SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Smart Grid Security
nCircle, the leader in information risk and security performance management solutions, partnered with
EnergySec, a DOE-funded public-private partnership that works to enhance the cyber security of the
electric infrastructure, to sponsor a smart grid security survey of over 104 energy security professionals.
The online survey was conducted between March 16 and March 31, 2012.

Key smart grid security findings:

       64% said smart meters are vulnerable to false data injection
       75% said security has not been adequately addressed in smart grid deployment
       90% believe we need smart grid security standards
       64% believe smart grid deployment should slow down until we have better security controls
       Only 50% said their organization has a security program and security policies for smart grid
        deployment
       66% say for smart grid projects funded by American Recovery and Reinvestment Act grants
        have not adequately addressed security

    The complete results of the survey, including commentary from Patrick Miller, CEO of EnergySec,
    and Elizabeth Ireland, vice president of marketing for nCircle are below:




          Has the hype around privacy issues                      Has security been adequately
             associated with smart meter                       addressed in smart grid deployment?
           consumer data been overblown?                                          75%
                  53%
                            47%

                                                                        25%



                      Yes   No                                              Yes    No


    "Smart Grid meter privacy is still a new area," said Patrick Miller. "State regulations are inconsistent
    and sensitive customer details in smart grid data vary from utility to utility. I expect the smart grid
    industry to struggle with several challenges around who ultimately 'owns' customer data. There are
    several grey areas that impact how smart grid customer data will be used as the industry attempts
    to maximize revenue potential. Even seemingly innocuous customer data has significant value -- just
    ask Facebook or Google.”
Patrick Miller noted, "Smart meters vary widely in
      Do smart meter installations have
        sufficient security controls to
                                               capability and many older meters were not designed to
     protect against false data injection?     adequately protect against false data injection. It doesn't
                                               help that some communication protocols used by the
                        61%                    smart meter infrastructure don't offer much protection
                                               against false data injection either. Together, these facts
              39%                              highlight a much larger potential problem with data
                                               integrity across the smart grid infrastructure. Because our
                                               nation relies on the smart grid to deliver robust and
                                               reliable power, we need to make sure that all systems that
                                               process usage data, especially those that make
                                               autonomous, self-correcting, self-healing decisions, assure
                 Yes     No
                                               data integrity."


"A false data injection attack is another example of technology advancing faster than security controls,”
said Elizabeth Ireland. “This is a problem that has been endemic in the evolution of security and it's a key
reason for the significant cyber security risks we face across many facets of critical infrastructure.
Installing technology without sufficient security controls presents serious risks to our power
infrastructure and to every power user in the U.S."


"Security has been addressed to varying degrees in many
smart grid deployments, however it is going to be a                   Are smart grid security standards
                                                                      moving fast enough to keep pace
challenge to keep pace with the constantly changing
                                                                        with smart grid deployment?
security landscape," said Patrick Miller. "The analog and
mechanical devices installed in most utilities were designed
for a very different maintenance model than newer digital                              72%
equipment being designed and installed today."
Elizabeth Ireland noted, "It's pretty clear that information
security professionals in the energy industry are
                                                                             28%
uncomfortable with standards currently available for smart
grid technology. Defining and implementing meaningful
security standards is always a challenge but without
standards, adoption of critical security controls across the
                                                                                 Yes    No
smart grid industry is likely to be uneven at best."
Do you think we need smart grid                    Does your organization have a
             specific security standards and                security program and security policies
                   89% policies?                                 for smart grid deployment?

                                                                      49%       51%



                             11%

                      Yes     No                                         Yes        No




                                   What part of smart grid infrastructure is most
                                           vulnerable to cyber attack?

                                                   41%
                                         29%
                                                            20%
                                                                      10%



                               Smart meters
                               Metering infrastructure including transport networks
                               Utility energy management systems
                               Energy management, such as phasor measurement units



According to Patrick Miller, CEO of EnergySec, "The enormous range of technology in the smart grid
presents many points of potential vulnerability, and we are moving at the speed of light to insert even
more technology 'shims' into the existing network structures of the smart grid. This ever-increasing rate
of complexity and hyper-embedded technology will be very difficult to secure."

