SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Smart Grid Security
nCircle, the leader in information risk and security performance management solutions, partnered with
EnergySec, a DOE-funded public-private partnership that works to enhance the cyber security of the
electric infrastructure, to sponsor a smart grid security survey of over 104 energy security professionals.
The online survey was conducted between March 16 and March 31, 2012.

Key smart grid security findings:

       64% said smart meters are vulnerable to false data injection
       75% said security has not been adequately addressed in smart grid deployment
       90% believe we need smart grid security standards
       64% believe smart grid deployment should slow down until we have better security controls
       Only 50% said their organization has a security program and security policies for smart grid
        deployment
       66% say for smart grid projects funded by American Recovery and Reinvestment Act grants
        have not adequately addressed security

    The complete results of the survey, including commentary from Patrick Miller, CEO of EnergySec,
    and Elizabeth Ireland, vice president of marketing for nCircle are below:




          Has the hype around privacy issues                      Has security been adequately
             associated with smart meter                       addressed in smart grid deployment?
           consumer data been overblown?                                          75%
                  53%
                            47%

                                                                        25%



                      Yes   No                                              Yes    No


    "Smart Grid meter privacy is still a new area," said Patrick Miller. "State regulations are inconsistent
    and sensitive customer details in smart grid data vary from utility to utility. I expect the smart grid
    industry to struggle with several challenges around who ultimately 'owns' customer data. There are
    several grey areas that impact how smart grid customer data will be used as the industry attempts
    to maximize revenue potential. Even seemingly innocuous customer data has significant value -- just
    ask Facebook or Google.”
Patrick Miller noted, "Smart meters vary widely in
      Do smart meter installations have
        sufficient security controls to
                                               capability and many older meters were not designed to
     protect against false data injection?     adequately protect against false data injection. It doesn't
                                               help that some communication protocols used by the
                        61%                    smart meter infrastructure don't offer much protection
                                               against false data injection either. Together, these facts
              39%                              highlight a much larger potential problem with data
                                               integrity across the smart grid infrastructure. Because our
                                               nation relies on the smart grid to deliver robust and
                                               reliable power, we need to make sure that all systems that
                                               process usage data, especially those that make
                                               autonomous, self-correcting, self-healing decisions, assure
                 Yes     No
                                               data integrity."


"A false data injection attack is another example of technology advancing faster than security controls,”
said Elizabeth Ireland. “This is a problem that has been endemic in the evolution of security and it's a key
reason for the significant cyber security risks we face across many facets of critical infrastructure.
Installing technology without sufficient security controls presents serious risks to our power
infrastructure and to every power user in the U.S."


"Security has been addressed to varying degrees in many
smart grid deployments, however it is going to be a                   Are smart grid security standards
                                                                      moving fast enough to keep pace
challenge to keep pace with the constantly changing
                                                                        with smart grid deployment?
security landscape," said Patrick Miller. "The analog and
mechanical devices installed in most utilities were designed
for a very different maintenance model than newer digital                              72%
equipment being designed and installed today."
Elizabeth Ireland noted, "It's pretty clear that information
security professionals in the energy industry are
                                                                             28%
uncomfortable with standards currently available for smart
grid technology. Defining and implementing meaningful
security standards is always a challenge but without
standards, adoption of critical security controls across the
                                                                                 Yes    No
smart grid industry is likely to be uneven at best."
Do you think we need smart grid                    Does your organization have a
             specific security standards and                security program and security policies
                   89% policies?                                 for smart grid deployment?

                                                                      49%       51%



                             11%

                      Yes     No                                         Yes        No




                                   What part of smart grid infrastructure is most
                                           vulnerable to cyber attack?

                                                   41%
                                         29%
                                                            20%
                                                                      10%



                               Smart meters
                               Metering infrastructure including transport networks
                               Utility energy management systems
                               Energy management, such as phasor measurement units



According to Patrick Miller, CEO of EnergySec, "The enormous range of technology in the smart grid
presents many points of potential vulnerability, and we are moving at the speed of light to insert even
more technology 'shims' into the existing network structures of the smart grid. This ever-increasing rate
of complexity and hyper-embedded technology will be very difficult to secure."

