1 / 12

D2-02_12 Comprehensive Cybersecurity strategy for Smartgrid equipment manufacturers

D2-02_12 Comprehensive Cybersecurity strategy for Smartgrid equipment manufacturers. SC D2 2013 Colloquium in Mysore, Karnataka, India. GAP of knowledge. SMARTGRID. Energy knowledge. Communication knowledge. Security knowledge. What is cybersecurity. Standards for cybersecurity.

Download Presentation

D2-02_12 Comprehensive Cybersecurity strategy for Smartgrid equipment manufacturers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. D2-02_12Comprehensive Cybersecurity strategy for Smartgrid equipment manufacturers SC D2 2013 Colloquium in Mysore, Karnataka, India

  2. GAP of knowledge SMARTGRID Energyknowledge Communicationknowledge Security knowledge

  3. Whatiscybersecurity

  4. Standardsforcybersecurity

  5. SGAM

  6. Use cases & SGIS • Use cases: • Split the whole problem into more affordable issues Vs. maximalist approaches • At leasttakeintoaccount information assets, owners and actors

  7. Other aspects • Informationsecurityisnotonlyprevention • Bottomdownapproach: Penetrationtesting • Awareness

  8. Conclusions • Day todaytask • Notdealingwithsecuritiesbutprobabilities • Needtoincorporatethebody of knowledge of cybersecurityexperts • Risks Vs. Performance • Efforts in differentstandardizationgroups • Cybersecuritymust be part of thedesignprocess

  9. Special report Q2_10: questions • What are the recommendations of the authors for integrated operations of end-consumers/ devices with utility systems – given the current state of cyber security maturity in the domain? • Can a security breach occur from a consumer appliance or by consumer?

  10. S.R. Q2_10: contribution (I) • Q: What are the recommendations of the authors for integrated operations of end-consumers/ devices with utility systems – given the current state of cyber security maturity in the domain? • A: Recommendations: • No security through obscurity or proprietary solutions • Incorporatesecuritybody of knowledge • Use common sense = risk analysis • Security in depth Vs. panic

  11. S.R. Q2_10: contribution (II) • Q: Can a security breach occur from a consumer appliance or by consumer? • A: What is a security breach? To which scale? • Availability: Easy to some extent. Vital? • Confidentiality: Privacy & duration • Integrity: Perhaps the most risky? • Take control of other devices: Early detection

  12. THANK YOU

More Related