Smart Grid Technology

User Generated

uxvz921

Computer Science

Description

For this paper, you will construct a recommendation to study and evaluate a Smart Grid. To support your recommendation you will use information from your Technology Review #2 ( SEE ATTACHED FILE). By the time you are finished with your recommendation, you will have performed all four stages of the technology scan.

GETTING STARTED

Rewrite the paper to serve as a background paper for a decision briefing for senior executives. These executives will be meeting to decide which emerging technologies or emerging applications of technologies will become part of one or more security-focused Internal Research & Development projects during the next budget cycle.

Write down your thoughts and ideas about the security implications of this technology using (a) the Five Pillars of Information Assurance and/or (b) the Five Pillars of Information Security. For your paper, you do not need to include all ten “pillars” but you should address a minimum of three. If you are targeting an “A” on your paper, address at least five of the pillars.

Throughout your recommendation (see below), you must keep your focus upon the security posture of this technology and its applications (e.g. products or services built upon this technology or which incorporate this technology).

Note: If you had deficiencies in your survey of the professional literature for your chosen technology, you should correct that problem now. You may also add sources and, if necessary, remove inappropriate sources from your survey. Refer back to the original Detailed Project Description for your selected paper (SEE ATTACHED FILE).

RECOMMENDATIONS FOR STUDY

This assignment builds upon the technology scan which you performed for your three technology review papers and incorporates the final stage: recommending. Your focus in this paper must be upon identifying and presenting information from authoritative sources which supports a recommendation to select this technology for further study as part of an Internal Research & Development project (IR&D). Your recommendation should be based upon the following (at a minimum):

  • characteristics (features and capabilities) of the technology
  • interactions among the selected technology, people, environments, and processes (how will it be used; use cases if known)
  • risks or vulnerabilities associated with adoption of this technology
  • costs and benefits associated with adoption of this technology

Addressing Costs and Benefits: Do not tell the reader how much the technology will cost. Discuss instead how much it might cost to SECURE this technology against cyber-attacks and/or how difficult it will be to deny criminals and terrorists the use of this technology.

WRITING YOUR PAPER

Your paper must provide the reader with an overview of the technology followed by information about the potential security risks and/or benefits of its use (the security posture ).You MUST use information paraphrased from the papers found during your Survey of the Professional Literature (with appropriate in-text citations).

Revise the original paper then add the recommendation section.

Your Technology Selection Paper should be at least three pages in length but no more than five pages (excluding the title page and references page). This means that you may need to shorten your original paper (cut out material) so that you can incorporate the additional information required for this assignment.

GRADING

APA Format

Grading Rubric: Consult the grading rubric for specific content and formatting requirements for this assignment

Provided an excellent overview of an emerging technology or emerging application of technology. The overview appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. (Authoritative sources were cited).

Provided an introduction that contained an outstanding overview of an emerging technology or emerging application of technology. The overview appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. (Authoritative sources were cited.)

Provided an introduction that contained an overview of an emerging technology or emerging application of technology. The overview provided some details about how the technology is used. The overview drew some information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers or from authoritative Web sites. (Authoritative sources were cited.)

Identified an appropriate technology. Provided an overview or introduction that was lacking in detail. Information from the survey of the professional literature was used in the overview (authoritative sources were cited).

Identified an appropriate technology but the overview of that technology lacked detail and/or was not well supported by information drawn from the survey of the professional literature or other authoritative sources.

The introduction and/or overview sections of the paper were off topic or failed to provide an overview of the emerging application of technology.

Identified 10 or more papers from the professional literature. All papers used in the survey were from the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used 10 or more papers from the survey of the literature throughout the discussion (as demonstrated by correctly formatted and placed citations).

Survey of the literature was based upon eight papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 8 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by correctly formatted and placed citations).

Survey of the literature was based upon six or seven papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 6 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by correctly formatted and placed citations).

Survey of the literature was based upon four or five papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 4 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by correctly formatted and placed citations).

Survey of the literature was based upon three or more papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 3 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by paraphrasing and including correctly formatted and placed citations).

Survey of the literature was based upon two or fewer papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). OR, did not appropriately use information from authoritative sources.

Provided an excellent discussion of the cybersecurity issues that need investigating using the characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Provided an outstanding discussion of the cybersecurity issues that need investigating using the characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Provided a discussion of the cybersecurity issues that need investigating using three or more characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Discussion provided few details as to the cybersecurity issues that need investigating. Discussion included two or more characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Discussed cybersecurity issues and technology characteristics which need investigating in the context of the emerging technology but the discussion lacked detail and/or was not well supported by information drawn from the survey of the professional literature.

The discussion of cybersecurity issues and/or technology characteristics was based upon personal opinion (no citations for sources from survey of the professional literature) OR this content element was missing.

Provided an excellent discussion of the cybersecurity issues that need investigating using the interactions between the technology and people / environments / processes associated with the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Provided an outstanding discussion of the cybersecurity issues that need investigating using the interactions between the technology and people / environments / processes associated with the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Provided a discussion of the cybersecurity issues that need investigating using the interactions between the technology and people / environments / processes associated with the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Discussion provided few details as to the cybersecurity issues that need investigating. Discussion included two or more interactions between the emerging technology or emerging application of technology and people / environment / processes. The discussion appropriately used information from authoritative sources.

Discussed cybersecurity issues and technology interactions which need investigating in the context of the emerging technology but the discussion lacked detail or was not well supported by information drawn from authoritative sources.

The discussion of cybersecurity issues related to technology interactions was based upon personal opinion (no citations for sources from survey of the professional literature) OR this content element was missing.

Provided an excellent discussion of the cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Provided an outstanding discussion of the cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Provided a discussion of the cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Discussion provided few details as to the cybersecurity related costs and benefits associated with adoption of the technology and/or did not mention cybersecurity issues that drive costs or benefits. Discussion included two or more interactions between the emerging technology or emerging application of technology and people / environment / processes. The discussion appropriately used information from authoritative sources.

Discussed cost and benefits associated with adoption of the emerging technology or emerging application of technology but the discussion lacked detail, did not address cybersecurity issues, or was not well supported by information drawn from authoritative sources.

The discussion of costs and benefits related to technology adoption was based upon personal opinion (no citations for sources from survey of the professional literature) OR this content element was missing.

Provided an excellent discussion of the cybersecurity related risks and/or vulnerabilities associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Provided an outstanding discussion of the cybersecurity related risks and/or vulnerabilities associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Provided a discussion of the cybersecurity related costs and risks or vulnerabilities (only one required) associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.

Discussion addressed the cybersecurity related risks or vulnerabilities but provided few details. Discussion included two or more risks or vulnerabilities related to adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from authoritative sources.

Discussed risks or vulnerabilities associated with adoption of the emerging technology or emerging application of technology but the discussion lacked detail, did not adequately address cybersecurity issues, or was not well supported by information drawn from authoritative sources.

The discussion of risks or vulnerabilities related to technology adoption was based upon personal opinion (no citations for sources from survey of the professional literature) OR this content element was missing.

Provided an excellent summary recommendation which was well supported by the body of the paper and included: (a) an explicit statement regarding recommendation that this technology be selected by the panel for formal evaluation, (b) justification expressed in terms of return on investment for monies spent during the evaluation, (c) identification of a specific recommended type of formal evaluation study.

Provided an outstanding summary recommendation which was well supported by the body of the paper and included: (a) an explicit statement regarding recommendation that this technology be selected by the panel for formal evaluation, (b) justification expressed in terms of return on investment for monies spent during the evaluation, (c) identification of a specific recommended type of formal evaluation study.

Provided a summary recommendation which was supported by the body of the paper and included the following: (a) recommendation that this technology be selected by the panel for formal evaluation, (b) justification for spending money on an evaluation, (c) identification of a recommended type of formal evaluation study.

Provided a summary recommendation which was supported by the body of the paper and included mention of the following: (a) recommendation that this technology be selected by the panel for formal evaluation, (b) justification for spending money on an evaluation, (c) recommendation for a formal evaluation study.

Provided a summary recommendation which was not supported by the body of the paper or which failed to include mention as to selection of the technology for an evaluation study. OR, the summary was not well supported by information drawn from authoritative sources.

The summary recommendation was missing or was not supported by the body of the paper.

Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS.

Discussion showed an outstanding understanding and integration of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS.

Correctly used standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS.

Correctly used standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from three or more pillars of IA/IS.

Used some standard cybersecurity terminology to support discussion of the technology. OR, use of terminology was not well supported by authoritative sources.

Did not integrate standard cybersecurity terminology into the discussion OR misused or incorrectly defined standard terms from the pillars of IA/IS.

Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource.

Work contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries.

Work contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries

Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries.

Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6thed.).

Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.

Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).

Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.

Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.

Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.

No work submitted.

No formatting, grammar, spelling, or punctuation errors.

Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.

Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.

Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.

Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.

No work submitted.

Overall Score

Unformatted Attachment Preview

Running Head: APPLICATION OF TECHNOLOGY IN A CRITICAL INFRASTRUCTURE 1 Smart Grid of Technology in a Critical Infrastructure APPLICATION OF TECHNOLOGY IN A CRITICAL INFRASTRUCTURE 2 Introduction The introduction and advancement of technology today make various areas of application work smoothly. However, these technologies may present both benefits and drawbacks that affect the respective application areas negatively and also positively. While considering the existing critical infrastructure, the energy sector plays a huge role in the affairs not only of the government but also of the esteemed citizens who depend on it for their daily tasks. In any case that the energy sector gets affected negatively, all the areas that use power get affected too. Recently, the suggested new technologies in the energy sector proof to provide numerous benefits to the entire industry regarding improved service delivery. The smart grid technology offers an automated platform to not only provide but also monitor the delivery of power to the various sectors. However, since the smart grid works within the existing electric lines and utilizes the various technological equipment, it may present a challenge in the manner regarding security. Could attackers use this opportunity to gain access to the respective technological devices within the smart grid and perform their respective tasks? The smart grid presents both benefits and challenges to the respective individuals. The primary advantage of the smart grid technology focuses on the manner in which the monitoring and delivery of the product happen. In the past, the energy sector relied on manual systems to deliver and monitor electricity which brought about numerous drawbacks. In the attempt to analyze the possible advantages as well as disadvantages of the smart grid technology, this paper focuses on the determination of the cybersecurity impacts and implications within the energy sector. APPLICATION OF TECHNOLOGY IN A CRITICAL INFRASTRUCTURE 3 Smart grid technologies and applications Bayindir, R., Colak, I., Fulli, G., & Demirtas, K. (2016). Smart grid technologies and applications. Renewable and Sustainable Energy Reviews, 66, 499-516. Retrieved from https://www.sciencedirect.com/science/article/pii/S1364032116304191 According to Bayindir, Colak, Fulli & Demirtas, (2016), the primary objectives of the smart grid system focuses on the delivery of the respective services as well as products to the consumers among other areas of an application while observing safety, quality and also reliability/availability. As such, the chosen technologies must first conform to the existing guidelines by the respective regulatory bodies. The purpose of the smart grid revolves around revolutionizing the currently used power lines to meet the growing demand and desire for intelligent systems that use the technology as the primary backbone to delivering the respective services. However, through the use of the latest technology in the various tasks, the relevant parties which include designers, engineers and also the planners must first take into consideration the possible impacts of the implementation of the smart grid. The paper addressed the need for the distribution as well as transmission engineers to first perform the relevant risk management tasks to reduce or avoid the chances of cyber-attacks, unreliability, compromise of integrity and also to guarantee availability. SoftGrid: A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions Gunathilaka, P., Mashima, D., & Chen, B. (2016, October). Softgrid: A software-based smart grid testbed for evaluating substation cybersecurity solutions. In Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy (pp. 113-124). ACM. Retrieved from https://dl.acm.org/citation.cfm?id=2994494 APPLICATION OF TECHNOLOGY IN A CRITICAL INFRASTRUCTURE 4 This article claims that today, the relevant regulatory bodies work with various standards such as the IEC 60870 and 61850 that make it possible and easy to automate and remotely access the different power stations. The article further says that although the standards provide and create a massive milestone in the energy sector, little the absence of the relevant recommendations for the most efficient security mechanisms present a challenge to the future developments. Shortly, with the current trend and pace of implementation of the smart grids, security challenges will arise which will make it hard to make any events leading to increased downtimes, unreliability and unavailability cases. One of the proposed solutions to the cybersecurity issues related to the use of the SoftGrid technology. The software focuses on the evaluation of the performance, reliability and also interoperability to offer a protection mechanism to the respective power stations and the smart grids at large. The implementation of the recommended software presents a challenge in real life which questions its relevance. Cybersecurity and the Smarter Grid Hawk, C., & Kaushiva, A. (2014). Cybersecurity and the smarter grid. The Electricity Journal, 27(8), 84-95. Retrieved from https://www.sciencedirect.com/science/article/pii/S1040619014001791 According to this article, the most focus regarding security should address the issue of reliability. Without reliability, the smart grid may not survive shortly which in the end may render it unusable and incompetent. As a result, designing the best solutions to curb cyber attacks would offer a solid base from which the smart grid may deliver its services. This paper looks at the partnership between the energy sector and the other relevant parties and stakeholders in the field of security in the attempt to come up with the best recommendations to guarantee future survival. The primary objective of such a partnership revolves around the identification and APPLICATION OF TECHNOLOGY IN A CRITICAL INFRASTRUCTURE 5 realization of the best risk management and mitigation framework that would help such areas of application witness and enjoy availability and also power reliability. Cyber-security analysis of smart grid SCADA systems with game models Hewett, R., Rudrapattana, S., & Kijsanayothin, P. (2014, April). Cyber-security analysis of smart grid SCADA systems with game models. In Proceedings of the 9th annual cyber and information security research conference (pp. 109-112). ACM. Retrieved from https://dl.acm.org/citation.cfm?id=2602087.2602089 The smart grid stands at a higher chance of getting attacked by hackers among other parties. The article claims that in case such an attack happens, it may affect the normal daily operations of the smart grid. Ultimately, the overall impacts would lead to the realization of constant and unforeseen blackouts which may paralyze the economy. Unlike the other articles that just offer a mere definition of the security challenges that may occur and affect the smart grid, this paper addresses a specific recommendation that would help in detecting and possibly reducing the impacts of any associated risks. Hence, focusing its research on the cybersecurity perspective, the article outlines and uses the respective game models to perform a more in-depth cybersecurity analysis of the smart grid SCADA systems. Through the implementation of the proposed framework within the real world scenario such as Sybil, the relevant result obtained from a mirror of the future expectation after the application of the smart grid systems. Applied Cyber Security and the Smart Grid Knapp, E. D., & Samani, R. (2013). Applied cybersecurity and the smart grid: implementing security controls into the modern power infrastructure. Newnes. Retrieved from https://www.sciencedirect.com/science/book/9781597499989 APPLICATION OF TECHNOLOGY IN A CRITICAL INFRASTRUCTURE 6 Knapp & Samani (2013) argue that the commonly perceived thought of the smart grid revolves around just a single aspect that includes the improvement in the metering and distribution processes. However, most of the other aspects remain neglected which creates a disparity in crafting and implementing the best and the most appropriate security mechanisms to work on the other areas of application. In defining the areas where smart grid touches, the two claim that the technologies used affect homes, businesses, the power generation areas and also the distribution sectors. As such, defining a single security mechanism to handle the entire problems may not always yield the best results. As a result, the best manner to handle the security issues revolves around first identifying all the avenues where smart grid applies and then determining the most customized security countermeasures to the specific areas. Ultimately, identifying the possible strengths, in-depth details and finally, the vulnerabilities would help in drafting an effective advanced risk management and mitigation framework as far as cybersecurity is concerned. The article defines the constituent parts of the smart grid which helps in identifying the various vulnerabilities as a result of specific avenues. Security and Privacy Challenges in the Smart Grid McDaniel, P., & McLaughlin, S. (2016) Security and Privacy Challenges in the Smart Grid. IEEE Security & Privacy, 7(3). Retrieved from https://dl.acm.org/citation.cfm?id=1592183 This paper starts by stating the fact that the electrical systems and infrastructures today across the globe stand in the way of a huge transition. The traditional systems slowly get phased out of the infrastructure where new and modern technologies replace them. The smart grid technology provides numerous benefits to the consumers across the globe. However, the article claims that even with the possible benefits associated with the smart grid technology, it presents drawbacks also. These drawbacks come in form of the various security concerns. The article APPLICATION OF TECHNOLOGY IN A CRITICAL INFRASTRUCTURE 7 starts by addressing the current state of the smart grid technology from a global perspective by outlining the motivational factors and the consequent security implications. The article concludes by saying that the new technology in the energy sector may present a wide range of security flaws that in the future will render them unusable if the issues remain neglected and unresolved. Mitigating the Risk of Cyber Attack on Smart Grid Systems Rice, E. B., & AlMajali, A. (2014). Mitigating the risk of cyber attack on smart grid systems. Procedia Computer Science, 28, 575-582. Retrieved from https://www.sciencedirect.com/science/article/pii/S1877050914001331 The primary purpose and objective of implementing the smart grid technologies focus on the need to improve the current traditional electric distribution and monitoring techniques. However, these improvements come with their respective challenges. According to this paper, the author claims that with the wide range of benefits associated with smart grid technologies, the same spectrum of vulnerable areas arises. As a result, the smart grid technology may, in the end, present more risks than benefits. The most probable recommendation to the unforeseen hazards includes the incorporation of the various cybersecurity aspects such as reliability, availability, confidentiality and also fault tolerance into a single framework. This framework then may offer the most appropriate mechanism for dealing with the possible issues arising and help the nations reap the ultimate benefits of smart grid technologies. The article presents a good starting point to deal with the possible