SlideShare ist ein Scribd-Unternehmen logo
1 von 22
IBM End-to-End Security   for Smart Grids   Più energia alla Sicurezza 1 Dicembre, 2010
What is involved in a smarter energy infrastructure? Electric Meters In-Home displays Personal Computers Load Control Devices Smart Appliances Handheld Data Devices Gas Meters Water Meters Electric Vehicles Outlets Solar Panels  Reclosers Condition Sensors Voltage Controllers Switches Substation & Grid Devices Smart Meters In-home Devices Ruggedised Laptops Mobile Devices Distributed  Resources Cell Phones Wind Turbines  Home Area Network Neighborhood Network Access Network Backhaul Network Extranet Office Network 1. Smart, Connected  Devices 2. Integrated  Communication  Networks 3. System  Integration  Platform 4. Applications &  Analytics Servers EMS System and Network Management DMS MDMS Meter Data Collection  Load Control  GIS Network  Analytics OMS Asset  Management  CIS  Call Management Storage and Backup Business Process Management Computing  Infrastructure Application  Integration WMS  CHP  Systems  Management Security  Management Messaging & Web Services Instrumented Interconnected Intelligent 5. Presentation Employee  Portal/Dashboard Field Employee  Mobile Devices Display Device  Interface Customer Mobile Devices Customer  Web Paper  Bills Energy Storage
A smart grid needs security  enforcement at multiple points IP addressability and use of open standard protocols for the control grid necessitates it to be securely protected at multiple points Pike Research forecasts smart grid cyber security sector will increase from $1.2 billion in 2009 to $3.7 billion by 2015
Security Concerns in a Smart Grid ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Sharing Components in a Smart Grid Source:  NIST Smart Grid Framework 1.0 NIST = National Institute of Standard & Technology Colored lines denote domain changes
Utilities have lots of legacy and new software to secure
Some widespread vulnerability types in software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Coding Mistakes Configuration, Policy and Design Flaws
Many factors shape the degree and nature of the risk; there are multiple scenarios to plan for External Threat Insider Threat Inadvertent Deliberate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Stuxnet Wikileaks
Technical knowledge required for cyber attacks Source:  PlantData Technologies
Potential Impact of a Breach to Power Control Systems Could Be Severe ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dependency matrix of critical infrastructures (source Terna)
Evolution of Electric Utility Risks PAST   HARD-WIRED CONTROL PRESENT SCADA / RF ENABLED NEAR FUTURE SMART GRID / RF PERVASIVE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Our Lessons Learned from the Cyber Security Front ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],If we know we can't practically defend against Stuxnet or its spawn, what is our approach? Giving up is not an option.  " Roll with the punch " may end up being a viable strategy. How could we design control systems, or other IT environments for that matter, to be resilient enough to take a potential knock out punch and yet be able to come back up swinging? In the end, can we optimize our investment by planning to take the punch rather than futilely hiding from it ?
Gartner research: “ Evolving Cybersecurity Issues in the Utility Industry” 20/08/2010 “ Utilities need to assess the risks and make good decisions over which controls are reasonable and appropriate for their situation”
Enterprise IT systems are increasingly becoming integrated with a broader set of operational technologies (OT). IT and OT will continue to become more entwined in terms of both technology and management Source:  Gartner Market Insight: Utilities Industry Primer, 2010  19 August 2010
IBM Research for Smarter Energy leverages three approaches to add value to our clients. Solution-driven strategy ,[object Object],[object Object],[object Object],[object Object],[object Object],Joint research and pilots ,[object Object],[object Object],[object Object],[object Object],[object Object],Committees and standards ,[object Object],[object Object],[object Object]
IBM is driving industry transformation through its active leadership in key industry organizations. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NIST 8 GridWise  Architecture Council GridWise Electricity  Advisory Committee  UCA International Users Group  ISO IEC World Energy Council   Interconnectivity Working Group OASIS 9 IEEE 11 UTC 10
What E&U Companies need for Smart Grid Security - a check list ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],N etwork, Server, and End Point P hysical Infrastructure P eople and Identity D ata and Information A pplication and Process * Items that help meet NERC-CIP requirements Worldwide standards equivalent to NERC-CIP UK : The Center for Protection of National Infrastructure:  http:// www.cpni.gov.uk /   EU : European Network and Information Security Agency:  http:// www.enisa.europa.eu/pages/About_ENISA.htm
IBM has extensive experience in Smart Grid security issues and solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IBM’s portfolio consists of a multi-phase approach for a full Smart Grid life-cycle cyber security solution that includes design and implementation services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IBM Support for NERC-CIP standard
 

Weitere ähnliche Inhalte

Was ist angesagt?

Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
majolic
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
ecommerce
 

Was ist angesagt? (20)

Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber Attacks
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
IOT Forensic Challenges
IOT Forensic ChallengesIOT Forensic Challenges
IOT Forensic Challenges
 

Andere mochten auch

03 sicurezza per i sistemi scada
03 sicurezza per i sistemi scada03 sicurezza per i sistemi scada
03 sicurezza per i sistemi scada
IBM Italia Web Team
 
04 sicurezza fisica e videosorveglianza
04 sicurezza fisica e videosorveglianza04 sicurezza fisica e videosorveglianza
04 sicurezza fisica e videosorveglianza
IBM Italia Web Team
 

Andere mochten auch (7)

03 sicurezza per i sistemi scada
03 sicurezza per i sistemi scada03 sicurezza per i sistemi scada
03 sicurezza per i sistemi scada
 
14 causa e forma
14 causa e forma14 causa e forma
14 causa e forma
 
Linux day 2014 - Talk su videosorveglianza con Raspberry Pi
Linux day 2014 - Talk su videosorveglianza con Raspberry PiLinux day 2014 - Talk su videosorveglianza con Raspberry Pi
Linux day 2014 - Talk su videosorveglianza con Raspberry Pi
 
04 sicurezza fisica e videosorveglianza
04 sicurezza fisica e videosorveglianza04 sicurezza fisica e videosorveglianza
04 sicurezza fisica e videosorveglianza
 
Internet delle Cose: come realizzare un’ applicazione, by Marco Sgroi, Remo P...
Internet delle Cose: come realizzare un’ applicazione, by Marco Sgroi, Remo P...Internet delle Cose: come realizzare un’ applicazione, by Marco Sgroi, Remo P...
Internet delle Cose: come realizzare un’ applicazione, by Marco Sgroi, Remo P...
 
Smau 2014- Keep calm & we track you - Giorgio Pedrazzi - Massimiliano Redolfi
Smau 2014- Keep calm & we track you - Giorgio Pedrazzi - Massimiliano RedolfiSmau 2014- Keep calm & we track you - Giorgio Pedrazzi - Massimiliano Redolfi
Smau 2014- Keep calm & we track you - Giorgio Pedrazzi - Massimiliano Redolfi
 
FLEXBOX-MEN: Apocalypse
FLEXBOX-MEN: ApocalypseFLEXBOX-MEN: Apocalypse
FLEXBOX-MEN: Apocalypse
 

Ähnlich wie 02 ibm security for smart grids

SGSB Webcast 2 : Smart grid and data security
SGSB Webcast 2 : Smart grid and data securitySGSB Webcast 2 : Smart grid and data security
SGSB Webcast 2 : Smart grid and data security
Andy Bochman
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
University of Southern California
 

Ähnlich wie 02 ibm security for smart grids (20)

Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
Iot Solution Development Platform
Iot Solution Development PlatformIot Solution Development Platform
Iot Solution Development Platform
 
SGSB Webcast 2 : Smart grid and data security
SGSB Webcast 2 : Smart grid and data securitySGSB Webcast 2 : Smart grid and data security
SGSB Webcast 2 : Smart grid and data security
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
IoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT GatewayIoT / M2M Solutions with Informix in the IoT Gateway
IoT / M2M Solutions with Informix in the IoT Gateway
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
 
Reference Architecture for Electric Energy OT.pdf
Reference Architecture for Electric Energy OT.pdfReference Architecture for Electric Energy OT.pdf
Reference Architecture for Electric Energy OT.pdf
 
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
Leveraging compute power at the edge - M2M solutions with Informix in the IoT...
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016 Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Can you trust your smart building
Can you trust your smart buildingCan you trust your smart building
Can you trust your smart building
 
1678 1683
1678 16831678 1683
1678 1683
 
1678 1683
1678 16831678 1683
1678 1683
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 
Nreca kickoff meeting
Nreca kickoff meetingNreca kickoff meeting
Nreca kickoff meeting
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloud
 

