dc.contributor.author | Pöyhönen, Jouni | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Neittaanmäki, Pekka | |
dc.date.accessioned | 2023-02-02T12:34:07Z | |
dc.date.available | 2023-02-02T12:34:07Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Pöyhönen, J. (2022). Cyber Security of an Electric Power System in Critical Infrastructure. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 217-239). Springer International Publishing. Computational Methods in Applied Sciences, 56. <a href="https://doi.org/10.1007/978-3-030-91293-2_9" target="_blank">https://doi.org/10.1007/978-3-030-91293-2_9</a> | |
dc.identifier.other | CONVID_117622207 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/85318 | |
dc.description.abstract | The functioning of a modern society is based on the cooperation of several critical infrastructures, whose joint efficiency depends increasingly on a reliable national electric power system. Reliability is based on functional data transmission networks in the organizations that belong to the power system. This chapter focuses on the procedures applied to cyber security management in the processes of an electricity organization, whereby different standards will also be utilized. The major contributions of the chapter are that it integrates cyber security management into the process structures of individual electricity production organization and that it utilizes the PDCA (Plan, Do, Check, Act) method in developing an organization’s cyber security management practices. In order to put the measures into practice, the leadership of an electricity organization must regard trust-enhancing measures related to cyber security as a strategic goal, maintain efficient processes and communicate their implementation with a policy that supports the strategy. | en |
dc.format.extent | 484 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer International Publishing | |
dc.relation.ispartof | Cyber Security : Critical Infrastructure Protection | |
dc.relation.ispartofseries | Computational Methods in Applied Sciences | |
dc.rights | In Copyright | |
dc.subject.other | critical infrastructure | |
dc.subject.other | power system | |
dc.subject.other | electricity organization | |
dc.subject.other | cyber security management | |
dc.subject.other | trust | |
dc.title | Cyber Security of an Electric Power System in Critical Infrastructure | |
dc.type | bookPart | |
dc.identifier.urn | URN:NBN:fi:jyu-202302021600 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/BookItem | |
dc.relation.isbn | 978-3-030-91292-5 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 217-239 | |
dc.relation.issn | 1871-3033 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | infrastruktuurit | |
dc.subject.yso | sähköjärjestelmät | |
dc.subject.yso | sähköverkot | |
dc.subject.yso | kyberturvallisuus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p17539 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p12233 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7753 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1007/978-3-030-91293-2_9 | |