risks that may arise as a result of cyber attacks. APPLICATION OF TECHNOLOGY IN A CRITICAL INFRASTRUCTURE 8 Cybersecurity for the Smart Grid Sorini, A., & Staroswiecki, E. (2017). Cybersecurity for the Smart Grid. In The Power Grid (pp. 233-252). Retrieved from https://www.sciencedirect.com/science/article/pii/B9780128053218000082 Sorini & Staroswiecki (2017) in their paper presented an analysis of the smart grid in terms of the respective cybersecurity principles. Instead of addressing just the logical security measures, the paper outlines the physical aspects of the smart grid. The paper further claims that the smart grid systems should provide the best solutions to the currently held challenges in power generation, distribution as well as monitoring. The smart grid may, therefore, face numerous challenges during its operations which largely may result from the cyber-attacks. In case such an attack happens, the places that benefit from the services offered may feel the overall impacts. As a result, the paper tries to come up with the best hazard evaluation as well as analysis of the smart grid components. Further, the paper offers an analysis of the most crucial aspects such as the failure modes and recommends that before implementing the technologies, the relevant stakeholders should first undertake impacts and fault tree evaluation. Cybersecurity in the Smart Grid: Survey and challenges Wang, W., & Lu, Z. (2013). Cybersecurity in the smart grid: Survey and challenges. Computer Networks, 57(5), 1344-1371. Retrieved from https://www.sciencedirect.com/science/article/pii/S1389128613000042 The incorporation of the latest information technologies in the power distribution and monitoring today offers a good platform for the delivery of the respective services to the esteemed customers. In their research, Wang and Lu claim that the technology used in the smart APPLICATION OF TECHNOLOGY IN A CRITICAL INFRASTRUCTURE 9 grid may offer numerous advantages of the respective areas of application which include both reliability as well as efficiency. However, they further claim that although before the implementation of such a system the stakeholders first address the various challenges that may arise, the issue of cybersecurity remains neglected. The inability of the stakeholders to take into consideration the salient features and characteristics of the smart grid in terms of identifying the possible vulnerabilities in areas such as the network presents a huge risk in the future. This article discusses the security requirements of the smart grid together with the other vulnerabilities and finally, the possible recommendations such as the appropriate countermeasures to offer the best recommendation for implementation. Security and Privacy in Smart Grids Xiao, Y. (Ed.). (2013). Security and privacy in smart grids. CRC Press. Retrieved from https://dl.acm.org/citation.cfm?id=2559495 Since each and every system that makes use of the latest technologies and information faces numerous challenges in terms of security, Yang Xiao in this article claims that the smart grid must get equipped with the best mechanisms in order to deliver its services effectively. Further, Xiao claims that the most basic security mechanisms may not effectively help the smart grids to deliver their daily tasks. As a result, the application and implementation of the systems may, in the long run, provide avenues in form of vulnerabilities to the possible attackers to undertake their tasks. In order to prevent these future attacks, the article recommends that the relevant stakeholders should first develop advanced security and privacy mechanisms in the attempt to guarantee reliability, availability and also the efficiency of the smart grid systems. From a personal perspective, the article offers a solid background from where the relevant APPLICATION OF TECHNOLOGY IN A CRITICAL INFRASTRUCTURE 10 stakeholders may base the development of the most effective security framework which covers aspects such as the smart meters, the network and also other vulnerable areas. Conclusion The emerging technologies especially the ones applied in the critical infrastructure offer an effective platform that fosters improved service delivery. However, the more advanced the technology gets, the more the risks that arise. Considering the energy sector, it stands out as one of the most important critical infrastructures in the economy. The upgrading of the power generation, distribution and monitoring processes plays a huge role in achieving reliability and availability of electricity to the consumers. However, the smart grid technology faces numerous challenges such as cyber-attacks among others. This paper looked at the various pieces of literature on the issues that may affect the effective delivery of services by the smart grid from a cybersecurity perspective. APPLICATION OF TECHNOLOGY IN A CRITICAL INFRASTRUCTURE 11 Bibliography Bayindir, R., Colak, I., Fulli, G., & Demirtas, K. (2016). Smart grid technologies and applications. Renewable and Sustainable Energy Reviews, 66, 499-516. Gunathilaka, P., Mashima, D., & Chen, B. (2016, October). Softgrid: A software-based smart grid testbed for evaluating substation cybersecurity solutions. In Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy (pp. 113-124). ACM. Hawk, C., & Kaushiva, A. (2014). Cybersecurity and the smarter grid. The Electricity Journal, 27(8), 84-95. Hewett, R., Rudrapattana, S., & Kijsanayothin, P. (2014, April). Cyber-security analysis of smart grid SCADA systems with game models. In Proceedings of the 9th annual cyber and information security research conference (pp. 109-112). ACM. Knapp, E. D., & Samani, R. (2013). Applied cyber security and the smart grid: implementing security controls into the modern power infrastructure. Newnes. McDaniel, P., & McLaughlin, S. (2016) Security and Privacy Challenges in the Smart Grid. IEEE Security & Privacy, 7(3). Rice, E. B., & AlMajali, A. (2014). Mitigating the risk of cyber attack on smart grid systems. Procedia Computer Science, 28, 575-582. Sorini, A., & Staroswiecki, E. (2017). Cybersecurity for the Smart Grid. In The Power Grid (pp. 233-252). Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5), 1344-1371. APPLICATION OF TECHNOLOGY IN A CRITICAL INFRASTRUCTURE Xiao, Y. (Ed.). (2013). Security and privacy in smart grids. CRC Press. 12
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: RECOMMENDATIONS TO STUDY AND EVALUATE A SMART GRID 1

