Category Archives: Information Technology

Smart Grid Security Threats and How to Combat Them

Smart Grid Security Threats and How to Combat Them


The vision of the smart grid is to break down barriers between transmission and distribution, communications and back office systems to create a fully integrated network that provides diagnosis and resolution of problems as they arise and enables real time exchange of information between the utility and its customers.

Although smart grid security regulations and standards will continue to evolve as smart grid technology develops, utilities cannot afford to wait until standards are finalized to begin developing their smart grid implementation strategy and plan.

This report on Cyber Security and the Smart Grid looks at the potential security threats faced by the smart grid in the near future, and how to mitigate them.

Threats to the smart grid can be classified into three broad groups – system level threats that attempt to take down the grid, attempts to steal electrical service, and attempts to compromise the confidentiality of data on the system

Pages: 83
Publication Date: February 2010
Publisher: Energy Business Reports

Table of Contents

Executive Summary

Introduction to Smart Grid

What is the Smart Grid?
Who is developing the Smart Grid?
Technologies Involved in the Smart Grid and What They Offer
Distributed Resources
Power Grid Management
Customer Power Management
Importance of Wireless Technology to the Smart Grid
Smart Grid and Personal Information
Privacy Issues with the Smart Grid
Latest Developments

Benefits of a Smart Grid

Cyber Security in the Electric System
Building a Strategy for Smart Grid Cyber Security
Security Fundamentals of the Smart Grid
Looking at the Threats Facing the Smart Grid
Looking at System-level Threats
Problem of Theft of Service
Privacy and Confidentiality Threats

Security Challenges Facing the Smart Grid

Internet Protocol and Smart Grid Security

Vulnerabilities Facing the Smart Grid
SCADA Security
Security of the Substation
Use of Public Telecom Infrastructure
Network Management from Remote Nodes
Lack of Authentication
Authentication Bypass
Slave Meter Data Tampering
Slave Meter Unauthorized Disconnection
Insecure Protocol Implementation
Firmware Upgrade Vulnerabilities
Input Validation
Security of the Current Smart Grid
AMI Security
Securing the Wireless Network
NASPI Security
Considering Potential Attack Scenarios
Present Risk of Attack

Available    at    : EnergyBusinessReport