"The complexity of SCADA technology combined with the range of results from survey respondents on
this issue indicates that we don't have any single section of the smart grid fully secured," said Elizabeth
Ireland, vice president of marketing for nCircle. "It's not surprising that energy industry security
professionals deem metering infrastructure as the highest area of risk. Individual partners in any
complex supply chain often have very limited visibility into the security for the entire process."
How should the security risks associated with the smart
                    grid affect deployment plans?
                                64%


                    33%

                                             4%

   No change from current plans; full steam ahead
   Deployment should slow down until we have better security controls
   We don’t need a smart grid at all




     Should regulatory oversight for smart             Have the American Recovery and
      grid distribution be transitioned to             Reinvestment Act of 2009 grants
           the Federal government?                      awarded to smart grid projects
                                                        adequately addressed security?
                          60%                                          66%
              40%
                                                                  34%



                 Yes       No                                       Yes   No


"The modernized grid encompasses new digital components all the way from the toaster to the
turbine,” noted Patrick Miller. “It spans local, state and federal regulatory lines. In an environment
where innovation is paramount, a federal one-size-fits-all approach may significantly slow down
progress. On the other hand, potential inconsistencies in regulatory approaches may introduce
complexity and risk smart grid landscape. Either model, whether state or federally regulated, comes
with pros and cons. I see the regulatory oversight of the smart grid as one of our biggest smart grid
challenges with the least obvious solution."

“It’s likely that the division of opinion on regulatory oversight reflects, at least to some degree,
fundamental political beliefs” said Elizabeth Ireland. “Some security professionals probably see
government regulation in industry as beneficial, and some feel we should minimize the role of
government in industry as much as possible. The majority of energy security professionals surveyed
believe the energy industry will police itself.”

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1EnergySec
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report Bricata, Inc.
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security ServicesParviz Iskhakov, PhD
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...Internetwork Engineering (IE)
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsBooz Allen Hamilton
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Nicole Pellegrino
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco
 
Smart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit RevereSmart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit Reverehhanebeck
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 

Was ist angesagt? (20)

Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security Services
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
Antigena Overview
Antigena OverviewAntigena Overview
Antigena Overview
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
Smart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit RevereSmart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit Revere
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 

Andere mochten auch

Il valore del dato nel mondo del gas
Il valore del dato nel mondo del gasIl valore del dato nel mondo del gas
Il valore del dato nel mondo del gascanaleenergia
 
SMART WATER 4 novembre
SMART WATER 4 novembreSMART WATER 4 novembre
SMART WATER 4 novembrecanaleenergia
 
SMART WATER 4 novembre
SMART WATER 4 novembreSMART WATER 4 novembre
SMART WATER 4 novembrecanaleenergia
 
SMART CITY 3 novembre
SMART CITY 3 novembre SMART CITY 3 novembre
SMART CITY 3 novembre canaleenergia
 
Opportunità per le aziende di vendita
Opportunità per le aziende di venditaOpportunità per le aziende di vendita
Opportunità per le aziende di venditacanaleenergia
 
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...canaleenergia
 

Andere mochten auch (9)

Il valore del dato nel mondo del gas
Il valore del dato nel mondo del gasIl valore del dato nel mondo del gas
Il valore del dato nel mondo del gas
 
SMART WATER 4 novembre
SMART WATER 4 novembreSMART WATER 4 novembre
SMART WATER 4 novembre
 
SMART WATER 4 novembre
SMART WATER 4 novembreSMART WATER 4 novembre
SMART WATER 4 novembre
 
Wataclic_Conte
Wataclic_ConteWataclic_Conte
Wataclic_Conte
 
SMART CITY 3 novembre
SMART CITY 3 novembre SMART CITY 3 novembre
SMART CITY 3 novembre
 
Opportunità per le aziende di vendita
Opportunità per le aziende di venditaOpportunità per le aziende di vendita
Opportunità per le aziende di vendita
 
Roma Tech &Lighting
Roma Tech &LightingRoma Tech &Lighting
Roma Tech &Lighting
 
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
 
Claudia Canaveri
Claudia CanaveriClaudia Canaveri
Claudia Canaveri
 

Ähnlich wie Sondaggio smart meter

Security for Smartgrid
Security for SmartgridSecurity for Smartgrid
Security for SmartgridGruene-it.org
 
Protecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated SecurityProtecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated SecurityEnergy Network marcus evans
 
IBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM Energy & Utilties
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid systemamaljose949563
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryChristian Glover Wilson
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkGauthamSK4
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...online Marketing
 
DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020Neil McDonnell
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecurityIRJET Journal
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?GENIANS, INC.
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...Clifton M. Hasegawa & Associates, LLC
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
Prédictions 2021, étude Deloitte
Prédictions 2021, étude DeloittePrédictions 2021, étude Deloitte
Prédictions 2021, étude DeloittePaperjam_redaction
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesDr Dev Kambhampati
 

Ähnlich wie Sondaggio smart meter (20)

Security for Smartgrid
Security for SmartgridSecurity for Smartgrid
Security for Smartgrid
 
Protecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated SecurityProtecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated Security
 
IBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart Grids
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
 
DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 
Nreca kickoff meeting
Nreca kickoff meetingNreca kickoff meeting
Nreca kickoff meeting
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Prédictions 2021, étude Deloitte
Prédictions 2021, étude DeloittePrédictions 2021, étude Deloitte
Prédictions 2021, étude Deloitte
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 

Mehr von canaleenergia

Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot projectcanaleenergia
 
Mauro Brolis (Finlombarda)
Mauro Brolis (Finlombarda)Mauro Brolis (Finlombarda)
Mauro Brolis (Finlombarda)canaleenergia
 
Sviluppo energetico in Italia
Sviluppo energetico in ItaliaSviluppo energetico in Italia
Sviluppo energetico in Italiacanaleenergia
 
Sviluppo energetico del Messico
Sviluppo energetico del MessicoSviluppo energetico del Messico
Sviluppo energetico del Messicocanaleenergia
 
Media kit canaleenergia.com
Media kit canaleenergia.comMedia kit canaleenergia.com
Media kit canaleenergia.comcanaleenergia
 
Last modelli di business pv
Last modelli di business pvLast modelli di business pv
Last modelli di business pvcanaleenergia
 
Regolazione&mercato pv
Regolazione&mercato pvRegolazione&mercato pv
Regolazione&mercato pvcanaleenergia
 
Kingfisher-dal riciclo plastica vergine
Kingfisher-dal riciclo plastica vergineKingfisher-dal riciclo plastica vergine
Kingfisher-dal riciclo plastica verginecanaleenergia
 
Conferenza Gas: Morabito e Piron
Conferenza Gas: Morabito e PironConferenza Gas: Morabito e Piron
Conferenza Gas: Morabito e Pironcanaleenergia
 
Conferenza Gas: Tiziano Zocchi
Conferenza Gas: Tiziano ZocchiConferenza Gas: Tiziano Zocchi
Conferenza Gas: Tiziano Zocchicanaleenergia
 
Conferenza Gas: Marco Golinelli
Conferenza Gas: Marco Golinelli Conferenza Gas: Marco Golinelli
Conferenza Gas: Marco Golinelli canaleenergia
 
Automazione per rinnovabili
Automazione per rinnovabiliAutomazione per rinnovabili
Automazione per rinnovabilicanaleenergia
 
Pass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
Pass M0S 420 kv per le sottostazioni della rete elettrica di TrasmissionePass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
Pass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissionecanaleenergia
 
All compatible: la nuova tecnologia dei convertitori di frequenza
All compatible: la nuova tecnologia dei convertitori di frequenzaAll compatible: la nuova tecnologia dei convertitori di frequenza
All compatible: la nuova tecnologia dei convertitori di frequenzacanaleenergia
 
Ottimizzazione dei consumi di energia con interruttori di bassa tensione
Ottimizzazione dei consumi di energia con interruttori di bassa tensioneOttimizzazione dei consumi di energia con interruttori di bassa tensione
Ottimizzazione dei consumi di energia con interruttori di bassa tensionecanaleenergia
 
Deic il punto di convergenza
Deic il punto di convergenzaDeic il punto di convergenza
Deic il punto di convergenzacanaleenergia
 
L'automazione motore dell'innovazione e della competitività
L'automazione motore dell'innovazione e della competitivitàL'automazione motore dell'innovazione e della competitività
L'automazione motore dell'innovazione e della competitivitàcanaleenergia
 

Mehr von canaleenergia (20)

Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot project
 
Mauro Brolis (Finlombarda)
Mauro Brolis (Finlombarda)Mauro Brolis (Finlombarda)
Mauro Brolis (Finlombarda)
 
Gas
GasGas
Gas
 
Sviluppo energetico in Italia
Sviluppo energetico in ItaliaSviluppo energetico in Italia
Sviluppo energetico in Italia
 
Sviluppo energetico del Messico
Sviluppo energetico del MessicoSviluppo energetico del Messico
Sviluppo energetico del Messico
 
Media kit canaleenergia.com
Media kit canaleenergia.comMedia kit canaleenergia.com
Media kit canaleenergia.com
 
Media kit 2013
Media kit 2013Media kit 2013
Media kit 2013
 
Last modelli di business pv
Last modelli di business pvLast modelli di business pv
Last modelli di business pv
 
Regolazione&mercato pv
Regolazione&mercato pvRegolazione&mercato pv
Regolazione&mercato pv
 
Clusit
ClusitClusit
Clusit
 
Kingfisher-dal riciclo plastica vergine
Kingfisher-dal riciclo plastica vergineKingfisher-dal riciclo plastica vergine
Kingfisher-dal riciclo plastica vergine
 
Conferenza Gas: Morabito e Piron
Conferenza Gas: Morabito e PironConferenza Gas: Morabito e Piron
Conferenza Gas: Morabito e Piron
 
Conferenza Gas: Tiziano Zocchi
Conferenza Gas: Tiziano ZocchiConferenza Gas: Tiziano Zocchi
Conferenza Gas: Tiziano Zocchi
 
Conferenza Gas: Marco Golinelli
Conferenza Gas: Marco Golinelli Conferenza Gas: Marco Golinelli
Conferenza Gas: Marco Golinelli
 
Automazione per rinnovabili
Automazione per rinnovabiliAutomazione per rinnovabili
Automazione per rinnovabili
 
Pass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
Pass M0S 420 kv per le sottostazioni della rete elettrica di TrasmissionePass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
Pass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
 
All compatible: la nuova tecnologia dei convertitori di frequenza
All compatible: la nuova tecnologia dei convertitori di frequenzaAll compatible: la nuova tecnologia dei convertitori di frequenza
All compatible: la nuova tecnologia dei convertitori di frequenza
 
Ottimizzazione dei consumi di energia con interruttori di bassa tensione
Ottimizzazione dei consumi di energia con interruttori di bassa tensioneOttimizzazione dei consumi di energia con interruttori di bassa tensione
Ottimizzazione dei consumi di energia con interruttori di bassa tensione
 
Deic il punto di convergenza
Deic il punto di convergenzaDeic il punto di convergenza
Deic il punto di convergenza
 
L'automazione motore dell'innovazione e della competitività
L'automazione motore dell'innovazione e della competitivitàL'automazione motore dell'innovazione e della competitività
L'automazione motore dell'innovazione e della competitività
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Sondaggio smart meter

  • 1. Smart Grid Security nCircle, the leader in information risk and security performance management solutions, partnered with EnergySec, a DOE-funded public-private partnership that works to enhance the cyber security of the electric infrastructure, to sponsor a smart grid security survey of over 104 energy security professionals. The online survey was conducted between March 16 and March 31, 2012. Key smart grid security findings:  64% said smart meters are vulnerable to false data injection  75% said security has not been adequately addressed in smart grid deployment  90% believe we need smart grid security standards  64% believe smart grid deployment should slow down until we have better security controls  Only 50% said their organization has a security program and security policies for smart grid deployment  66% say for smart grid projects funded by American Recovery and Reinvestment Act grants have not adequately addressed security The complete results of the survey, including commentary from Patrick Miller, CEO of EnergySec, and Elizabeth Ireland, vice president of marketing for nCircle are below: Has the hype around privacy issues Has security been adequately associated with smart meter addressed in smart grid deployment? consumer data been overblown? 75% 53% 47% 25% Yes No Yes No "Smart Grid meter privacy is still a new area," said Patrick Miller. "State regulations are inconsistent and sensitive customer details in smart grid data vary from utility to utility. I expect the smart grid industry to struggle with several challenges around who ultimately 'owns' customer data. There are several grey areas that impact how smart grid customer data will be used as the industry attempts to maximize revenue potential. Even seemingly innocuous customer data has significant value -- just ask Facebook or Google.”
  • 2. Patrick Miller noted, "Smart meters vary widely in Do smart meter installations have sufficient security controls to capability and many older meters were not designed to protect against false data injection? adequately protect against false data injection. It doesn't help that some communication protocols used by the 61% smart meter infrastructure don't offer much protection against false data injection either. Together, these facts 39% highlight a much larger potential problem with data integrity across the smart grid infrastructure. Because our nation relies on the smart grid to deliver robust and reliable power, we need to make sure that all systems that process usage data, especially those that make autonomous, self-correcting, self-healing decisions, assure Yes No data integrity." "A false data injection attack is another example of technology advancing faster than security controls,” said Elizabeth Ireland. “This is a problem that has been endemic in the evolution of security and it's a key reason for the significant cyber security risks we face across many facets of critical infrastructure. Installing technology without sufficient security controls presents serious risks to our power infrastructure and to every power user in the U.S." "Security has been addressed to varying degrees in many smart grid deployments, however it is going to be a Are smart grid security standards moving fast enough to keep pace challenge to keep pace with the constantly changing with smart grid deployment? security landscape," said Patrick Miller. "The analog and mechanical devices installed in most utilities were designed for a very different maintenance model than newer digital 72% equipment being designed and installed today." Elizabeth Ireland noted, "It's pretty clear that information security professionals in the energy industry are 28% uncomfortable with standards currently available for smart grid technology. Defining and implementing meaningful security standards is always a challenge but without standards, adoption of critical security controls across the Yes No smart grid industry is likely to be uneven at best."
  • 3. Do you think we need smart grid Does your organization have a specific security standards and security program and security policies 89% policies? for smart grid deployment? 49% 51% 11% Yes No Yes No What part of smart grid infrastructure is most vulnerable to cyber attack? 41% 29% 20% 10% Smart meters Metering infrastructure including transport networks Utility energy management systems Energy management, such as phasor measurement units According to Patrick Miller, CEO of EnergySec, "The enormous range of technology in the smart grid presents many points of potential vulnerability, and we are moving at the speed of light to insert even more technology 'shims' into the existing network structures of the smart grid. This ever-increasing rate of complexity and hyper-embedded technology will be very difficult to secure." "The complexity of SCADA technology combined with the range of results from survey respondents on this issue indicates that we don't have any single section of the smart grid fully secured," said Elizabeth Ireland, vice president of marketing for nCircle. "It's not surprising that energy industry security professionals deem metering infrastructure as the highest area of risk. Individual partners in any complex supply chain often have very limited visibility into the security for the entire process."
  • 4. How should the security risks associated with the smart grid affect deployment plans? 64% 33% 4% No change from current plans; full steam ahead Deployment should slow down until we have better security controls We don’t need a smart grid at all Should regulatory oversight for smart Have the American Recovery and grid distribution be transitioned to Reinvestment Act of 2009 grants the Federal government? awarded to smart grid projects adequately addressed security? 60% 66% 40% 34% Yes No Yes No "The modernized grid encompasses new digital components all the way from the toaster to the turbine,” noted Patrick Miller. “It spans local, state and federal regulatory lines. In an environment where innovation is paramount, a federal one-size-fits-all approach may significantly slow down progress. On the other hand, potential inconsistencies in regulatory approaches may introduce complexity and risk smart grid landscape. Either model, whether state or federally regulated, comes with pros and cons. I see the regulatory oversight of the smart grid as one of our biggest smart grid challenges with the least obvious solution." “It’s likely that the division of opinion on regulatory oversight reflects, at least to some degree, fundamental political beliefs” said Elizabeth Ireland. “Some security professionals probably see government regulation in industry as beneficial, and some feel we should minimize the role of government in industry as much as possible. The majority of energy security professionals surveyed believe the energy industry will police itself.”