Article

Article title DESIGN OF REQUIREMENTS TO SMART GRID SECURITY SYSTEM ON THE BASIS OF ISO/IEC 27001 AND 27005 STANDARDS
Authors I.N. Pashchenko, V.I. Vasilyev
Section SECTION II. SECURITY OF INFORMATION SYSTEMS AND NETWORKS
Month, Year 12, 2013 @en
Index UDC 004.735
DOI
Abstract The important stage in development of modern energy technology is implementing intelligent energy nets of new generation Smart Grid. The purpose of this work is to design the technique of creating the information security system in intelligent nets (Smart Grid) with account of that the given nets are not yet implemented, and their implementation needs some time interval. The list of main threats and vulnerabilities in Smart Grid is presented. The list of guiding security requirements necessary under designing these nets is proposed. The list of security controls recommended for using in Smart Grid is generated. The efficiency of applying countermeasures by the way of information security risks evaluation before and after their implementation on the specific Smart Grid is calculated.

Download PDF

Keywords Intelligent net; Smart Grid; threats; vulnerabilities; information risks.
References 1. Концепция энергетической стратегии России на период до 2030 года (проект) // “Энергетическая политика”. – М.: ГУ ИЭС, 2007. Прил. 116 с.
2. Janssen M.C. The Smart Grid Drivers // PAC World. – 2010. – P. 77.
3. Amin S.M., Wollenberg B.F. Toward a Smart Grid // IEEE P&E Magazine. – 2005. – № 3. – P. 34-41.
4. Гуревич В.И. Интеллектуальные сети: новые перспективы или новые проблемы? // Электротехнический рынок. – 2010. – № 6. URL: http://market.elec.ru/nomer/33/intellektualnye-seti-novye-perspektivy/ (дата обращения 15.07.2013).
5. Smart Grid // ENERGY.GOV Office of Electricity Delivery & Energy Reliability. URL:http://www.oe.energy.gov/smartgrid.htm (дата обращения 15.07.2013).
6. Дорофеев В.В., Макаров А.А. Активно-адаптивная сеть – новое качество ЕЭС России // Энергоэксперт. – 2009. – № 4. – C. 28-34.
7. Massel L.V. Problems of the smart grid creation in Russia with a view to information and telecommunication technologies and proposed solutions // Proc. of the 15th International workshop
“Computer science and information technologies” (CSIT’2013). – 2013. – P. 115-120.
8. ISO/IEC 27001:2013. Information technology. Security techniques. Information security management systems. Requirements. Berlin : ISO/IEC JTC 1/SC 27. – 2013. – 23 p.
9. Mellado D., Fernбndez-Medina E., Piattini M. Applying a Security Requirements Engineering Process // Proc. Security in Information Systems. – 2006. – P. 192-206.
10. Model-Driven Risk Analysis / Lund [and others]. Milan: Springer, 2011. – 460 p.
11. ISO/IEC 27005:2011. Information technology. Security techniques. Information security risk management. Berlin : ISO/IEC JTC 1/SC 27, 2011. – 68 p.

Comments are closed.