DOC PREVIEW
UCCS CS 6910 - Secure Smart Grid

This preview shows page 1-2-3-4 out of 12 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Secure Smart GridWhat is Smart Grid?Local Smart Grid SecurityTrans-Smart Grid SecuritySecure Smart Grid ChallengesWhat is wrong with this picture?What is wrong with this diagram?RMSSGI Security ProgramSSG Program ConceptsProgram Concepts/Demo ProjectsSlide 11Slide 12Secure Smart GridSecure Smart GridEdward ChowDepartment of Computer ScienceUniversity of Colorado at Colorado SpringsEdward ChowDepartment of Computer ScienceUniversity of Colorado at Colorado SpringsSSG Chow 1What is Smart Grid?What is Smart Grid?automated, widely distributed energy delivery network characterized by a two-way flow of electricity and information, capable of monitoring/responding to changes in power plants, customer preferences individual appliances. Enable new opportunities and support innovations:nationwide use of plug-in hybrid electric vehicles,ability to return stored energy to the grid; seamless integration of renewable energy sources like wind and solar; enabling consumer choice; integration of green building practices with the grid;Large-scale energy storageautomated, widely distributed energy delivery network characterized by a two-way flow of electricity and information, capable of monitoring/responding to changes in power plants, customer preferences individual appliances. Enable new opportunities and support innovations:nationwide use of plug-in hybrid electric vehicles,ability to return stored energy to the grid; seamless integration of renewable energy sources like wind and solar; enabling consumer choice; integration of green building practices with the grid;Large-scale energy storageSSG Chow 2Local Smart Grid SecurityLocal Smart Grid SecuritySSG Chow 3Electric/Hybridcar charging station substationDeviceTamperingFake IDHijack StationJammingWorm Hole AttacksSnoopingInsider AttacksBotnet DDoS AttacksMeter DatabaseTamperingTrans-Smart Grid SecurityTrans-Smart Grid SecurityInter-operabilities: Key Management Systems/KMIPCoordinated Intrusion detection and handling (DDoS attacks)Coordinated disaster recovery and outage managementProtect security access to systems providing new smart grid services/feature proposed energy storage systemHybrid/electric charging station (Mutual authentication; authentication of keys issued by different utilities/vendors)Inter-operabilities: Key Management Systems/KMIPCoordinated Intrusion detection and handling (DDoS attacks)Coordinated disaster recovery and outage managementProtect security access to systems providing new smart grid services/feature proposed energy storage systemHybrid/electric charging station (Mutual authentication; authentication of keys issued by different utilities/vendors)SSG Chow 4Secure Smart Grid ChallengesSecure Smart Grid ChallengesUtilization of Internet and related IP and wireless technologies expose the system to easy, remote, extern cyber threats such as DDoS attacks from North Korea.immense areas to be monitored and physically secured.infrastructure security and cyber security need to be addressed. Threats can come from hostile governments, terrorist groups, disgruntled employees, malicious intruders, complexities, accidents, natural disasters as well as malicious or accidental actions by insiders.Utilization of Internet and related IP and wireless technologies expose the system to easy, remote, extern cyber threats such as DDoS attacks from North Korea.immense areas to be monitored and physically secured.infrastructure security and cyber security need to be addressed. Threats can come from hostile governments, terrorist groups, disgruntled employees, malicious intruders, complexities, accidents, natural disasters as well as malicious or accidental actions by insiders.SSG Chow 5What is wrong with this picture?What is wrong with this picture?SSG Chow 6Real picture from a SG vendor's brochure:-)What is wrong with this diagram?What is wrong with this diagram?SSG Chow 7RMSSGI Security ProgramRMSSGI Security ProgramMission: “Improve the security of national smart grid infrastructure and impact future security standards for smart grids through coordinated large scale multi-utilities demo projects.”Program Team Members:Dr. Edward Chow (Cyber Security) Project Co-LeadDr. Ray Tretcher (Infrastructure Security) Co-Lead.23 Researchers from MIT Lincoln Lab, Sandia, UCB, UCCS, CSU, DHS, LM, Bell Lab, CS Utilities, Northcom, Merrick, NISSSCSee web site: http://athena.uccs.edu/ssg/Mission: “Improve the security of national smart grid infrastructure and impact future security standards for smart grids through coordinated large scale multi-utilities demo projects.”Program Team Members:Dr. Edward Chow (Cyber Security) Project Co-LeadDr. Ray Tretcher (Infrastructure Security) Co-Lead.23 Researchers from MIT Lincoln Lab, Sandia, UCB, UCCS, CSU, DHS, LM, Bell Lab, CS Utilities, Northcom, Merrick, NISSSCSee web site: http://athena.uccs.edu/ssg/SSG Chow 8SSG Program ConceptsSSG Program ConceptsEnsure ability to ensure the three basic security service availability, integrity, and confidentiality (CIA) of smart grids. Incorporate the new physical/cyber security technologies and best practices in security  guarantee the uninterrupted service delivery even under DDoS or malicious worm attacks, Monitor, locate, isolate, and respond to physical attacks, Ensure the integrity of the operation and data collection, Protect the privacy of its customers/employees and the confidentiality of the system data and programs.Ensure ability to ensure the three basic security service availability, integrity, and confidentiality (CIA) of smart grids. Incorporate the new physical/cyber security technologies and best practices in security  guarantee the uninterrupted service delivery even under DDoS or malicious worm attacks, Monitor, locate, isolate, and respond to physical attacks, Ensure the integrity of the operation and data collection, Protect the privacy of its customers/employees and the confidentiality of the system data and programs.SSG Chow 9Program Concepts/Demo ProjectsProgram Concepts/Demo ProjectsCross Domain Secure Information Sharing For DDoS Defense and Coordinated Disaster Recovery Key Management and Distribution Secure Collective Smart Grid Defense Secure SCADA and Efficient Multi End Point Security Biotope based Biometric Authentication Infrastructure Meter Data Integrity for Peak/Outage Management Penetration Testing, Software Scanning, and Vulnerabilitiy AnalysisCross Domain Secure Information Sharing For DDoS Defense and


View Full Document

UCCS CS 6910 - Secure Smart Grid

Download Secure Smart Grid
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Secure Smart Grid and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Secure Smart Grid 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?