Recommendations to Study and Evaluate a Smart Grid
Names:
Institution:

RECOMMENDATIONS TO STUDY AND EVALUATE A SMART GRID

2

Recommendations to study and evaluate a Smart Grid
Overview
The smart grid technology offers an automated platform to not only provide but also
monitor the delivery of power to the various sectors. This is a technology that has seen
widespread usage in developed countries and more so in the US and European regions, and
that could provide a solution to other regions globally. However, since the smart grid works
within the existing electric lines and utilizes the various technological equipment, it may
present a challenge in the manner regarding security. The smart grid presents both benefits
and challenges to the respective individuals. The primary advantage of the smart grid
technology focuses on the manner in which the monitoring and delivery of the product
happen. In the past, the energy sector relied on manual systems to deliver and monitor
electricity which brought about numerous drawbacks. In the attempt to develop a
recommendation on studying and evaluating the smart grid technology, this paper focuses on
the exploration of characteristics of the technology, interaction among smart grid technology,
people and environment, risks and vulnerabilities of the technology, and the costs and benefits
associated with the same
Cybersecurity issues based on characteristics of smart grid technology
The incorporation of the latest information technologies in the power distribution and
monitoring today offers a good platform for the delivery of the respective services to the
esteemed customers. In their research, Wang and Lu (2013) claim that the technology used in
the smart grid may offer numerous advantages of the respective areas of application which
include both reliability as well as efficiency. However, since technology ...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags