scholarly journals Advancements and Research Trends in Microgrids Cybersecurity

2021 ◽  
Vol 11 (16) ◽  
pp. 7363
Author(s):  
Giovanni Battista Gaggero ◽  
Paola Girdinio ◽  
Mario Marchese

Microgrids are growing in importance in the Smart Grid paradigm for power systems. Microgrid security is becoming crucial since these systems increasingly rely on information and communication technologies. Many technologies have been proposed in the last few years for the protection of industrial control systems, ranging from cryptography, network security, security monitoring systems, and innovative control strategies resilient to cyber-attacks. Still, electrical systems and microgrids present their own peculiarities, and some effort has to be put forth to apply cyber-protection technologies in the electrical sector. In the present work, we discuss the latest advancements and research trends in the field of microgrid cybersecurity in a tutorial form.

2021 ◽  
Vol 288 ◽  
pp. 01032
Author(s):  
Vladimir Karantaev ◽  
Vladislav Karpenko

Modern trends in the development of the electric power industry declare the widespread use of information and communication technologies and digital services to improve the operation of relay protection and automation (RPA) subsystems, Industrial Control Systems (ICS), commercial electricity metering systems, etc. However, it is associated with an increase in the number of cyber threats and risks of disrupting the stable functioning of electric power facilities due to destructive information influences. The report presents aspects of a holistic concept of building cyber-protected digital substations with elements of Zero Trust Architecture. Based on the results of the theoretical investigation the authors assume the possibility of technical testing of the proposed approaches to build a cyber-protected digital substation as a part of the emerging Research and Development (R&D) programs for the practical implementation of the zero-trust policy.


Energies ◽  
2019 ◽  
Vol 12 (13) ◽  
pp. 2598
Author(s):  
Asif Iqbal ◽  
Farhan Mahmood ◽  
Mathias Ekstedt

In today’s connected world, there is a tendency of connectivity even in the sectors which conventionally have been not so connected in the past, such as power systems substations. Substations have seen considerable digitalization of the grid hence, providing much more available insights than before. This has all been possible due to connectivity, digitalization and automation of the power grids. Interestingly, this also means that anybody can access such critical infrastructures from a remote location and gone are the days of physical barriers. The power of connectivity and control makes it a much more challenging task to protect critical industrial control systems. This capability comes at a price, in this case, increasing the risk of potential cyber threats to substations. With all such potential risks, it is important that they can be traced back and attributed to any potential threats to their roots. It is extremely important for a forensic investigation to get credible evidence of any cyber-attack as required by the Daubert standard. Hence, to be able to identify and capture digital artifacts as a result of different attacks, in this paper, the authors have implemented and improvised a forensic testbed by implementing a sandboxing technique in the context of real time-hardware-in-the-loop setup. Newer experiments have been added by emulating the cyber-attacks on WAMPAC applications, and collecting and analyzing captured artifacts. Further, using sandboxing for the first time in such a setup has proven helpful.


2020 ◽  
Vol 26 (3) ◽  
pp. 39-42
Author(s):  
Mihaela Anamaria Bostan-Pop ◽  
Romana Oancea

AbstractConsidering that the level of cyber threats is constantly increasing, a necessary demand emerges from organizations and corporations worldwide to protect their networks against possible cyber-attacks. In the future all malicious actions that occur in cyberspace will continue to alter the way we approach the security of an entire network. The article presents the most stringent need concerning the technical specialization of future officers, highlighting the knowledge entailed in order to better understand the complexity of a mission that takes place in virtual space. Undoubtedly, modern battlefield incorporates a virtual component where nearly all weapons systems rely upon information and communication technologies in order to connect and achieve operational level. The demand for future cyber defence specialists in the military domain reached a high level all over the world, and there will be a challenging process to be able to create a highly skilled workforce to fight against a large scale of malicious activities that have impact upon the national security system.


2021 ◽  
pp. 96-102
Author(s):  
T. О. Pavlova

The article is devoted to the study of the influence of the process of digitalization on the transformation of modern criminal proceedings, the functioning of the institution of justice in general. The introduction of electronic criminal proceedings in our country is due to the development of a modern electronic society and trends in the introduction of information and communication technologies in the world. Electronic criminal proceedings is a “smart” information and analytical system that digitizes paper documents, allows the exchange of files within the framework of criminal proceedings. It is proposed to carry out a detailed and systematic analysis of the provisions of the current national legislation in order to introduce the appropriate substantiated legislative changes and consolidate the concept, stages, and algorithm of the electronic criminal proceedings; the introduction of electronic criminal proceedings on the basis of the functioning of Unified Register of Pre-trial Inquiry. Electronic criminal proceedings are an inevitable phenomenon of the modern information world. For the quality of operation of electronic criminal proceedings, it is necessary to take into account the advantages and risks of the functioning of a “smart” system. The advantages of introducing electronic criminal proceedings include: saving money and time; reduction of terms for consideration of procedural documents; simplification of access of subjects of criminal proceedings within their competence to procedural materials; increasing the efficiency of the investigation of criminal proceedings and so on. The introduction of electronic criminal proceedings should take place quite deliberately, with the understanding that digital technologies will inevitably affect relationship between people and the formation of their thinking. We believe that digital intelligence is not capable to replace a specialist completely. The digitalization of criminal proceedings will entail certain risks and difficulties. It is necessary to protect the collected personal data, which will prevent the drafting of clone documents and the «leaking» of confidential information in connection with cyber-attacks. It is also necessary to protect the provision of necessary equipment for law enforcement officers and judges in the field; the need to integrate among themselves the working electronic systems of the pre-trial inquiry bodies and the court; training of personnel capable of working with digital computer technologies and so on.


2011 ◽  
Vol 3 (1) ◽  
pp. 39-56 ◽  
Author(s):  
M. Sirajul Islam ◽  
Ada Scupola

Government ‘e-service’ as a subfield of the e-government domain has been gaining attention to practitioners and academicians alike due to the growing use of information and communication technologies at the individual, organizational, and societal levels. This paper conducts a thorough literature review to examine the e-service research trends during the period between 2005 and 2009 mostly in terms of research methods, theoretical models, and frameworks employed as well as type of research questions. The results show that there has been a good amount of papers focusing on ‘e-Service’ within the field of e-government with a good combination of research methods and theories. In particular, findings show that technology acceptance, evaluation and system architecture are the most common themes, which circa half of the studies surveyed focus on the organizational perspective and that the most employed research methods are case studies and surveys, often with a mix of both types of methodologies.


Author(s):  
M. Sirajul Islam ◽  
Ada Scupola

Government ‘e-service’ as a subfield of the e-government domain has been gaining attention to practitioners and academicians alike due to the growing use of information and communication technologies at the individual, organizational, and societal levels. This paper conducts a thorough literature review to examine the e-service research trends during the period between 2005 and 2009 mostly in terms of research methods, theoretical models, and frameworks employed as well as type of research questions. The results show that there has been a good amount of papers focusing on ‘e-Service’ within the field of e-government with a good combination of research methods and theories. In particular, findings show that technology acceptance, evaluation and system architecture are the most common themes, which circa half of the studies surveyed focus on the organizational perspective and that the most employed research methods are case studies and surveys, often with a mix of both types of methodologies.


Author(s):  
Ravdeep Kour ◽  
Ramin Karim ◽  
Adithya Thaduri

With the advancements in and widespread adoption of information and communication technologies in infrastructures, cyber-attacks are becoming more frequent and more severe. Advanced cybersecurity threats with automated capabilities are increasing in such sectors as finance, health, grid, retail, government, telecommunications, transportation, etc. Cyber-attacks are also increasing in railways with an impact on railway stakeholders, e.g. threat to the safety of employees, passengers, or the public in general; loss of sensitive railway information; reputational damage; monetary loss; erroneous decisions; loss of dependability, etc. There is a need to move towards advanced security analytics and automation to identify, respond to, and prevent such security breaches. The objective of this research is to reduce cyber risks and vulnerabilities and to improve the cybersecurity capabilities of railways by evaluating their cybersecurity maturity levels and making recommendations for improvements. After assessing various cybersecurity maturity models, the Cybersecurity Capability Maturity Model (C2M2) was selected to assess the cybersecurity capabilities of railway organizations. The contributions of this research are as follows. First, a new maturity level MIL4 (Maturity Indicator Level 4) is introduced in the C2M2 model. Second, the C2M2 model is adapted by adding advanced security analytics and threat intelligence to develop the Railway-Cybersecurity Capability Maturity Model (R-C2M2). The cybersecurity maturity of three railway organizations is evaluated using this model. Third, recommendations and available standards & guidelines are provided to the three railway organizations to improve maturity levels within different domains. In addition, they are given an action plan to implement the recommendations in a streamlined way. The application of this model will allow railway organizations to improve their capability to reduce the impacts of cyber-attacks and eradicate vulnerabilities. The approach can also be extended to other infrastructures with necessary adaptations.


Author(s):  
Siwar Kriaa ◽  
Marc Bouissou ◽  
Youssef Laarouchi

The migration of modern industrial control systems toward information and communication technologies exposes them to cyber-attacks that can alter the way they function, thereby causing adverse consequences on the system and its environment. It has consequently become crucial to consider security risks in traditional safety risk analyses for industrial systems controlled by modern industrial control system. We propose in this article a new framework for safety and security joint risk analysis for industrial control systems. S-cube (for supervisory control and data acquisition safety and security joint modeling) is a new model-based approach that enables, thanks to a knowledge base, formal modeling of the physical and functional architecture of cyber-physical systems and automatic generation of a qualitative and quantitative analysis encompassing safety risks (accidental) and security risks (malicious). We first give the principle and rationale of S-cube and then we illustrate its inputs and outputs on a case study.


Sign in / Sign up

Export Citation Format

Share Document