Home / Blogs

Report on Smart Grid Cyber Security

A recent report from Pike Research, “Smart Grid Cyber Security” has found if smart grids can realize their full potential, consumers, utilities, nations, and even the earth itself will benefit. As with nearly any new technology, the industry focus has been on getting smart grids up and running, often with little consideration for cyber security issues. However, the report found that investment in securing the grid from malicious attacks, natural disasters, and other accidents is picking up pace. The cleantech market intelligence firm expects that smart grid cyber security spending will increase 62% between 2010 and 2011, and by 2015 the annual worldwide market spending in this critical sector will reach $1.3 billion.

Smart grid cyber security is significantly more complex than the traditional IT security world. It is a common misperception that IT networks and industrial control systems have the same cyber security issues and can be secured with the same countermeasures. To successfully secure the electrical grid, utilities and their key suppliers must design solutions that effectively bridge the worlds of information and operations technology.

Effective smart grid cyber security deployments will address a wide variety of key issues:

  • Stronger identity management
  • Multi-factor authentication on powerful consoles
  • Computer incident response
  • Change management, asset management, and configuration management
  • Business continuity planning
  • Defense-in-depth for IT and ICS networks
  • Stronger security on SCADA control systems
  • More secure interfaces between IT and ICS networks
  • Video monitoring capabilities for substations and control rooms
  • End-to-end encryption of data from the home area network (HAN) to the utility central site
  • Need to prevent worms from spreading through smart meters
  • Stronger cyber security software on smart meters
  • Resiliency throughout the advanced metering infrastructure (AMI)
  • Data integrity for electric vehicle recharging transactions
  • Data privacy for electric vehicle billing data and recharging transactions
  • Security awareness education for all affected employees

Over the next few years, Pike Research anticipates that growth in the smart grid cyber security market will produce opportunities not only for hardware and software sales, but also for a number of new professional services opportunities. These service offerings will help utilities navigate the minefield of threats and challenges that pose fundamental risks to the integrity of the grid infrastructure.

By Paul Budde, Managing Director of Paul Budde Communication

Paul is also a contributor of the Paul Budde Communication blog located here.

Visit Page

Filed Under

Comments

Smart Grid Security Ben Edelbrock  –  Jul 8, 2011 5:49 PM

Great commentary on the study and thanks for bringing attention to security in utilities. It is amazing how this topic has evolved from an afterthought prior to Stuxnet to a consistent discussion point within every utility. The utility executive always focuses on security in regard to systems, but for the most part has been in respect to theft. There has been a shift of focus from eliminating theft to protection from malicious attack. It is imperative that instead of focusing on NERC compliance that we look past just compliance and focus on making new systems impenetrable. With the consumer backlash faced in the industry due to some AMI programs, it important to avoid widespread security concerns. Thank you for your attention to this important subject. For more information around smart grid security, please visit www.infosysblogs.com/smart-utilities Ben Edelbrock- Infosys

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign