Although advanced metering infrastructures enable more dynamic generation, distribution and consumption, smart meters, wireless repeaters and routers must operate in physically unprotected environments and communicate with potentially hostile consumer systems. What is more, expanded bandwidth requirements tempt system designers to rely on non-dedicated and often un-trusted networks because of their lower costs. A combination of expanded cyber dependencies and greater public exposure will increase potential impacts from software vulnerabilities discovered within these systems. Thus, software vulnerability management is more problematic than ever.
What the Power Industry Has to Learn about Cyber Vulnerability Disclosure
Posted: 1 Jan 2012
Authors:Manimaran Govindarasu and Adam Hahn
Primary Committee:IEEE Smart Grid Newsletters
Sponsoring Society Members: Free
IEEE Members: $5.00
Please sign in at the top of the page. If you are not an IEEE member, please create a free account to make a purchase or become a society member to have access to all materials for free.
IEEE 2030.5 Revision Review & the GREAT-DR Use Case : Session 4 presented by Ravi Subramaniam - Ed Prod
Slides for Session 4- IEEE 2030.5 Revision Review & the GREAT-DR Use Case presented by Ravi Subramaniam
IEEE 2030.5 Revision Review & the GREAT-DR Use Case : Session 3 presented by Raed Abdullah, Javad Fattahi - Ed Prod
Slides for Session 3- IEEE 2030.5 Revision Review & the GREAT-DR Use Case presented by Raed Abdullah & Javad Fattahi
Interview with Manimaran Govindarasu - Cybersecurity for the Smart Grid: Challenges and R&D Directions