"The complexity of SCADA technology combined with the range of results from survey respondents on
this issue indicates that we don't have any single section of the smart grid fully secured," said Elizabeth
Ireland, vice president of marketing for nCircle. "It's not surprising that energy industry security
professionals deem metering infrastructure as the highest area of risk. Individual partners in any
complex supply chain often have very limited visibility into the security for the entire process."
How should the security risks associated with the smart
                    grid affect deployment plans?
                                64%


                    33%

                                             4%

   No change from current plans; full steam ahead
   Deployment should slow down until we have better security controls
   We don’t need a smart grid at all




     Should regulatory oversight for smart             Have the American Recovery and
      grid distribution be transitioned to             Reinvestment Act of 2009 grants
           the Federal government?                      awarded to smart grid projects
                                                        adequately addressed security?
                          60%                                          66%
              40%
                                                                  34%



                 Yes       No                                       Yes   No


"The modernized grid encompasses new digital components all the way from the toaster to the
turbine,” noted Patrick Miller. “It spans local, state and federal regulatory lines. In an environment
where innovation is paramount, a federal one-size-fits-all approach may significantly slow down
progress. On the other hand, potential inconsistencies in regulatory approaches may introduce
complexity and risk smart grid landscape. Either model, whether state or federally regulated, comes
with pros and cons. I see the regulatory oversight of the smart grid as one of our biggest smart grid
challenges with the least obvious solution."

“It’s likely that the division of opinion on regulatory oversight reflects, at least to some degree,
fundamental political beliefs” said Elizabeth Ireland. “Some security professionals probably see
government regulation in industry as beneficial, and some feel we should minimize the role of
government in industry as much as possible. The majority of energy security professionals surveyed
believe the energy industry will police itself.”

Mais conteúdo relacionado

Mais procurados

Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1EnergySec
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report Bricata, Inc.
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security ServicesParviz Iskhakov, PhD
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...Internetwork Engineering (IE)
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsBooz Allen Hamilton
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Nicole Pellegrino
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco
 
Smart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit RevereSmart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit Reverehhanebeck
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 

Mais procurados (20)

Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security Services
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
Antigena Overview
Antigena OverviewAntigena Overview
Antigena Overview
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
Smart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit RevereSmart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit Revere
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 

Destaque

Il valore del dato nel mondo del gas
Il valore del dato nel mondo del gasIl valore del dato nel mondo del gas
Il valore del dato nel mondo del gascanaleenergia
 
SMART WATER 4 novembre
SMART WATER 4 novembreSMART WATER 4 novembre
SMART WATER 4 novembrecanaleenergia
 
SMART WATER 4 novembre
SMART WATER 4 novembreSMART WATER 4 novembre
SMART WATER 4 novembrecanaleenergia
 
SMART CITY 3 novembre
SMART CITY 3 novembre SMART CITY 3 novembre
SMART CITY 3 novembre canaleenergia
 
Opportunità per le aziende di vendita
Opportunità per le aziende di venditaOpportunità per le aziende di vendita
Opportunità per le aziende di venditacanaleenergia
 
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...canaleenergia
 

Destaque (9)

Il valore del dato nel mondo del gas
Il valore del dato nel mondo del gasIl valore del dato nel mondo del gas
Il valore del dato nel mondo del gas
 
SMART WATER 4 novembre
SMART WATER 4 novembreSMART WATER 4 novembre
SMART WATER 4 novembre
 
SMART WATER 4 novembre
SMART WATER 4 novembreSMART WATER 4 novembre
SMART WATER 4 novembre
 
Wataclic_Conte
Wataclic_ConteWataclic_Conte
Wataclic_Conte
 
SMART CITY 3 novembre
SMART CITY 3 novembre SMART CITY 3 novembre
SMART CITY 3 novembre
 
Opportunità per le aziende di vendita
Opportunità per le aziende di venditaOpportunità per le aziende di vendita
Opportunità per le aziende di vendita
 
Roma Tech &Lighting
Roma Tech &LightingRoma Tech &Lighting
Roma Tech &Lighting
 
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
 
Claudia Canaveri
Claudia CanaveriClaudia Canaveri
Claudia Canaveri
 

Semelhante a Sondaggio smart meter

Security for Smartgrid
Security for SmartgridSecurity for Smartgrid
Security for SmartgridGruene-it.org
 
Protecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated SecurityProtecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated SecurityEnergy Network marcus evans
 
IBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM Energy & Utilties
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid systemamaljose949563
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryChristian Glover Wilson
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkGauthamSK4
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...online Marketing
 
DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020Neil McDonnell
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecurityIRJET Journal
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?GENIANS, INC.
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...Clifton M. Hasegawa & Associates, LLC
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
Prédictions 2021, étude Deloitte
Prédictions 2021, étude DeloittePrédictions 2021, étude Deloitte
Prédictions 2021, étude DeloittePaperjam_redaction
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesDr Dev Kambhampati
 

Semelhante a Sondaggio smart meter (20)

Security for Smartgrid
Security for SmartgridSecurity for Smartgrid
Security for Smartgrid
 
Protecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated SecurityProtecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated Security
 
IBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart Grids
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
 
DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 
Nreca kickoff meeting
Nreca kickoff meetingNreca kickoff meeting
Nreca kickoff meeting
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Prédictions 2021, étude Deloitte
Prédictions 2021, étude DeloittePrédictions 2021, étude Deloitte
Prédictions 2021, étude Deloitte
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 

Mais de canaleenergia

Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot projectcanaleenergia
 
Mauro Brolis (Finlombarda)
Mauro Brolis (Finlombarda)Mauro Brolis (Finlombarda)
Mauro Brolis (Finlombarda)canaleenergia
 
Sviluppo energetico in Italia
Sviluppo energetico in ItaliaSviluppo energetico in Italia
Sviluppo energetico in Italiacanaleenergia
 
Sviluppo energetico del Messico
Sviluppo energetico del MessicoSviluppo energetico del Messico
Sviluppo energetico del Messicocanaleenergia
 
Media kit canaleenergia.com
Media kit canaleenergia.comMedia kit canaleenergia.com
Media kit canaleenergia.comcanaleenergia
 
Last modelli di business pv
Last modelli di business pvLast modelli di business pv
Last modelli di business pvcanaleenergia
 
Regolazione&mercato pv
Regolazione&mercato pvRegolazione&mercato pv
Regolazione&mercato pvcanaleenergia
 
Kingfisher-dal riciclo plastica vergine
Kingfisher-dal riciclo plastica vergineKingfisher-dal riciclo plastica vergine
Kingfisher-dal riciclo plastica verginecanaleenergia
 
Conferenza Gas: Morabito e Piron
Conferenza Gas: Morabito e PironConferenza Gas: Morabito e Piron
Conferenza Gas: Morabito e Pironcanaleenergia
 
Conferenza Gas: Tiziano Zocchi
Conferenza Gas: Tiziano ZocchiConferenza Gas: Tiziano Zocchi
Conferenza Gas: Tiziano Zocchicanaleenergia
 
Conferenza Gas: Marco Golinelli
Conferenza Gas: Marco Golinelli Conferenza Gas: Marco Golinelli
Conferenza Gas: Marco Golinelli canaleenergia
 
Automazione per rinnovabili
Automazione per rinnovabiliAutomazione per rinnovabili
Automazione per rinnovabilicanaleenergia
 
Pass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
Pass M0S 420 kv per le sottostazioni della rete elettrica di TrasmissionePass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
Pass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissionecanaleenergia
 
All compatible: la nuova tecnologia dei convertitori di frequenza
All compatible: la nuova tecnologia dei convertitori di frequenzaAll compatible: la nuova tecnologia dei convertitori di frequenza
All compatible: la nuova tecnologia dei convertitori di frequenzacanaleenergia
 
Ottimizzazione dei consumi di energia con interruttori di bassa tensione
Ottimizzazione dei consumi di energia con interruttori di bassa tensioneOttimizzazione dei consumi di energia con interruttori di bassa tensione
Ottimizzazione dei consumi di energia con interruttori di bassa tensionecanaleenergia
 
Deic il punto di convergenza
Deic il punto di convergenzaDeic il punto di convergenza
Deic il punto di convergenzacanaleenergia
 
L'automazione motore dell'innovazione e della competitività
L'automazione motore dell'innovazione e della competitivitàL'automazione motore dell'innovazione e della competitività
L'automazione motore dell'innovazione e della competitivitàcanaleenergia
 

Mais de canaleenergia (20)

Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot project
 
Mauro Brolis (Finlombarda)
Mauro Brolis (Finlombarda)Mauro Brolis (Finlombarda)
Mauro Brolis (Finlombarda)
 
Gas
GasGas
Gas
 
Sviluppo energetico in Italia
Sviluppo energetico in ItaliaSviluppo energetico in Italia
Sviluppo energetico in Italia
 
Sviluppo energetico del Messico
Sviluppo energetico del MessicoSviluppo energetico del Messico
Sviluppo energetico del Messico
 
Media kit canaleenergia.com
Media kit canaleenergia.comMedia kit canaleenergia.com
Media kit canaleenergia.com
 
Media kit 2013
Media kit 2013Media kit 2013
Media kit 2013
 
Last modelli di business pv
Last modelli di business pvLast modelli di business pv
Last modelli di business pv
 
Regolazione&mercato pv
Regolazione&mercato pvRegolazione&mercato pv
Regolazione&mercato pv
 
Clusit
ClusitClusit
Clusit
 
Kingfisher-dal riciclo plastica vergine
Kingfisher-dal riciclo plastica vergineKingfisher-dal riciclo plastica vergine
Kingfisher-dal riciclo plastica vergine
 
Conferenza Gas: Morabito e Piron
Conferenza Gas: Morabito e PironConferenza Gas: Morabito e Piron
Conferenza Gas: Morabito e Piron
 
Conferenza Gas: Tiziano Zocchi
Conferenza Gas: Tiziano ZocchiConferenza Gas: Tiziano Zocchi
Conferenza Gas: Tiziano Zocchi
 
Conferenza Gas: Marco Golinelli
Conferenza Gas: Marco Golinelli Conferenza Gas: Marco Golinelli
Conferenza Gas: Marco Golinelli
 
Automazione per rinnovabili
Automazione per rinnovabiliAutomazione per rinnovabili
Automazione per rinnovabili
 
Pass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
Pass M0S 420 kv per le sottostazioni della rete elettrica di TrasmissionePass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
Pass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
 
All compatible: la nuova tecnologia dei convertitori di frequenza
All compatible: la nuova tecnologia dei convertitori di frequenzaAll compatible: la nuova tecnologia dei convertitori di frequenza
All compatible: la nuova tecnologia dei convertitori di frequenza
 
Ottimizzazione dei consumi di energia con interruttori di bassa tensione
Ottimizzazione dei consumi di energia con interruttori di bassa tensioneOttimizzazione dei consumi di energia con interruttori di bassa tensione
Ottimizzazione dei consumi di energia con interruttori di bassa tensione
 
Deic il punto di convergenza
Deic il punto di convergenzaDeic il punto di convergenza
Deic il punto di convergenza
 
L'automazione motore dell'innovazione e della competitività
L'automazione motore dell'innovazione e della competitivitàL'automazione motore dell'innovazione e della competitività
L'automazione motore dell'innovazione e della competitività
 

Último

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Último (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Sondaggio smart meter

  • 1. Smart Grid Security nCircle, the leader in information risk and security performance management solutions, partnered with EnergySec, a DOE-funded public-private partnership that works to enhance the cyber security of the electric infrastructure, to sponsor a smart grid security survey of over 104 energy security professionals. The online survey was conducted between March 16 and March 31, 2012. Key smart grid security findings:  64% said smart meters are vulnerable to false data injection  75% said security has not been adequately addressed in smart grid deployment  90% believe we need smart grid security standards  64% believe smart grid deployment should slow down until we have better security controls  Only 50% said their organization has a security program and security policies for smart grid deployment  66% say for smart grid projects funded by American Recovery and Reinvestment Act grants have not adequately addressed security The complete results of the survey, including commentary from Patrick Miller, CEO of EnergySec, and Elizabeth Ireland, vice president of marketing for nCircle are below: Has the hype around privacy issues Has security been adequately associated with smart meter addressed in smart grid deployment? consumer data been overblown? 75% 53% 47% 25% Yes No Yes No "Smart Grid meter privacy is still a new area," said Patrick Miller. "State regulations are inconsistent and sensitive customer details in smart grid data vary from utility to utility. I expect the smart grid industry to struggle with several challenges around who ultimately 'owns' customer data. There are several grey areas that impact how smart grid customer data will be used as the industry attempts to maximize revenue potential. Even seemingly innocuous customer data has significant value -- just ask Facebook or Google.”
  • 2. Patrick Miller noted, "Smart meters vary widely in Do smart meter installations have sufficient security controls to capability and many older meters were not designed to protect against false data injection? adequately protect against false data injection. It doesn't help that some communication protocols used by the 61% smart meter infrastructure don't offer much protection against false data injection either. Together, these facts 39% highlight a much larger potential problem with data integrity across the smart grid infrastructure. Because our nation relies on the smart grid to deliver robust and reliable power, we need to make sure that all systems that process usage data, especially those that make autonomous, self-correcting, self-healing decisions, assure Yes No data integrity." "A false data injection attack is another example of technology advancing faster than security controls,” said Elizabeth Ireland. “This is a problem that has been endemic in the evolution of security and it's a key reason for the significant cyber security risks we face across many facets of critical infrastructure. Installing technology without sufficient security controls presents serious risks to our power infrastructure and to every power user in the U.S." "Security has been addressed to varying degrees in many smart grid deployments, however it is going to be a Are smart grid security standards moving fast enough to keep pace challenge to keep pace with the constantly changing with smart grid deployment? security landscape," said Patrick Miller. "The analog and mechanical devices installed in most utilities were designed for a very different maintenance model than newer digital 72% equipment being designed and installed today." Elizabeth Ireland noted, "It's pretty clear that information security professionals in the energy industry are 28% uncomfortable with standards currently available for smart grid technology. Defining and implementing meaningful security standards is always a challenge but without standards, adoption of critical security controls across the Yes No smart grid industry is likely to be uneven at best."
  • 3. Do you think we need smart grid Does your organization have a specific security standards and security program and security policies 89% policies? for smart grid deployment? 49% 51% 11% Yes No Yes No What part of smart grid infrastructure is most vulnerable to cyber attack? 41% 29% 20% 10% Smart meters Metering infrastructure including transport networks Utility energy management systems Energy management, such as phasor measurement units According to Patrick Miller, CEO of EnergySec, "The enormous range of technology in the smart grid presents many points of potential vulnerability, and we are moving at the speed of light to insert even more technology 'shims' into the existing network structures of the smart grid. This ever-increasing rate of complexity and hyper-embedded technology will be very difficult to secure." "The complexity of SCADA technology combined with the range of results from survey respondents on this issue indicates that we don't have any single section of the smart grid fully secured," said Elizabeth Ireland, vice president of marketing for nCircle. "It's not surprising that energy industry security professionals deem metering infrastructure as the highest area of risk. Individual partners in any complex supply chain often have very limited visibility into the security for the entire process."
  • 4. How should the security risks associated with the smart grid affect deployment plans? 64% 33% 4% No change from current plans; full steam ahead Deployment should slow down until we have better security controls We don’t need a smart grid at all Should regulatory oversight for smart Have the American Recovery and grid distribution be transitioned to Reinvestment Act of 2009 grants the Federal government? awarded to smart grid projects adequately addressed security? 60% 66% 40% 34% Yes No Yes No "The modernized grid encompasses new digital components all the way from the toaster to the turbine,” noted Patrick Miller. “It spans local, state and federal regulatory lines. In an environment where innovation is paramount, a federal one-size-fits-all approach may significantly slow down progress. On the other hand, potential inconsistencies in regulatory approaches may introduce complexity and risk smart grid landscape. Either model, whether state or federally regulated, comes with pros and cons. I see the regulatory oversight of the smart grid as one of our biggest smart grid challenges with the least obvious solution." “It’s likely that the division of opinion on regulatory oversight reflects, at least to some degree, fundamental political beliefs” said Elizabeth Ireland. “Some security professionals probably see government regulation in industry as beneficial, and some feel we should minimize the role of government in industry as much as possible. The majority of energy security professionals surveyed believe the energy industry will police itself.”