Chapter 6

Securing the Smart Grid

Information in this chapter:

• Implementing security control within Smart Grid endpoints

• Establishing strong boundaries and zone separation

• Protecting data and applications within the Smart Grid

• Situational awareness

• Use case: defending against Shamoon

The consequences of a cyber attack against the Smart Grid range from espionage to sabotage, and from petty theft to larger privacy concerns. However, one thing is certain, and that is that there is considerable risk of digital foul play. So, how can the Smart Grid be protected against this risk of cyber attack? By understanding Smart Grid architecture (see Chapter 2, “Smart Grid Network Architecture”), attack methodologies (see Chapter 3, “Hacking the Smart ...

Get Applied Cyber Security and the Smart Grid now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.