"The first step in securing the Smart Grid is to fully
understand the threat landscape. This book provides both a timely
and relevant overview of the subject - a must-read for anyone
responsible for securing the grid as well as consumers looking to
implement the technology ."-- Dr. Patrick Engebretson, Assistant
Professor of Computer Security, Dakota State University.
"Easy to read and full of valuable information, this book
provides a wide-eyed view of our future and the security challenges
we will be facing in our day-to-day lives. Exploring everything
from home systems to large-scale power plants, this is a must-read
for everyone in our technological society."-- Thomas Wilhelm,
ISSMP, CISSP, SCSECA, SCNA, SCSA, IEM, IAM
Smart Grids are the future of energy. By creating networks from
power plant to home, utility companies will be able to regulate
power consumption making sure that consumers are receiving the
amount that is needed, no more or less. While this new use of
networking technology and unique applications such as smart meters
will help to conserve energy it also opens up a pipeline, that was
regulated manually, into the computer world of interconnected
networks. The infrastructure that is being built will need to have
robust security as an attack on this network could create chaos to
tens of thousands of power consumers, stop a utility company in its
tracks, or be used in a cyberwar.
"Securing the Smart Grid" takes a look at grid security today,
how it is developing and being deployed into now over 10 million
households in the US alone. Direct attacks to smart meters as well
as attacks via the networks will be detailed along with suggestions
for defense against them. A framework for how security should be
implemented throughout this growing system will be included
directing security consultants, and system and network architects
on how to keep the grid strong against attackers big and
small.
Details how old and new hacking techniques can be used against the
grid and how to defend against themDiscusses current security
initiatives and how they fall short of what is neededFind out how
hackers can use the new infrastructure against itself
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!