scholarly journals Cyber-Infrastructure Connections and Smart Gird Security

The architecture of the smart grid combines the communication grid and physical power grid in a sole huge network. Smart grid has various security threats like cyber-attacks, physical attacks or natural disasters. The mentioned threats can lead to the breach of the user’s privacy, failure of the infrastructure, energy theft, blackouts endanger the safety of the operators among many more. For this reason, there is need to ensure that the smart grid cyber security is adequate to prevent any of these threats. Adequate security will as well ensure that the smart grid operates adequately as it is viewed that is by providing safe, reliable and uninterrupted supply of power to the consumers with a regular flow of end to end information that are all secure. The smart grid environment will ensure that the electric power infrastructure is modern. This is majorly by combining the present functionalities and the future ones with the upgraded requirements to the users

2015 ◽  
Vol 15 (3) ◽  
pp. 436
Author(s):  
Surender Kumar ◽  
M K Soni ◽  
D K Jain

<p>Cyber security has become a critical priority for electric utilities. With the increase in the use of intelligent measuring devices like PMUs and more advanced communications and information technology in smart grid, the overall attack surface has increased. Cyber attacks against synchrophasor system critical infrastructure are detrimental to the functioning of the society as a whole. This paper presents the latest on cyber security of synchrophasor system in smart grid, specifically; it focuses on the deep understanding of the risk in terms of threats, vulnerabilities and consequences that arise from cyber attacks. Since the research on cyber security for the smart grid is still in its early stage, our objective is to provide an overview, analyze potential cyber security threats, and review existing security solutions in the Wide Area Monitoring System.</p>


2020 ◽  
pp. 53-60
Author(s):  
Mohammed I. Alghamdi ◽  

Our economy, infrastructure and societies rely to a large extent on information technology and computer networks solutions. Increasing dependency on information technologies has also multiplied the potential hazards of cyber-attacks. The prime goal of this study is to critically examine how the sufficient knowledge of cyber security threats plays a vital role in detection of any intrusion in simple networks and preventing the attacks. The study has evaluated various literatures and peer reviewed articles to examine the findings obtained by consolidating the outcomes of different studies and present the final findings into a simplified solution.


2018 ◽  
pp. 132-150
Author(s):  
Taiseera Al Balushi ◽  
Saqib Ali ◽  
Osama Rehman

Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.


2020 ◽  
Vol 25 (6) ◽  
Author(s):  
Iliya Fayans ◽  
Yair Motro ◽  
Lior Rokach ◽  
Yossi Oren ◽  
Jacob Moran-Gilad

Next generation sequencing (NGS) is becoming the new gold standard in public health microbiology. Like any disruptive technology, its growing popularity inevitably attracts cyber security actors, for whom the health sector is attractive because it combines mission-critical infrastructure and high-value data with cybersecurity vulnerabilities. In this Perspective, we explore cyber security aspects of microbial NGS. We discuss the motivations and objectives for such attack, its feasibility and implications, and highlight policy considerations aimed at threat mitigation. Particular focus is placed on the attack vectors, where the entire process of NGS, from sample to result, could be vulnerable, and a risk assessment based on probability and impact for representative attack vectors is presented. Cyber attacks on microbial NGS could result in loss of confidentiality (leakage of personal or institutional data), integrity (misdetection of pathogens) and availability (denial of sequencing services). NGS platforms are also at risk of being used as propagation vectors, compromising an entire system or network. Owing to the rapid evolution of microbial NGS and its applications, and in light of the dynamics of the cyber security domain, frequent risk assessments should be carried out in order to identify new threats and underpin constantly updated public health policies.


10.29007/fn3p ◽  
2018 ◽  
Author(s):  
Congmiao Li ◽  
Dipti Srinivasan ◽  
Thomas Reindl

Many embedded systems in a Smart Grid have special constraints in terms of timing, cost and power consumption to ensure security. This paper addresses the Smart Grid security problem with a focus on improving the security of crucial components, and reducing the risks from cyber attacks. A hardware architecture to enhance the security of important embedded devices in the smart grid has been proposed and implemented. This hardware based malware detection system runs on a dedicated hardware implemented with FPGA logic, and allows detection in near real-time. The system architecture and results are presented in the paper.


2011 ◽  
Vol 44 (1) ◽  
pp. 13696-13704 ◽  
Author(s):  
Shinn-Shyan Wu ◽  
Chen-Ching Liu ◽  
Ahmed F. Shosha ◽  
Pavel Gladyshev

Author(s):  
Smt. Ch. Vimala ◽  
Smt. P. Vishalini

Cyber security plays an important role in Information Technology. Securing the information becomes a challenge in present days. The main purpose of cyber security is to protect all organizational assets from threats as well as disruptions caused due to natural disasters. Various governments and companies are taking necessary measurements in order to prevent cybercrimes. Cyber security deals with the “Securing the future- securing the tomorrow’s world”.


In the era of social media and the Internet, there has been an exponential increase in threats related to the privacy of user accounts and data. The confidentiality of personal data is compromised for various motives. This sudden increase in security threats has led to widespread problems. Our research is focused on analyzing the extent of cyber-attacks in various countries across the globe. We have proposed a novel approach for analyzing the tweets related to cyber-attacks and its surrounding fields. The analysis proves that Asian countries face more cyber security issues as compared to European countries. Further, it is also analyzed that developing countries like India are more prone to these issues as compare to developed countries like the United States or the United Kingdom.


Sign in / Sign up

Export Citation Format

Share Document