02 ibm security for smart grids

  • 1. IBM End-to-End Security for Smart Grids Più energia alla Sicurezza 1 Dicembre, 2010
  • 2. What is involved in a smarter energy infrastructure? Electric Meters In-Home displays Personal Computers Load Control Devices Smart Appliances Handheld Data Devices Gas Meters Water Meters Electric Vehicles Outlets Solar Panels Reclosers Condition Sensors Voltage Controllers Switches Substation & Grid Devices Smart Meters In-home Devices Ruggedised Laptops Mobile Devices Distributed Resources Cell Phones Wind Turbines Home Area Network Neighborhood Network Access Network Backhaul Network Extranet Office Network 1. Smart, Connected Devices 2. Integrated Communication Networks 3. System Integration Platform 4. Applications & Analytics Servers EMS System and Network Management DMS MDMS Meter Data Collection Load Control GIS Network Analytics OMS Asset Management CIS Call Management Storage and Backup Business Process Management Computing Infrastructure Application Integration WMS CHP Systems Management Security Management Messaging & Web Services Instrumented Interconnected Intelligent 5. Presentation Employee Portal/Dashboard Field Employee Mobile Devices Display Device Interface Customer Mobile Devices Customer Web Paper Bills Energy Storage
  • 3. A smart grid needs security enforcement at multiple points IP addressability and use of open standard protocols for the control grid necessitates it to be securely protected at multiple points Pike Research forecasts smart grid cyber security sector will increase from $1.2 billion in 2009 to $3.7 billion by 2015
  • 4.
  • 5. Information Sharing Components in a Smart Grid Source: NIST Smart Grid Framework 1.0 NIST = National Institute of Standard & Technology Colored lines denote domain changes
  • 6. Utilities have lots of legacy and new software to secure
  • 7.
  • 8.
  • 9. Technical knowledge required for cyber attacks Source: PlantData Technologies
  • 10.
  • 11. Dependency matrix of critical infrastructures (source Terna)
  • 12.
  • 13.
  • 14. Gartner research: “ Evolving Cybersecurity Issues in the Utility Industry” 20/08/2010 “ Utilities need to assess the risks and make good decisions over which controls are reasonable and appropriate for their situation”
  • 15. Enterprise IT systems are increasingly becoming integrated with a broader set of operational technologies (OT). IT and OT will continue to become more entwined in terms of both technology and management Source: Gartner Market Insight: Utilities Industry Primer, 2010 19 August 2010
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. IBM Support for NERC-CIP standard
  • 22.  

Hinweis der Redaktion

  1. Germany could soon be confronted with a problem: they will have too much solar power, unadapted to their lifestyle. The electric grid, designed for times that had far less consumers and producers than they are now, will ultimately come to an overload, says Stephan Köhler, head of DENA, Germany’s energy agency, to the Berliner Zeitung on Oct. 17. Questo articolo spiega bene il problema; in sostanza il modello tradizionale, che si basa su una modulazione della produzione in funzione della richiesta, con le rinnovabili, intermittenti e non modulabili a piacere, non funziona. http://www.germanenergyblog.de/?p=4293 In effetti in Germania si parla di 30 GW da solare per fine 2011, mentre noi in Italia a fine 2009 eravamo ancora ad 1 GW (però abbiamo una potenza installata di circa 5 GW da eolico, che producono circa il 2% del totale di energia consumata in Italia). Quindi noi sembriamo ancora lontani dal problema tedesco, ma è interessante la seguente considerazione sul bilancio fra solare ed eolico a livello di sistema europeo e non solo nazionale: A smart, long-term solution, comes from Tim Nuthall, from the European Climate Foundation in Brussels, Belgium, who says that “ in Europe, you need a grid that balances the sun in the south with the wind in the north .” And he may be right. Denmark, for example, is a perfect recipient for the solar power produced in Germany or Italy , and their wind (which is much more than they need) is perfectly suited for generating energy for the Germans or some other southern countries. REMUNERAZIONE DEGLI INVESTIMENTI STRATEGICI (2008-2012) Remunerazione aggiuntivagarantitaper 8-12 anniper nuoviinvestimentimiratia: – Ridurrele congestionisullareteditrasmissione – Modernizzarelereti di distribuzione • La remunerazione complessivadegliinvestimentistrategicièattualmente tra il 9% -10% in termini reali prima delle tasse
  2. Intelligent, Connected Digital Devices New devices and enhancements to existing devices for a variety of applications Embedded Software Integrated Communications network Integrated, IP-based network segments that parallel the electricity networking connecting in the home, the neighborhood, and up the distribution and transmission network Using a variety of technologies and networking standards Applications New applications and updates to traditional legacy systems that recognize and take advantage of the smart grid Integration platform ESB, infrastructure that ties it all together Lo sviluppo delle Smart Grid porterà all’introduzione di milioni di nuovi componenti intelligenti nelle infrastrutture che presidiano l’erogazione dell’energia Le comunicazioni tra questi elementi saranno di tipo evoluto (bi-direzionalità, protocolli aperti) Questa evoluzione apre nuovi fronti per la sicurezza: La protezione dell’infrastruttura critica per l’economia e le nazioni La tutela della privacy (la conoscenza dei profili di consumo energetici può rivelare le attività personali)
  3. IBM End-to-end security for Smart Grids Building blocks of Smart Grid include: ● Advanced Metering Infrastructure (AMI) ● The power grid ● Communications and information infrastructure ● Transmission and distribution control & automation ● Distributed and renewable generation ● Distributed Control Systems or SCADA (Supervisory Control and Data Acquisition) ● Home area networks for appliance management ● Electric vehicle refueling infrastructure - Protecting the Smart Grid is not like protecting a traditional IT data center Widely dispersed sensors remote from data center are more susceptible to attacks (for example: remote station managers in substations reporting on temperatures, oil pressures in transformers, switchgear) Involves heterogeneous technologies and proprietary protocols between sensors and devices, non-carrier class communication, and control points that are not always standardized and secure. (Meters and concentrators often use loosely secured proprietary protocols). Endpoints often built in embedded systems with non-traditional OS, where normal security functions may not exist (example: SCADA systems endpoints like PLCs, RTUs, concentrators) Cost-conscious endpoint vendors often cut corners for security (for example: factory-set cryptographic keys in electric meters) In summary, end to end security for the Smart Grid involves multiple touch points in protecting a variety of endpoints, interfaces, networks, applications, and data to ensure we make the end to end system robust and impervious to attacks. A variety of technologies, scenarios come into play in protecting this space.
  4. Why software security for Smart Grid systems Utilities’ legacy apps (IT and operational) have been getting the job done for decades, however ... Smart Grid functionality requires updates to legacy and whole new classes of applications linked to legacy For utilities, ensuring this new code* is developed, deployed and integrated free of severe security vulnerabilities is now a critical responsibility *The responsibility for the security of acquired COTS Smart Grid software ultimately falls upon the utilities who purchase and deploy it.
  5. Software you already made or bought Identify it Prioritize it Probe it Analyze it Protect it Fix it (if you can) Rinse and repeat whenever it changes Software you’re going to make (or have made for your org) Spec it Develop it securely and test it Deploy it Rinse and repeat whenever it changes COTS software you’re going to buy What is and is not acceptable to you What to ask vendor re: security during development and in ongoing releases Can you protect it with systems already in place Software security strategies depend on origin
  6. So, in the ‘old days’ (Pre-1990) the big RF “worry” was a rogue dispatcher on the utility’s truck frequency. Now, SCADA is quite vulnerable. But SCADA is generally a “bulk” control via RF. For Smart Grid, one could conceptually not only turn off the power to a house, but could turn on the power or a device IN a house.
  7. IBM Confidential
  8. 1 International Organization for Standardization 2 International Electrotechnical Commission (IEC) 3 Institute of Electric and Electronics Engineers (IEEE) For “Solution-driven energy,” “Smart grid enablement” can include: Real-world aware systems-of-systems architectures Modeling, analytics and optimization Renewable and EV integration and optimization Demand response Interoperability frameworks and messaging Cyber-physical system security Social computing Compute and storage clouds, high-performance computing (HPC) Intelligent buildings and green data centers Photovoltaics Battery storage for electric vehicle Chip and server systems power management
  9. 1 National Institute of Standards and Technology (NIST) 2 Department of Energy (DOE) 3 International Electrotechnical Commission (IEC) 4 International Organization for Standardization (ISO) 5 Joint Technical Committee (JTE) 6 Utility Communication Architecture (UCA) 7 OASIS 8 National Institute of Standards (NIST) 9 Organization for the Advancement of Structured Information Standards (OASIS) 10 Utilities Telecom Council (UTC) 11 Institute of Electrical and Electronics Engineers (IEEE)
  10. IBM End-to-end security for Smart Grids NERC is North American Electric Reliability Corporation CIP is Critical Infrastructure Protection NERC-CIP 001-009 are nine compliance standards announced by NERC. Other Worldwide standards equivalent to NERC-CIP UK : The Center for Protection of National Infrastructure: http://www.cpni.gov.uk/  EU : European Network and Information Security Agency: http://www.enisa.europa.eu/pages/About_ENISA.htm List of NERC-CIP Directives NERC-001: Sabotage Reporting NERC-002: Critical Cyber Asset Identification NERC-003: Security Management Controls NERC-004: Personnel & Training NERC-005 Electronic Security Perimeter NERC-006: Physical Security of Critical Cyber assets NERC-007: Systems Security Management NERC-008: Incident Reporting and Response Planning NERC-009: Recovery Plans for Critical Cyber Assets