: No security through obscurity or proprietary solutions Incorporate security body of knowledge Use common sense = risk analysis Security in depth Vs. panic
11
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 S.R. Q2_10: contribution (II) Q: Can a security breach occur from a consumer appliance or by consumer? A: What is a security breach? To which scale? Availability: Easy to some extent. Vital? Confidentiality: Privacy & duration Integrity: Perhaps the most risky? Take control of other devices: Early detection
12
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 THANK YOU
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.