• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD
Securing the Smart Grid - Product Image

Securing the Smart Grid

  • ID: 1763192
  • November 2010
  • 320 Pages
  • Elsevier Science and Technology

Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers.
The book discusses different infrastructures in a smart grid, such as the automatic metering infrastructure (AMI). It also discusses the controls that consumers, device manufacturers, and utility companies can use to minimize the risk associated with the smart grid. It explains the smart grid components in detail so readers can understand how the confidentiality, integrity, and availability of these components can be secured or compromised.
This book will be a valuable reference for readers who secure the networks of smart grid deployments, as well as consumers who use smart grid devices.

- Details how old and new hacking techniques can be used against the grid and how to defend against them
- Discusses current security initiatives and how they fall short of what is needed
- Find out how hackers can use the new infrastructure against itself

Note: Product cover images may vary from those shown

Chapter 1: Smart Grid: What is it?

Chapter 2: Threats and Impacts: Consumers

Chapter 3: Threats and Impacts: utility companies & Beyond

Chapter 4: Federal Effort to Secure Smart Grids

Chapter 5: State and Local Security Initiatives

Chapter 6: Public and Private Companies

Chapter 7: Attacking the Utility Companies

Chapter 8: Securing the Utility Companies

Chapter 9: Third-Party Services

Chapter 10: Mobile Applications

Chapter 11: Social Networking & The Smart Grid

Chapter 12: Home Area Network: Smart Meters

Chapter 13: Home Area Network: Smart Devices and Interfaces

Chapter 14: What's Next?

Note: Product cover images may vary from those shown

Flick, Tony
Tony Flick has been working in the Information Security field for more than six years and is currently a Principal with FYRM Associates. Mr. Flick has assisted numerous organizations in achieving compliance with federal regulations and industry standards. His expertise includes risk management and compliance, assessments and audits, and research in emerging technologies. Mr. Flick has presented at Black Hat USA, DEFCON, and the OWASP Tampa local chapter on smart grid and application security concepts. Mr. Flick holds the CISSP certification. Additionally, Mr. Flick earned a Bachelors of Science in Computer Science and a Bachelors of Science in Mathematics.
Morehouse, Justin
Justin Morehouse is an Information Security professional with over 10 years of experience assisting Fortune 100 companies and Federal Government Agencies mature their Information Security programs. Over the past six years Mr. Morehouse has focused on the areas of attack and penetration, performing nearly 200 Security Assessments utilizing both NIST SP800-42's "Blue Teaming? and "Red Teaming? approaches. Mr. Morehouse is the OWASP Tampa chapter leader and presented at IEEE's EntNet. Mr. Morehouse holds the following degrees and certifications: CISSP, CISM, MCSE, MSIA, and QSA (Former). He is currently an adjunct professor at DeVry University.

Note: Product cover images may vary from those shown
Note: Product cover images may vary from those shown

RELATED PRODUCTS

Our Clients

Our clients' logos