Professional Documents
Culture Documents
SMSRT Grif PDF
SMSRT Grif PDF
SMART GRID
JAZEEL K T
7821
Page 1 E
Free Powerpoint Templates
7
CONTENTS
• Introduction
• What is a smart grid?
• Power grid automation
• Classification of cyber attacks
• Consequences of cyber attacks
• Security requirements of a Smart Grid
• Integrated Security Framework
• Conclusion
Free Powerpoint Templates
Page 2
Introduction
Information Infrastructure
Smart Grid Technology
Electrical Infrastructure
Enterprise Systems
Control Systems
Web Applications
AMI Protection Systems
DSM
OMS
GIS
Cyber Secure
Asset
Planning Engineering Accounting
management
CORPORATE
SUBSTATION
FreePOWER
Powerpoint Templates
GRID AUTOMATION SYSTEM
Page 8
Cyber Security of Smart Grid
Perform
SQL
Send e-mail Admin
ARP Scan
withEXEC
malware Operator
Admin
U
Opens Email
T
with Malware
f R
Internet
l o
o
Acct Operator
n t r
C o
e s
1. Hacker performs an ARP (Address
k
Ta
Master
1. Hacker sends an e-mail with malware DB
Resolution Protocol) Scan
2. E-mail recipient opens the e-mail and the Slave Database
2. Once the Slave
malware Database
gets installed is found, hacker
quietly
sends an SQL EXEC command RTU
3. Using the information that malware gets,
hacker another
3. Performs is able toARP
take control
Scan of the e-mail
recipient’s PC!
4. Takes control of RTU
Free Powerpoint Templates
Page 11
Consequences of cyber attacks
A comparison of security
requirements
Three layers:
Power
Automation & Control
Security
Provides clear demarcation of control and security
functionalities.
Scalability: security performance remain unabated with
increase in load and system volume.
Extendibility: able to handle any future state of power grid.
Can be integrated into the existing, legacy systems in a
non-intrusive fashion.
SECURITY AGENTS
Bring security to the edges of the system.
Firmware or software
Less intelligent at lower levels, more at higher levels
Functions:
• To translate between different protocols.
• To acquire and run the latest vulnerability patches from its
security manager.
• To collect data traffic pattern, system log data and report to the
security manager.
• To analyze traffic and access patterns with varying complexity
depending on the hierarchical layer.
Free Powerpoint Templates
Page 23
Components
SECURITY MANAGER
Connect directly or indirectly to managed security
switches.
Functions:
• To collect security agent information.
• To acquire vulnerability patches from a vendor’s server and
download them to the corresponding agents.
• To manage keys for VPN.
• To work as an AAA (Authentication, Authorization and Accounting)
server, validating user identifications and passwords, authorizing
user access right (monitor, modify data), and recoding what a user
has done to controllers.
Dong Wei; Yan Lu; Jafari, M.; Skare, P.; Rohde, K.; , "An integrated
security system of protecting Smart Grid against cyber attacks,"
Innovative Smart Grid Technologies (ISGT), 2010 , vol., no., pp.1-7,
19-21 Jan. 2010.
Ericsson, G.N., "On requirements specifications for a power system
communications system," Power Delivery, IEEE Transactions
on,vol.20, no.2, pp. 1357-1362, April 2005.
Anthony R. Metke and Randy L. Ekl, “Security Technology for Smart
Grid Networks”, Smart Grid, IEEE Transactions on, vol. 1, no. 1, June
2010
Amin, M., "Energy Infrastructure Defense Systems," Proceedings of the
IEEE, vol.93, no.5, pp.861-875, May 2005.
http://www.net-security.org/secworld.php?id=8830