Cyber Security of an Electric Power System in Critical Infrastructure
Pöyhönen, J. (2022). Cyber Security of an Electric Power System in Critical Infrastructure. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 217-239). Springer International Publishing. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_9
Julkaistu sarjassa
Computational Methods in Applied SciencesTekijät
Päivämäärä
2022Tekijänoikeudet
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
The functioning of a modern society is based on the cooperation of several critical infrastructures, whose joint efficiency depends increasingly on a reliable national electric power system. Reliability is based on functional data transmission networks in the organizations that belong to the power system. This chapter focuses on the procedures applied to cyber security management in the processes of an electricity organization, whereby different standards will also be utilized. The major contributions of the chapter are that it integrates cyber security management into the process structures of individual electricity production organization and that it utilizes the PDCA (Plan, Do, Check, Act) method in developing an organization’s cyber security management practices. In order to put the measures into practice, the leadership of an electricity organization must regard trust-enhancing measures related to cyber security as a strategic goal, maintain efficient processes and communicate their implementation with a policy that supports the strategy.
...
Julkaisija
Springer International PublishingEmojulkaisun ISBN
978-3-030-91292-5Kuuluu julkaisuun
Cyber Security : Critical Infrastructure ProtectionISSN Hae Julkaisufoorumista
1871-3033Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/117622207
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
Costin, Andrei (Springer, 2022)In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security ... -
Smart grid : linking sustainable electricity provision and consumption
Bursiewicz, Paul (2011)This thesis examines the transformation of the US electricity grid through the integration of information and communication technology, referred to as the Smart Grid. The electricity infrastructure is explained, its ... -
Kriittisen infrastruktuurin suojaaminen Suomessa
Kuokkanen, Niko (2020)Tämän kirjallisuuskatsauksena toteutetun kandidaatin tutkielman tavoitteena oli ottaa selvää suomalaisen kriittisen infrastruktuurin vastuista, kattavuudesta ja kyberturvallisuuden suojaustoimista. Tutkimuksen taustalla ... -
Cyber Situational Awareness in Critical Infrastructure Organizations
Pöyhönen, Jouni; Rajamäki, Jyri; Nuojua, Viivi; Lehto, Martti (Springer, 2021)The capability related to cybersecurity plays an ever-growing role on overall national security and securing the functions vital to society. The national cyber capability is mainly composed by resilience of companies running ... -
Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Springer, 2022)Critical infrastructure (CI) is a vital asset for the economy and society’s functioning, covering sectors such as energy, finance, healthcare, transport, and water supply. Governments around the world invest a lot of effort ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.