Smart Grid Technology Market – Analysis And Global Forecast By Hardware, Software & Communication Network Technologies (2011 – 2016)
- Language: English
- 304 Pages
- Published: February 2012
- Region: Global
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers.
The book discusses different infrastructures in a smart grid, such as the automatic metering infrastructure (AMI). It also discusses the controls that consumers, device manufacturers, and utility companies can use to minimize the risk associated with the smart grid. It explains the smart grid components in detail so readers can understand how the confidentiality, integrity, and availability of these components can be secured or compromised.
This book will be a valuable reference for readers who secure the networks of smart grid deployments, as well as consumers who use smart grid devices.
- Details how old and new hacking techniques can be used against the grid and how to defend against them
- Discusses current security initiatives and how they fall short of what is needed
- Find out how hackers can use the new infrastructure against itself
Chapter 1: Smart Grid: What is it?
Chapter 2: Threats and Impacts: Consumers
Chapter 3: Threats and Impacts: utility companies & Beyond
Chapter 4: Federal Effort to Secure Smart Grids
Chapter 5: State and Local Security Initiatives
Chapter 6: Public and Private Companies
Chapter 7: Attacking the Utility Companies
Chapter 8: Securing the Utility Companies
Chapter 9: Third-Party Services
Chapter 10: Mobile Applications
Chapter 11: Social Networking & The Smart Grid
Chapter 12: Home Area Network: Smart Meters
Chapter 13: Home Area Network: Smart Devices and Interfaces
Chapter 14: What's Next?
Tony Flick has been working in the Information Security field for more than six years and is currently a Principal with FYRM Associates. Mr. Flick has assisted numerous organizations in achieving compliance with federal regulations and industry standards. His expertise includes risk management and compliance, assessments and audits, and research in emerging technologies. Mr. Flick has presented at Black Hat USA, DEFCON, and the OWASP Tampa local chapter on smart grid and application security concepts. Mr. Flick holds the CISSP certification. Additionally, Mr. Flick earned a Bachelors of Science in Computer Science and a Bachelors of Science in Mathematics.
Justin Morehouse is an Information Security professional with over 10 years of experience assisting Fortune 100 companies and Federal Government Agencies mature their Information Security programs. Over the past six years Mr. Morehouse has focused on the areas of attack and penetration, performing nearly 200 Security Assessments utilizing both NIST SP800-42's "Blue Teaming? and "Red Teaming? approaches. Mr. Morehouse is the OWASP Tampa chapter leader and presented at IEEE's EntNet. Mr. Morehouse holds the following degrees and certifications: CISSP, CISM, MCSE, MSIA, and QSA (Former). He is currently an adjunct professor at DeVry University.