Cyber Security Applied to P&C IEDs

被引:0
|
作者
Sarralde, Javier Lopez [1 ]
Miguel Yarza, Jose [1 ]
机构
[1] ZIV, Zamudio, Spain
来源
2014 IEEE PES T&D CONFERENCE AND EXPOSITION | 2014年
关键词
Audit Trail; Authentication; Authorization; Centralized; Cyber Security; Encryption; IEC; 62351; IEEE; 1686; NERC CIP; P&C IED;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper highlights basic cyber security features that Protection and Control Intelligent Electronic Devices (P&C IEDs) should implement considering the current cyber security standardization efforts. Although it can be said that all functional aspects regarding the securization of IEDs are covered by these standards, there are still some gaps or lack of definition. Currently, it's difficult to install IEDs from different manufacturers within the same cyber security system. This paper emphasizes those aspects requiring additional definition and implementation of interoperability.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Quantifying the Security of Cyber Physical Systems Aditya P Mathur
    Mathur, Aditya P.
    2014 20TH IEEE PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2014), 2014, : XI - XI
  • [32] Taxonomy of cyber security metrics to measure strength of cyber security
    Gupta Bhol S.
    Mohanty J.R.
    Kumar Pattnaik P.
    Materials Today: Proceedings, 2023, 80 : 2274 - 2279
  • [33] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [34] Cyber Security Training A Survey of Serious Games in Cyber Security
    Tioh, Jin-Ning
    Mina, Mani
    Jacobson, Douglas W.
    2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
  • [35] Cyber Mission Assurance for Cyber Security
    MacKay M.
    ITNOW, 2020, 62 (01) : 32 - 33
  • [36] Cyber Security without Cyber War
    O'Connell, Mary Ellen
    JOURNAL OF CONFLICT & SECURITY LAW, 2012, 17 (02): : 187 - 209
  • [37] Securing IEDs against Cyber Threats in Critical Substation Automation and Industrial Control Systems
    Weerathunga, Pubudu Eroshan
    Cioraca, Anca
    2017 70TH ANNUAL CONFERENCE FOR PROTECTIVE RELAY ENGINEERS (CPRE), 2017,
  • [38] Cyber Security Competencies - Cyber Security Education and Research in Finnish Universities
    Lehto, Martti
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 179 - 188
  • [39] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [40] What kind of cyber security? Theorising cyber security and mapping approaches
    Fichtner, Laura
    INTERNET POLICY REVIEW, 2018, 7 (02):