Näytä suppeat kuvailutiedot

dc.contributor.authorPöyhönen, Jouni
dc.contributor.editorLehto, Martti
dc.contributor.editorNeittaanmäki, Pekka
dc.date.accessioned2023-02-02T12:34:07Z
dc.date.available2023-02-02T12:34:07Z
dc.date.issued2022
dc.identifier.citationPöyhönen, J. (2022). Cyber Security of an Electric Power System in Critical Infrastructure. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 217-239). Springer International Publishing. Computational Methods in Applied Sciences, 56. <a href="https://doi.org/10.1007/978-3-030-91293-2_9" target="_blank">https://doi.org/10.1007/978-3-030-91293-2_9</a>
dc.identifier.otherCONVID_117622207
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/85318
dc.description.abstractThe functioning of a modern society is based on the cooperation of several critical infrastructures, whose joint efficiency depends increasingly on a reliable national electric power system. Reliability is based on functional data transmission networks in the organizations that belong to the power system. This chapter focuses on the procedures applied to cyber security management in the processes of an electricity organization, whereby different standards will also be utilized. The major contributions of the chapter are that it integrates cyber security management into the process structures of individual electricity production organization and that it utilizes the PDCA (Plan, Do, Check, Act) method in developing an organization’s cyber security management practices. In order to put the measures into practice, the leadership of an electricity organization must regard trust-enhancing measures related to cyber security as a strategic goal, maintain efficient processes and communicate their implementation with a policy that supports the strategy.en
dc.format.extent484
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer International Publishing
dc.relation.ispartofCyber Security : Critical Infrastructure Protection
dc.relation.ispartofseriesComputational Methods in Applied Sciences
dc.rightsIn Copyright
dc.subject.othercritical infrastructure
dc.subject.otherpower system
dc.subject.otherelectricity organization
dc.subject.othercyber security management
dc.subject.othertrust
dc.titleCyber Security of an Electric Power System in Critical Infrastructure
dc.typebookPart
dc.identifier.urnURN:NBN:fi:jyu-202302021600
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/BookItem
dc.relation.isbn978-3-030-91292-5
dc.type.coarhttp://purl.org/coar/resource_type/c_3248
dc.description.reviewstatuspeerReviewed
dc.format.pagerange217-239
dc.relation.issn1871-3033
dc.type.versionacceptedVersion
dc.rights.copyright© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
dc.rights.accesslevelopenAccessfi
dc.subject.ysoinfrastruktuurit
dc.subject.ysosähköjärjestelmät
dc.subject.ysosähköverkot
dc.subject.ysokyberturvallisuus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p17539
jyx.subject.urihttp://www.yso.fi/onto/yso/p12233
jyx.subject.urihttp://www.yso.fi/onto/yso/p7753
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-030-91293-2_9
dc.type.okmA3


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright