Beruflich Dokumente
Kultur Dokumente
This document is Annex 5 (of 5) to the ENISA study Smart grid security: Recommendations for
Europe and Member States, June 2012.
Agreements or Acknowledgements
ENISA would like to acknowledge the contribution of Mr. Wouter Vlegels and Mr. Rafa
Leszczyna to this study.
S21sec, the contractor of ENISA for this study is an international security services company with offices in several countries.
II
About ENISA
The European Network and Information Security Agency (ENISA) is a centre of network and
information security expertise for the EU, its member states, the private sector and Europes
citizens. ENISA works with these groups to develop advice and recommendations on good
practice in information security. It assists EU member states in implementing relevant EU
legislation and works to improve the resilience of Europes critical information infrastructure
and networks. ENISA seeks to enhance existing expertise in EU member states by supporting
the development of cross-border communities committed to improving network and
information security throughout the EU. More information about ENISA and its work can be
found at www.enisa.europa.eu.
Contact details
For contacting ENISA or for general enquiries on CIIP & Resilience, please use the following
details:
E-mail: resilience@enisa.europa.eu
Internet: http://www.enisa.europa.eu
For questions related to Smart grid security: Recommendations for Europe and Member
States, please use the following details:
E-mail: Konstantinos.Moulinos@enisa.europa.eu
Legal notice
Notice must be taken that this publication represents the views and interpretations of the
authors and editors, unless stated otherwise. This publication should not be construed to be a
legal action of ENISA or the ENISA bodies unless adopted pursuant to the ENISA Regulation (EC)
No 460/2004 as lastly amended by Regulation (EU) No 580/2011. This publication does not
necessarily represent state-of the-art and ENISA may update it from time to time.
Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the
external sources including external websites referenced in this publication.
This publication is intended for information purposes only. It must be accessible free of charge.
Neither ENISA nor any person acting on its behalf is responsible for the use that might be made
of the information contained in this publication.
Reproduction is authorised provided the source is acknowledged.
European Network and Information Security Agency (ENISA), 2012
Contents
1
Introduction .......................................................................................................................... 2
Europe ................................................................................................................................... 6
Belgium ............................................................................................................................... 37
Denmark .............................................................................................................................. 38
Germany.............................................................................................................................. 39
Italy...................................................................................................................................... 42
The Netherlands.................................................................................................................. 44
USA ...................................................................................................................................... 48
10 International ....................................................................................................................... 58
11 Other web 2.0 initiatives ..................................................................................................... 67
12 Bibliography ........................................................................................................................ 71
13 Abbreviations ...................................................................................................................... 90
Introduction
The aim of this section is to highlight a number of security initiatives and organisations that
are important for the cyber security of smart grids. These initiatives have been classified
according to their geographical origin and type. Furthermore, their mission/objectives and
primary activities related to smart grid cyber security are also described.
There are two groups of initiatives that have been excluded in this annex. On one side, all
those initiatives which addressed safety and security aspects of power generation and the
electricity grid, but not directly addressing cyber security are not included. Only those major
initiatives at the EU-level, which in the near term might also address cyber security, are
included. In the following lines we provide a list of these initiatives:
ETPIS
E-Energy
BDEW
Smart Grid Network
Electricity Regulatory Forum
ESIA Smart Grid Task Force
EUTC - ICT4SDG ICT for Smart Distributed Generation
More Microgrids
ELECPOR
Slovenian Technology Platform SmartGrids
FUTURED
e-CIP
HiperDNO
On the other hand, there is another group of initiatives which address cyber security issues of
general Industrial Control Systems (ICS). However, these documents could be an important
source of information for any stakeholder of the smart grid which needs to deal with
industrial automation or control systems security. For a detailed outlook on all these
documents we refer the reader to annex IV of ENISAs report Protecting Industrial Control
Systems - Recommendations for Europe and Member States (1). What follows is a list of
these initiatives:
IFAC
IFIP
ISACA
MERIDIAN Conference
SANS
TCG
EPCIP
IMG-S
Sixth Framework Programme
NAMUR
VDI
CPNI
Byres Security Blog
WIB
National Risk Assessment
CPNI.NL
OLF
AMETIC
CNPIC
GIPIC
Protect-IC
Test bed Framework for Critical Infrastructure Protection Exercise (Cloud CERT)
PESI
SEMA
The MSB Industrial Control System Security Program
ACC
AGA
API
DoE
DHS
Digital Bond- S4 workshop
TISP
SCADA hacker
SCADAsec
SCADA/Control System Security Professionals
Water Security
Cyber Security in Real-Time Systems
MPCSIE
Finally, the following lines provide a brief explanation of some of the key fields that will be
used for the classification of the initiatives/organisations which are presented in this chapter:
Europe
Name
Type
Other
Line of action
Participants
Mission/Objectives
Policies
Comments
N/A
URL
http://ec.europa.eu/information_society/policy/nis/strategy/activities
/ciip/index_en.htm
Name
Type
International agency
Line of action
Standards
Participants
Mission/Objectives
Activities related to
smart grid security
Results
Comments
URL
http://www.cen.eu/cen/Sectors/Sectors/UtilitiesAndEnergy
/SmartGrids/Pages/default.aspx
Name
CEN/CENELEC/ETSI SM-CG
Type
International agency
Line of action
Standards
Participants
All stakeholders
Mission/Objectives
10
Results
Technical Report
Comments
URL
http://www.cenelec.eu
Name
Type
Line of action
Participants
All stakeholders
Mission/Objectives
Activities related to
smart grid security
12
Comments
The first conclusions of the group will be made public in the second
quarter of 2012
URL
http://ec.europa.eu/dgs/information_society/index_en.htm
Name
Type
Public Body
Line of action
Policy, Regulation
Participants
Mission/Objectives
Activities related to
smart grid security
The EG2 is involved directly insmart grid security. This group aims to:
and
Comments
The initial duration of the task force was 20 months, till May 2011
14
http://ec.europa.eu/energy/gas_electricity/smartgrids/
taskforce_en.htm
Name
Type
Line of action
Participants
All stakeholders
Mission/Objectives
There are some projects under the scope of the FP7 which are related
to smart grid security. The following sets out a number of them:
16
DLC+VIT4IP: this project will develop, verify and test a highspeed narrow-band power line communications infrastructure
using the Internet Protocol (IP) which is capable of supporting
existing and extending new and multiple communication
applications. These shall include the existing power
distribution network for novel services in smart electricity
distribution networks such as demand side management,
control of distributed generation and customer integration.
This projects develops, among other things, reference designs
and embedded systems architectures for the high efficiency
and secure smart network systems addressing requirements
on compatibility, networking, security, robustness, diagnosis,
maintenance, integrated resource management and selforganization.
Results
Comments
URL
http://cordis.europa.eu/fp7/home_en.html
Name
Smartgrids ETP
Type
Line of action
Participants
Mission/Objectives
To provide relevant input to the EU initiatives such as the SETplan and its European Industrial Initiatives.
To
promote
SmartGrids
research,
demonstration and deployment projects.
development,
18
Activities related to
smart grid security
Results
Comments
N/A
URL
http://www.smartgrids.eu
Name
Type
Other
Line of action
Participants
Public Bodies
Mission/Objectives
Activities related to
smart grid security
With respect to ICS andsmart grid security the proposed tasks include
the stock taking and comparative analysis of existing initiatives,
pilots, good practices and methods addressing ICT risks, privacy and
security. The input from the EU side includes:
20
Results
Good practices
Comments
N/A
URL
http://europa.eu/rapid/pressReleasesAction.do?reference=
MEMO/10/658&type=HTML
Name
Type
Public Platform
Line of action
Participants
All stakeholders
Mission/Objectives
Activities related to
smart grid security
Results
Comments
URL
http://ses.jrc.ec.europa.eu
22
Name
CEER
Type
International Agency
Line of action
Policy, standards
Participants
Mission/Objectives
Activities related to
smart grid security
During 2012 CEER will see the continuation of the previous efforts to
address the challenges of security of supply from the viewpoint of
generation adequacy, elaborating guidelines of good practices.
Three task forces have been defined, from which two of them are
directly related to security aspects of the smart grid. These task
forces are:
Electricity Quality of Supply and Smart Grids (EQS) Task Force, which
is working on quality issues and the regulatory aspects of smart
grids.
Electricity Security of Supply (ESS) Task Force which is addressing the
challenges of security of supply from the viewpoint of generation
adequacy.
Even though security and reliability of the grid are the focus of many
of the efforts of this agency, cyber security issues are not still being
considered as a key aspect.
Results
Comments
URL
http://www.energy-regulators.eu
Name
ANEC
Type
Other
Line of action
Standardisation
Participants
Mission/Objectives
Activities related to
smart grid security
ANEC was invited by ESOs to participate in both, Smart Meter Coordination Group (SM-CG) established to execute Mandate
M/441(20) on Measuring Instruments and Smart Grid Coordination
Group (SG-CG) established to execute M/490(32) to support
European smart grid deployment.
Additionally, and in order to defend the consumer interests in the
policy and standardisation activities related to the implementation of
the third EU Energy Package, ANEC has joined the European
Commission Smart Grid Task Force where it helps identifying
regulatory recommendations for implementing Smart Grids.
As a result of the participation of ANEC in such initiatives, several
documents were developed. These documents include a number of
aspects considered key by consumers on data privacy and security,
mostly referring to keep data confidential and secure both during
their transmission and storage. Besides, some of these documents
have been a basis for developing COM (2011) 202(23) and SEC (2011)
463(33).
Results
Comments
N/A
URL
www.anec.eu
24
Name
DIGITALEUROPE
Type
Industry Association
Line of action
Participants
Mission/Objectives
Activities related to
smart grid security
Results
Technical reports
Comments
N/A
URL
http://www.digitaleurope.org
Name
EDSO-SG
Type
Industry Association
Line of action
Participants
DSOs
Mission/Objectives
EDSO for smart grids aims to be the key reference point in the
coordination of all European DSOs efforts.
The purpose of the Association is to structure, lead and enhance, not
for profit cooperation between European distribution system
26
EDSO for smart grids plays an active role in the European regulatory
process on smart grids development and implementation.
Some of its goals include the security of supply and the promotion of
the reliability of electricity distribution grids.
Results
Technical reports
Comments
URL
http://edsoforsmartgrids.eu
Name
ENTSO-E
Type
International Agency
Line of action
Participants
TSO
Mission/Objectives
Results
Comments
URL
https://www.entsoe.eu/
Name
EEGI
Type
Other
Line of action
R&D
Participants
Mission/Objectives
28
Activities related to
smart grid security
To integrate national networks into a market-based, truly panEuropean network, to guarantee a high-quality of electricity
supply to all customers and to engage them as active
participants in energy efficiency.
Results
N/A
Comments
URL
https://www.entsoe.eu/rd/eegi/
Name
ENCS
Type
Line of action
Participants
Mission/Objectives
Test Bed
Comments
URL
N/A
30
ESMIG
Type
Public Body
Line of action
Participants
All stakeholders
Mission/Objectives
Activities related to
smart grid security
Results
Technical reports
Comments
URL
http://www.esmig.eu/
Name
EURELECTRIC
Type
Electricity Industry
Line of action
Participants
Mission/Objectives
Activities related to
smart grid security
Results
Comments
N/A
URL
http://www2.eurelectric.org/
Name
EuroSCSIE
32
Line of action
Participants
Mission/Objectives
Activities related to
smart grid security
Results
Comments
URL
sta.jrc.ec.europa.eu/index.php/competitive-projects-/21-scni/8-escsie
http://www.cpni.nl/informatieknooppunt/internationaal/euroscsie
Name
GEODE
Type
Industry association
Line of action
Information sharing
Participants
DSO
Mission/Objectives
Activities related to
smart grid security
Results
Comments
URL
http://www.geode-eu.org/
Name
PRIME Alliance
Type
Industry association
Line of action
technical
Participants
Mission/Objectives
34
Activities related to
smart grid security
Results
Comments
N/A
URL
http://www.prime-alliance.org/
Name
Type
Line of action
Standard
Participants
Mission/Objectives
Activities related to
smart grid security
Results
36
N/A
URL
http://www.dlms.com/organization/index.html
Belgium
Name
Smartgrids Flanders
Type
Public body
Line of action
Participants
All stakeholders
Mission/Objectives
Activities related to
smart grid security
Results
Comments
URL
www.smartgridsflanders.be
38
Denmark
Name
Type
Project
Line of action
Technical, R&D
Participants
Mission/Objectives
Activities related to
smart grid security
Results
Technical reports.
Comments
URL
http://www.second1.dk/
Germany
Name
DIN
Type
Line of action
Policy, standardization
Participants
All
Mission/Objectives
Providing an
development.
electronic
infrastructure
for
standards
40
Standards, reports
Comments
URL
http://www.din.de
Name
VGB
Type
Industry association
Line of action
Participants
Operators
Mission/Objectives
Research activities.
Results
Comments
http://www.vgb.org
42
Italy
Name
ASTROM
Type
Project
Line of action
Technical
Participants
R&D
Mission/Objectives
Activities related to
smart grid security
Results
Comments
URL
http://utmea.enea.it/projects/int/#astrom
44
The Netherlands
Name
ESNA
Type
Asociation
Line of action
Dissemination, technical
Participants
Mission/Objectives
Activities related to
smart grid security
Results
Comments
URL
http://www.esna.org
Name
Type
Industry association
Line of action
Technical
Participants
All stakeholders
Mission/Objectives
This initiative is the point of contact for matters affecting the energy
market, such as environmental issues, free market performance and
security of supply. EnergieNed is the forum in which energy
producers consult each other on issues such as the environment and
investment conditions, traders consult each other on the functioning
of the wholesale market and the integration of European markets,
and retailers discuss a wide range of topics varying from stimulation
of energy saving to consumer protection.
Activities related to
smart grid security
This working group has written several good guides papers and use a
clear example is Privacy and Security of the Advanced Metering
Infrastructure(42).
Results
Comments
URL
N/A
46
United Kingdom
Name
DECC
Type
Public Body
Line of action
Standardisation, policy
Participants
public bodies
Mission/Objectives
Activities related to
smart grid security
DECC is divided into many experts groups and task forces. Some of the
most important are the following.
STEG (Smart Meter Design Security Technical Experts Group): This is
an advisory group of technical security specialists formed in
November 2010 to provide advice and support to the programme on
security issues. The STEG membership includes experts from industry
and other sectors such as energy suppliers, trade associations, meter
manufacturers, system integrators and telecommunications
providers. Government is also represented through the Centre for
Protection of National Infrastructure, CESG (National Technical
Authority for Information Assurance) and technical security specialists
working in the programme team. Consumer representatives were also
invited to join.
Smart grid policy in the UK: DECC published a vision document,
Smarter Grids: the opportunity in December 2010. DECC is rolling out
Smart electricty and gas meters to all GB homes by 2020.
UK Smart Grid Cyber Security Report: The Energy Networks
N/A
Comments
URL
http://www.decc.gov.uk/
48
USA
Name
ANSI
Type
International agency
Line of action
Standard
Participants
Standardisation Bodies
Mission/Objectives
Activities related to
smart grid security
Results
Stasndards
Comments
URL
http://www.ansi.org/
Name
NERC
Type
Line of action
Participants
Mission/Objectives
Activities related to
smart grid security
Results
50
URL
http://www.nerc.com
Name
NIST
Type
Public body
Line of action
Participants
Public bodies
Mission/Objectives
Activities related to
smart grid security
52
Comments
URL
http://www.nist.gov
Name
Type
Specialized event
Line of action
Participants
Mission/Objectives
Promote Federal
cooperation.
and State
Activities related to
smart grid security
Create a forum for communication to and with stakeholderssignaling areas of regulatory interest.
Results
Comments
FERC-NARUC stands for Federal Energy Regulatory Commission National Association of Regulatory Utility Commissioners
URL
http://www.naruc.org/Ferc/default.cfm?c=3
Name
GridWise alliance
Type
Industry association
Line of action
Participants
Mission/Objectives
Activities related to
smart grid security
54
Technical reports
Comments
N/A
URL
http://www.gridwise.org/gridwisealli_about.asp
Name
NEMA
Type
Standards
Line of action
Participants
Manufacturers
Mission/Objectives
Activities related to
smart grid security
The NEMAs objectives for Cyber Security in smart grid are twofold:
The NEMA member companies agree that first and foremost, security
must be part of the design consideration for any smart grid
component (and its corresponding interactions with other grid
elements) from its inception (62).
Results
Comments
URL
http://www.nema.org/gov/energy/smartgrid/index.cfm
Name
Type
Specialized event
Line of action
Participants
All stakeholders
Mission/Objectives
Activities related to
smart grid security
The three Working Groups will focus their R&D efforts in Year 1 on
securing the following 6 critical grid functions end-to-end:
1. Advanced Metering Infrastructure
2. Demand Response
3. Electric Transportation
4. Distributed Energy Resources
56
Comments
URL
http://www.cvent.com/events/nescor-annual-conferenceworkshops/event-summaryff2fb887488c4af1aa572813885fd034.aspx
Name
TIA
Type
Industrial association
Line of action
Participants
Mission/Objectives
Activities related to
smart grid security
Standards Development
Government Affairs
Market Intelligence
Results
Standard
Comments
URL
www.tiaonline.org
58
10 International
Name
Type
Industry association
Line of action
Participants
Mission/Objectives
Activities related to
smart grid security
Results
Technical Reports
Comments
URL
http://www.cigre-b5.org/
http://www.cigre-d2.org/
Name
Type
Line of action
Participants
All stakeholders
Mission/Objectives
60
Results
Comments
URL
http://www.itu.int/en/ITU-T/focusgroups/smart/Pages/Default.aspx
Name
Type
International agency
Line of action
Standards, Technical
Participants
Standardization bodies
Mission/Objectives
teleprotection, and associated information exchange for realtime and non-real-time information, used in the planning,
operation and maintenance of power systems.
On the other hand, the Joint Technical Committee ISO/IEC JTC 1 of
ISO and IEC is a standardization committee which main objective is
the creation of standards for general methods and techniques in the
area of information security.
Activities related to
smart grid security
Results
Comments
URL
https://www.iec.ch
Name
Type
Professional association
Line of action
Standards
Participants
All stakeholders
Mission/Objectives
62
Comments
URL
http://www.ieee.org/
Name
Type
Professional association
Line of action
Participants
All Stakeholders
Mission/Objectives
Comments
URL
http://www.isa.org/
Name
Type
Industry association
Line of action
Participants
Mission/Objectives
64
Activities related to
smart grid security
Among them, the AMI-SEC Task Force is the most directly related to
smart grid cyber security aspects. This task force was established
August 2007 to develop consistent security guidelines,
recommendations, and best practices for AMI system elements as
well as on design specifications. Moreover it tries to support vendors
to produce compliant and compatible security technologies. It
also provides a focus point for industry discussions on security
aspects related to AMI.
Standards, guidelines.
Comments
N/A
URL
http://www.ucaiug.org
Name
Zigbee Alliance
Type
Industry association
Line of action
Standard, Technical
Participants
All stakeholders
Mission/Objectives
Activities related to
smart grid security
Results
Comments
N/A
66
www.zigbee.org
Type
Line of action
Participants
Mission/Objectives
The goal of Smart Grid Network is to accelerate the pace of smart grid
deployment by promoting dialog and information exchange among
stakeholders and connecting interested consumers with solution
providers.
The site helps consumers understand how a smarter grid can
empower them to better manage their energy usage and identify
trusted solution providers. Solution providers, big companies and
small start-ups alike, will be able to get the message out about their
innovative solutions to interested customers around the globe.
Smart Grid Network has two components; information from
authorized content providers on smart grid initiatives in a state or
country and a Facebook-style social network allowing:
Smart Grid Network, Inc. launched this site on October 18, 2011, with
a pilot test for Illinois (US) and is now expanding to other states and
countries.
Activities related to
smart grid security
Results
Comments
68
http://www.smartgrid.com/
Name
Type
Online Resource
Line of action
Technical
Participants
All stakeholders
Mission/Objectives
Activities related to
smart grid security
Results
N/A
Comments
N/A
URL
http://www.linkedin.com/groups?home=&gid=
1842898&trk=anet_ug_hm&goback=.gdr_1332346537283_1
Name
Type
Online Resource
Line of action
Technical
Participants
Mission/Objectives
The Smart Grid Cyber Security group is an exclusive memberscommunity, thats brings together professionals from across the
International Smart Grid/Utilities sector involved with Cyber and
Critical Infrastructure security. This community extends to both
those security professionals from within the Utilities Sector and their
IT security partners and vendors.
The objective of this group is to create a forum for its members to
discuss, share ideas, best practices, trends, strategies and create a
common community voice to further understand the dynamics
surrounding the global emergence of smart grid initiative and its
security risks.
Activities related to
smart grid security
Results
Forum
Comments
N/A
URL
http://www.linkedin.com/groups?home=&gid=
4149740&trk=anet_ug_hm&goback=.gdr_1332346537283_1
http://www.smartgridcybersecurity.co.uk
Name
Type
Online Resource
Line of action
Technical
Participants
All stakeholders
Mission/Objectives
Activities related to
smart grid security
Results
N/A
Comments
URL
http://www.linkedin.com/groups?about=&gid=
2693507&trk=anet_ug_grppro
Name
Type
Online Resource
Line of action
Technical
Participants
N/A
Mission/Objectives
70
Results
N/A
Comments
N/A
URL
http://www.linkedin.com/groups?about=&gid=
3847044&trk=anet_ug_grppro
12 Bibliography
1. European Network and Informations Security Agency (ENISA). Protecting Industrial Control
Systems - Recommendations for Europe and Member States. 2011.
2. CIGR. The Impact of Implementing Cyber Security Requirements using IEC 61850. s.l. :
CIGRE Publication 427, 2010.
3. International Electrotechnical Commission (IEC). IEC TS 62351-1: Power systems
management and associated information exchange Data and communications security. Part
1: Communication network and system security Introduction to security issues. International
Electrotechnical Commission. 2007.
4. . IEC TS 62351-2: Power systems management and associated information exchange
Data and communications security Part 2: Glossary of terms. International Electrotechnical
Commission. 2008.
5. . IEC TS 62351-3: Power systems management and associated information exchange
Data and communications security Part 3: Communication network and system security
Profiles including TCP/IP. International Electrotechnical Commission. 2007.
6. . IEC TS 62351-4: Power systems management and associated information exchange
Data and communications security Part 4: Profiles including MMS. International
Electrotechnical Commission. 2007.
7. . IEC TS 62351-5: Power systems management and associated information exchange
Data and communications security Part 5: Security for IEC 60870-5 and derivatives.
International Electrotechnical Commission. 2009.
8. . IEC TS 62351-6: Power systems management and associated information exchange
Data and communications security Part 6: Security for IEC 61850. International
Electrotechnical Commission. 2007.
9. . IEC TS 62351-7: Power systems management and associated information exchange
Data and communications security. Part 7: Network and system management (NSM) data
object models. International Electrotechnical Commission. 2010.
10. . IEC TR 62210: Power system control and associated communications Data and
communication security. 2003-05.
11. Institute of Electrical and Electronics Engineers (IEEE). WGC1 - Application of ComputerBased Systems. s.l. : http://standards.ieee.org/develop/wg/WGC1.html, 2007.
12. . WGC6 - Trial Use Standard for a Cryptographic Protocol for Cyber Security of Substation
Serial Links. s.l. : http://standards.ieee.org/develop/wg/WGC6.html, 2010.
13. . E7.1402 - Physical Security of Electric
http://standards.ieee.org/develop/wg/E7_1402.html, 2000.
Power
Substations.
s.l. :
72
ISA67-16WG5.
[Online]
http://www.isa-online.org/cgi-
19. Commission of the European communities. Communication from the commission to the
European parliament. Protecting Europe from large scale cyber-attacks and disruptions:
enhancing preparedness, security and resilience. 2009.
20.
European
Commision.
M/441:
http://www.cen.eu/cen/Sectors/Sectors/Measurement/Documents/M441.pdf : s.n., 2009.
30. O.Vermesan, R.Zafalon, K.Kriegel, R.Mock, R.John, M.Ottella, P.Perlo. Internet Of Energy
pag:33. Advance Microsystems for Automotive Applications 2011. [Online]
http://books.google.es/books?id=Qt7HDlzmrhsC&pg=PA33&lpg=PA33&dq=Internet+of+Energ
y+%E2%80%93+Connecting+Energy+Anywhere+Anytime&source=bl&ots=KlFXHWQYEA&sig=Y
DjZYgFqAevFtfWL6tuFqJxIKOo&hl=es&sa=X&ei=arVdT6mDIuem0AW9v9zWDQ&ved=0CIUBEO
gBMAY#v=onepage&q=Int.
31. European Technology Platform SmartGrids. Strategic research agenda for Europes
electricity
networks
of
the
future.
s.l. :
http://www.smartgrids.eu/documents/sra/sra_finalversion.pdf, 2007.
32. European Commission. Directorate-General for Energy. Standardization Mandate to
European Standardisation Organisations (ESOs) to support European Smart Grid deployment.
M/490.
s.l. :
http://ec.europa.eu/energy/gas_electricity/smartgrids/doc/2011_03_01_mandate_m490_en.
pdf.
33. Commission of the European communities. Commission staff working document
definition, expected services, functionalities and benefits of smart grids SEC(2011)463. 2011.
34. ENTSOE. WG European operational standards. [Online] https://www.entsoe.eu/systemoperations/working-groups/wg-european-operational-standards/.
35. . ENTSOE Working Group System Protection. [Online] https://www.entsoe.eu/systemoperations/working-groups/wg-critical-system-protection/.
36. . WG Electronic Highway. [Online] https://www.entsoe.eu/system-operations/workinggroups/wg-electronic-highway/.
37. ESMIG. External Activities, ESMIG. [Online] http://www.esmig.eu/about-us/smart-metercoordination-group-sm-cg-new.
38.
EUROELECTRIC.
10
Steps
to
http://www.eurelectric.org/10StepsTosmartGrids/.
Smart
Grid.
[Online]
2010.
39. International Instruments Users' Association (WIB). Process control domain - Security
requirements for vendors. EWE (EI, WIB, EXERA). 2010.
40.
DIN.
Electromobility.
[Online]
2011.
http://www.naautomobil.din.de/cmd?contextid=naautomobil&bcrumblevel=1&subcommitte
eid=118124005&projid=149029465&level=tpl-projdetailansicht&committeeid=54738955&languageid=en.
41.
VGB.
VGB-R.175
IT-Sicherheit
http://www.vgb.org/shop/r175.html, 2006.
fr
Erzeugungsanlagen
s.l. :
42. Netbeheer Nederland. Privacy and Security Advance Metering Infraestructure. Apendix A.
s.l. :
http://www.energiened.nl/_upload/bestellingen/publicaties/356_320006%20%20PS%20M%20StakeholderAnalysis.pdf, 2010.
74
[Online]
58. Smart Grid Interoperability Panel (SGIP). SGIP Cyber Security Working Group (SGIP
CSWG).
[Online]
http://collaborate.nist.gov/twikisggrid/bin/view/SmartGrid/CyberSecurityCTG.
59. NIST SGIP. Priority Action Plans.
sggrid/bin/view/SmartGrid/PriorityActionPlans.
[Online]
http://collaborate.nist.gov/twiki-
[Online]
69. Weiss, Joseph. Protecting Industrial Control Systems from Electronic Threats. s.l. :
Momentum Press, 2010.
70. Tsang, Rose. Cyberthreats, Vulnerabilities and Attacks on SCADA networks. 2009.
71. Theriault, Marlene and Heney, William. Oracle Security. First Edition. s.l. : O'Reilly, 1998.
p. 446. 1-56592-450-9.
72. Syngres, Eric Knapp. Industrial Network Security. Securing critical infrastructure Networks
for Smart Grid, SCADA and other Industrial Control Systems. .
73. Suter, Manuel and Brunner, Elgin M. International CIIP Handbook 2008 / 2009. 2008.
74. Stouffer, K. A., Falco, J. A. and Scarfone, K. A. Guide to Industrial Control Systems (ICS)
Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control
Systems (DCS), and other control system configurations such as Programmable Logic
Controllers (PLC). s.l. : National Institute of Standards and Technology, 2011.
75.
Snyder,
Mike.
Smart
Grid
http://ict2020.tiaonline.org/may_june_2009/policy_stimulus.cfm.
Synergy.
76. Smith, Steven S. The SCADA Security Challenge: The Race Is On. 2006.
[Online]
76
Act
(H.R.
3162).
[Online]
2001.
http://www.iaea.org/NuclearPower/Downloads/Engineering/meetings/2011-05-TWGNPPIC/Day-3.Thursday/TWG-CyberSec-O.Glockler-2011.pdf.
95. Giordano, Vincenzo, et al. Smart Grid projects in Europe: lessons learned and current
developments. 2011.
96. Ginter, Andrew. An Analysis of Whitelisting Security Solutions and Their Applicability in
Control Systems. 2010.
97. Flick, Tony and Morehouse, Justin. Securing the Smart Grid. Next Generation Power Grid
Security. 2011.
98. Fan, Jiyuan and Zhang, Xiaoling. Feeder Automation within the Scope of Substation
Automation.
[Online]
10
31,
2006.
[Cited:
12
29,
2011.]
http://www.ieee.org/portal/cms_docs_pes/pes/subpages/meetingsfolder/PSCE/PSCE06/panel24/Panel-24-3_Feeder_Automation.pdf.
99. Fan, Jiyuan, du Toit, Willem and Backschneider, Paul. Distribution Substation Automation
in Smart Grid.
100. Falliere, Nicolas, Murchu, Liam O and Chien, Eric. W32.Stuxnet Dossier. Symantec. 2011.
101. Ericsson, Gran. Managing Information Security in an Electric Utility. Cigr Joint Working
Group (JWG) D2/B3/C2-01.
102. Ebinger, Charles and Massy, Kevin. Software and hard targets: enhancing Smart Grid
cyber
security
in
the
age
of
information
warfare.
s.l. :
http://www.brookings.edu/~/media/Files/rc/papers/2011/02_smart_grid_ebinger/02_smart_
grid_ebinger.pdf, 2011.
103. Daz Andrade, Carlos Andrs and Hernandez, Juan Carlos. Smart grid: Las TICs y la
modernizacin de las redes de energa elctrica Estado del arte. 2011.
104. Davis, Mike. SmartGrid Device Security. Adventures in a new medium. s.l. :
https://www.blackhat.com/presentations/bh-usa-09/MDAVIS/BHUSA09-Davis-AMISLIDES.pdf, 2009.
105. Conant, Rob. Toward a Global Smart Grid - The U.S. vs. Europe. [Online]
http://www.elp.com/index/display/article-display/2702271845/articles/utility-automationengineering-td/volume-15/Issue_5/Features/Toward_a_Global_Smart_Grid__The_US_vs_Europe.html .
106. . Toward a Global Smart Grid - The U.S. vs. Europe. [Online]
http://www.elp.com/index/display/article-display/2702271845/articles/utility-automationengineering-td/volume-15/Issue_5/Features/Toward_a_Global_Smart_Grid__The_US_vs_Europe.html.
107.
Coll-Mayor,
Debora.
Overview
of
strategies
and
goals.
[Online]
http://www.4thintegrationconference.com/downloads/Strategies & Goals of Smartgrid in
Europe.pdf.
78
SCADA.
[Online]
119. Anderson, Roger N., et al. Computer-Aided Lean Management for the Energy Industry.
2008.
120. Amin, Saurabh, Sastry, Shankar and Crdenas, Alvaro A. Research Challenges for the
Security of Control Systems. 2008.
121. Amin, S. Massoud. Smart Grid: Overview, Issues and Opportunities. Advances and
Challenges in Sensing, Modeling, Simulation, Optimization and Control. s.l. :
http://central.tli.umn.edu/CDC_Semi_plenary_Smart%20Grids_Massoud%20Amin_final.pdf,
2011.
122. Abbott, Ralph E. The Successful AMI Marriage: When Water AMR and Electric AMI
Converge.
[Online]
http://www.waterworld.com/index/display/articledisplay/328763/articles/waterworld/volume-24/issue-5/editorial-feature/the-successful-amimarriage-when-water-amr-and-electric-ami-converge.html.
123.
ZigBee.
ZigBee
Home
Automation
Overview.
http://www.zigbee.org/Standards/ZigBeeHomeAutomation/Overview.aspx.
[Online]
[Online]
126. Web application Security Consortium. Web Application Firewall Evaluation Criteria.
[Online] 2009. http://projects.webappsec.org/w/page/13246985/Web Application Firewall
Evaluation Criteria.
127. VIKING Project. Vital Infrastructure, Networks, Information and Control Systems
Management. [Online] 2008. http://www.vikingproject.eu.
128. VDI/VDE. VDI/VDE 2182: IT security for industrial automation. 2011.
129. United States Computer Emergency Readiness Team (US-CERT). US-CERT: United States
Compueter Emergency readiness Team. [Online] http://www.us-cert.gov.
130. Institute of Electrical and Electronics Engineers (IEEE). Transmission & Distribution
Exposition & Conference 2008 IEEE PES : powering toward the future. Institute of Electrical and
Electronics Engineers. 2008.
131. Pacific Northwest National Labortory, U.S. Department of Energy. The Role of
Synchronized Wide Area Measurements for Electric Power Grid Operations. 2006.
132. EURELECTRIC Networks Committee. The Role of Distribution System. Operators (DSOs) as
Information Hubs. 2010.
133. The 451 Group. The adversary: APTs and adaptive persistent adversaries. 2010.
134. SANS. The 2011 Asia Pacific SCADA and Process Control Summit - Event-At-A-Glance.
[Online] 2011. http://www.sans.org/sydney-scada-2011.
135. International Energy Agency (IEA). Technology Roadmap. Smart Grids. France :
OCDE/IEA, 2011.
136. EPRI. Technical and System Requirements for Advanced Distribution Automation. 2004.
137. International Federation of Automatic Control (IFAC). TC 6.3. Power Plants and Power
Systems IFAC TC Websites. [Online] http://tc.ifac-control.org/6/3.
138. . TC 3.1. Computers for Control IFAC TC Websites. [Online] http://tc.ifaccontrol.org/3/1.
139. ESCoRTS Project. Survey on existing methods, guidelines and procedures. 2009.
140. CEN/CENELEC/ETSI Joint Working Group. Standards for Smart Grids. 2011.
80
force.
[Online]
Safety
vs
Confidentiality.
s.l. :
146.
Enerweb.
Smart
grid
Information
Report.
http://enerweb.co.za/brochures/Smart%20Grid%20Information%20Report.pdf, 2011.
s.l. :
147. IEEE Smart grid. Smart Grid Conceptual Model. [Online] http://smartgrid.ieee.org/ieeesmart-grid/smart-grid-conceptual-model.
148. Sonoma innovation. Smart Grid Communications Architectural Framework. 2009.
149. EU Commission Task Force for Smart Grids. Expert Group 4. Smart Grid aspects related
to Gas. 2011.
150. European Commision. Smart electricity Systems. European CommisionJoint Research
Centre. [Online] http://ses.jrc.ec.europa.eu/.
151. Siemens. Smart Distribution. Distribution Automation and Protection. [Online] [Cited: 29
12
2011.]
http://www.energy.siemens.com/fi/en/energy-topics/smart-grid/smartdistribution/distribution-automation-and-protection.htm.
152. The Climate Group. smart 2020: enabling the low carbon economy in the information
age. [Online] 2008.
153. Treehugger. SMART 2020 Report: Smart Grids Can Cut CO2 Emissions by 15 Percent.
[Online] 2011. http://www.treehugger.com/clean-technology/smart-2020-report-smart-gridscan-cut-co2-emissions-by-15-percent.html.
154. smart 2020. Smart 2020 . [Online] 2009. http://www.smart2020.org/.
155. ESCoRTS Project. Security of Control and Real Time Systems. [Online] 2008.
http://www.escortsproject.eu.
156.
ABB.
Security
in
the
smart
grid.
s.l. :
http://www02.abb.com/db/db0003/db002698.nsf/0/832c29e54746dd0fc12576400024ef16/
$file/paper_Security+in+the+Smart+Grid+%28Sept+09%29_docnum.pdf, 2009.
157. American Petroleum Institute (API) energy. Security Guidelines for the Petroleum
Industry. American Petroleum Institute. 2005.
158. Technical Support Working Group (TSWG). Securing Your SCADA and Industrial Control
Systems. Departmet of Homeland Security. 2005.
159. Rijksoverheid. Scenario's Nationale Risicobeoordeling 2008/2009. [Online] 2009.
http://www.rijksoverheid.nl/documenten-en-publicaties/rapporten/2009/10/21/scenario-snationale-risicobeoordeling-2008-2009.html.
160. SANS. SCADA Security Advanced Training. [Online] 1989. http://www.sans.org/securitytraining/scada-security-advanced-training-1457-mid.
161. Water Sector Coordinating Council Cyber Security Working Group. Roadmap to Secure
Control Systems in the Water Sector. 2008.
162.
RISI.
Repository
of
http://www.securityincidents.org/.
Industrial
Security
Incidents.
[Online]
163. United States Nuclear Regulatory Commission. Regulatory Guide 5.71: Cyber security
programs for nuclear facilities. 2010.
164. Department of Homeland Security (DHS). Recommended Practice: Improving Industrial
Control Systems Cybersecurity with Defense-In-Depth Strategies. 2009.
165. Wikipedia. Recloser. [Online] [Cited: 12 26, 2011.] http://en.wikipedia.org/wiki/Recloser.
166. Iberdrola. Proyecto tipo para Centro de Transformacin intemperie compacto. [En lnea]
Abril
de
1997.
[Citado
el:
29
de
Diciembre
de
2011.]
http://www.coitiab.es/reglamentos/electricidad/reglamentos/jccm/iberdrola/mt_2-1105.htm.
167. Centre for the Protection of National Infrastructure (CPNI). Process control and SCADA
security. Guide 7. Establish ongoing governance. Centre for the Protection of National
Infrastructure.
168. . Process control and SCADA security. Guide 6. Engage projects. Centre for the
Protection of National Infrastructure.
169. . Process control and SCADA security. Guide 5. Manage third party risk. Centre for the
Protection of National Infrastructure.
170. . Process control and SCADA security. Guide 4. Improve awareness and skills. Centre for
the Protection of National Infrastructure.
171. . Process control and SCADA security. Guide 3. Establish response capabilities. Centre
for the Protection of National Infrastructure.
172. . Process control and SCADA security. Guide 2. Implement secure architecture. Centre
for the Protection of National Infrastructure.
173. . Process control and SCADA security. Guide 1. Understand the business risk. Centre for
the Protection of National Infrastructure.
82
system.
[Online]
191. INSPIRE Project. INcreasing Security and Protection through Infrastructure REsilience.
[Online] 2008. http://www.inspire-strep.eu.
192. International Federation for Information Processing (IFIP). IFIP WG 1.7 Home Page.
[Online] http://www.dsi.unive.it/~focardi/IFIPWG1_7.
193. . IFIP Technical Committees. [Online] http://ifiptc.org/?tc=tc11.
194. . IFIP TC 8 International Workshop on Information Systems Security Research. [Online]
http://ifip.byu.edu.
195. Institute of Electrical and Electronics Engineers (IEEE). IEEE Standard for Substation
Intelligent Electronic Devices (IEDs) Cyber Security Capabilities. 2007.
196. . IEEE Standard C37.1-1994: Definition, Specification, and Analysis of Systems Used for
Supervisory Control, Data Acquisition, and Automatic Control. Institute of Electrical and
Electronics Engineers. 1994.
197. International Electrotechnical Commission (IEC). IEC 62443: Security for Industrial
Process Measurement and Control: Network and System Security. 2010.
198. . IEC 61970: Common Information Model (CIM) / Energy Management.
199. . IEC 61968: Common Information Model (CIM) / Distribution Management.
200. . IEC 61850-7-2: Communication networks and systems for power utility automation
Part 7-2: Basic information and communication structure Abstract communication service
interface (ACSI). International Electrotechnical Commission. 2010.
201. . IEC 61850: Communication networks and systems in substations. 2011.
202. . IEC 60870-6: Telecontrol equipment and systems. 2005.
203. . IEC 60870-5: Telecontrol equipment and system. 2007.
204. ICT4SMARTDG. ICT Solutions to enable Smart Distributed Generation. 2011.
205. International Atomic Energy Agency (IAEA). IAEA Technical Meeting on Newly Arising
Threats
in
Cybersecurity
of
Nuclear
Facilities.
[Online]
2011.
http://www.iaea.org/NuclearPower/Downloads/Engineering/files/InfoSheetCybersecurityTM-May-2011.pdf.
206.
Energie
Vortex.
http://www.energyvortex.com.
[Online]
http://www.energyvortex.com/energydictionary/blackout__brownout__brown_power__rolli
ng_blackout.html.
207. IRRIIS Project. Homepage of the IRRIIS project. [Online] 2006. http://www.irriis.org.
208. Department of Homeland Security (DHS). Homeland Security Presidential Directive-7.
[Online] 2003. http://www.dhs.gov/xabout/laws/gc_1214597989952.shtm#1.
84
treatment
systems.
s.l. :
211. Swedish Civil Contingencies Agency (MSB). Guide to Increased Security in Industrial
Control Systems. Swedish Civil Contingencies Agency. 2010.
212. Commission of the European communities. Green paper. On a European programme for
critical infrastructure protection COM(2005) 576 final. 2005.
213. National Infrastructure Security Coordination Centre (NISCC). Good Practice Guide
Process Control and SCADA Security. PA Consulting Group. 2006.
214. . Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks.
British Columbia Institute of Technology (BCIT). 2005.
215. McAfee. Global Energy Cyberattacks: Night Dragon. [Online] 2011.
http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-nightdragon.pdf.
216. National Infrastructure Security Coordination Centre (NISCC). Firewall deployment for
scada and process control networks. good practice guide. National Infrastructure Security
Coordination Centre. 2005.
217. Centre for the Protection of National Infrastructure (CPNI). Firewall deployment for
scada and process control networks. Centre for the Protection of National Infrastructure.
2005.
218. National Institute of Standards and Technology (NIST). FIPS PUB 199. Standards for
Security Categorization of Federal Information and Information Systems. [Online] 2004.
http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf.
219. . Field Device Protection Profile for SCADA Systems in Medium Robustness
Environments. 2006.
220. EU Commission Task Force for Smart Grids. Expert Group 1: Functionalities of smart grids
and smart meters. 2010.
221.
The
White
House.
Executive
http://www.fas.org/irp/offdocs/eo/eo-13231.htm.
Order
13231.
[Online]
2001.
[Online]
Storage.
[Online]
http://energy.gov/oe/technology-
228. Department of Energy (DoE). Energy Infrastructure Risk Management Checklists for
Small and Medium Sized Energy Facilities. Department of Energy. 2002.
229. Energy Independence and Security Act of 2007. s.l. : http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=110_cong_bills&docid=f:h6enr.txt.pdf, 2007.
230.
Energiened.
Energiened
Documentation.
http://www.energiened.nl/Content/Publications/Publications.aspx.
[Online]
231. U.S. Department of Energy. Electricity sector cyber-security risk management process
guideline. 2011.
232. Government Accountability Office (GAO). Electricity grid modernization. Progress Being
Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed. s.l. :
http://www.gao.gov/new.items/d11117.pdf, 2011.
233. Smarter Grid Solutions. Dynamic Line Rating - managing capacity. [Online]
http://www.smartergridsolutions.com/index.html?pid=153.
234. National Institute of Standards and Technology (NIST). Draft NIST Framework and
Roadmap for Smart Grid Interoperability Standards, Release 2.0. 2011.
235. DLMS User Association. DLMS/COSEM: Conformance Testing Process. 2010.
236. . DLMS/COSEM: Architecture and Protocols. 2009.
237.
Wikipedia.
Distribution
mangagement
http://en.wikipedia.org/wiki/Distribution_mangagement_system.
system.
[Online]
List.
[Online]
240. Department of Homeland Security (DHS). DHS officials: Stuxnet can morph into new
threat. [Online] 2011. http://www.homelandsecuritynewswire.com/dhs-officials-stuxnet-canmorph-new-threat.
86
CRitical
Utility
InfrastructurAL
resilience.
[Online]
2006.
245. Thales. Critical Infrastructure Security. A Holistic Security Risk Management Approach.
s.l. :
http://www.securitymanagement.com.au/content/file/CriticalISThales.pdf?asm=ad05637d37
e2a8c1afeeda016804c85, 2008.
246. United States General Accounting Office (GAO). Critical infrastructure protection.
Challenges and Efforts to Secure Control Systems. United States General Accounting Office.
2004.
247. CI2RCO Project. Critical information infrastructure research coordination. [Online] 2008.
http://cordis.europa.eu/fetch?CALLER=PROJ_ICT&ACTION=D&CAT=PROJ&RCN=79305.
248. SINTEF. CRIOP: A scenario method for Crisis Intervention and Operability analysis. 2011.
249. Centre for the Protection of Critical Infrastructure (CPNI). CPNI. [Online]
http://www.cpni.gov.uk/advice/infosec/business-systems/scada.
250. Commission of the European communities. Council directive 2008/114/EC of 8
December 2008 on the identification and designation of European critical infrastructures and
the assessment of the need to improve their protection. 2008.
251. Council decision on a Critical Infrastructure Warning Information Network (CIWIN)
COM(2008) 676. Commission of the European communities. 2008.
252. DLMS User Association. COSEM: Identification System and Interface Classes. 2010.
253. . COSEM: Glossary of Terms. 2003.
254. Department of Energy (DoE). Control Systems Security Publications Library. [Online]
http://energy.gov/oe/control-systems-security-publications-library.
255. United States Computer Emergency Readiness Team (US-CERT). Control Systems
Security Program: Industrial Control Systems Joint Working Group. [Online] http://www.uscert.gov/control_systems/icsjwg/index.html.
256. . Control Systems Security Program: Industrial Control Systems Cyber Emergency
Response Team. [Online] http://www.us-cert.gov/control_systems/ics-cert/.
257. Interstate Natural Gas Association of America (INGAA). Control Systems Cyber Security
Guidelines for the Natural Gas Pipeline Industry. Interstate Natural Gas Association of
America. 2011.
258. ICT4SMARTDG. Consensus on ICT solutions for a Smart Distribution at Domestic Level.
2011.
259. Centre for the Protection of National Infrastructure (CPNI). Configuring & managing
remote access for industrial control systems. Centre for the Protection of National
Infrastructure. 2011.
260. Commission of the European communities. Communication from the commission.
Energy infrastructure priorities for 2020 and beyond A Blueprint for an integrated European
energy network. COM(2010) 677. 2010.
261. . Communication from the commission to the european parliament, the council, the
european economic and social committee and the committee of the regions: A Digital Agenda
for Europe. COM(2010)245 final. 2010.
262. . Communication from the commission to the european parliament, the council, the
european economic and social committee and the committee of the regions. Energy 2020: A
strategy for competitive, sustainable and secure energy. COM(2010) 639 final. 2010.
263. . Communication from the commission to the european parliament, the council, the
european economic and social committee and the committee of the regions. Digital Agenda
for Europe. COM(2010) 245. 2010.
264. . Communication from the commission to the council, the European parliament, the
European economic and social commitee and the commitee of the regions. A strategy for a
Secure Information Society 'Dialogue, partnership and empowerment' COM(2006) 251. 2006.
265. . Communication from the commission to the council and the European parliament.
Prevention, preparedness and response to terrorist attacks COM(2004) 698 final. 2004.
266. . Communication from the commission to the council and the European parliament.
Critical Infrastructure Protection in the fight against terrorism COM(2004) 702 final. 2004.
267. . Communication from the commission on a European Programme for Critical
Infrastructure Protection COM(2006) 786. 2006.
268. North American Electric Reliability Corporation (NERC). CIP-009-4: Cyber Security
Recovery Plans for Critical Cyber Assets. North American Electric Reliability Corporation
(NERC). 2011.
269. . CIP-008-4: Cyber Security Incident Reporting and Response Planning. North
American Electric Reliability Corporation. 2011.
270. . CIP-007-4: Cyber Security Systems Security Management. North American Electric
Reliability Corporation. 2011.
88
289. American Gas Association (AGA). AGA Report No. 12, Cryptographic Protection of SCADA
Communications. Part 2 Performance Test Plan. American Gas Association. 2006.
290. . AGA Report No. 12, Cryptographic Protection of SCADA Communications. Part 1
Background, policies and test plan. American Gas Association. 2006.
291. Wikipedia. Advanced Distribution Automation. [Online] [Cited: 02 01 2012.]
http://en.wikipedia.org/wiki/Advanced_Distribution_Automation.
292. IBM Global Services. A Strategic Approach to Protecting SCADA and Process Control
Systems. 2007.
293. Europe 2020. A resource-efficient Europe Flagship initiative of the Europe 2020
Strategy. [Online] http://ec.europa.eu/resource-efficient-europe/index_en.htm.
294. EOS Energy Infrastructure Protection & Resilience Working Group. A global european
approach for energy infrastructure protection & resilience. s.l. : http://www.eoseu.com/LinkClick.aspx?fileticket=DEvuI/4l1jU=&tabid=232, 2009.
295. Department of Energy (DoE). 21 Steps to Improve Cyber Security of SCADA Networks.
Department of Energy.
296. Security of Industrial Control Systems, What to Look For. Zwan, Erwin van der. 2010,
ISACA Journal Online.
297. IEC. IEC TS 62351-5: Power systems management and associated information exchange
Data and.
298. En. [Online]
299. Taylor, Dr. Gary. DEVELOPING NOVEL ICT BASED SOLUTIONS FOR SMART DISTRIBUTION
NETWORK
OPERATION.
[Online]
http://dea.brunel.ac.uk/hiperdno/files/UPEC%202010%20HiPerDNO%20Project%20Presentati
on.pdf.
300. NIST -SGIP. SGIP Catalog of Standards. [Online] 2012. http://collaborate.nist.gov/twikisggrid/bin/view/SmartGrid/SGIPCatalogOfStandards.
90
13 Abbreviations
ACER
ADA
AMI
AMR/AMM
ANSI
AoR
BAN
BPL
C&DM
CC
CEN
CENELEC
CEO
CERT
CIA
CIWIN
C-level
CO2
COTS
CS
CZ
DAE
DCA
DE
DER
DG ENER
DK
DLF/DLE
DLMS/COSEM
DLR
DMS
DoS
DPF
DSE
DSM
DSO
EACI
EC
ECI
EG
EII
EISAS
EL
EMS
ENISA
ENTSO
EP3R
EPCIP
ES
ESI
ETN
ETP
ETP
ETSI
EU
EV
FAN
FDIR
FP7
FTP
GDP
GHG
GIS
GPRS
HAN
HMI
HPC
HTTP
HTTPS
HVDC
HW
IAC
IAN
ICS
ICT
IE
IEC
European Commission
European Critical Infrastructures
Expert Group
European Industrial Initiatives
European Information Sharing and Alert System
Greek
Energy Management System
European Network and Information Security Agency
European Network of Transmission System Operators for Electricity
European Public Private Partnership for Resilience
European Programme for Critical Infrastructure Protection
Spain
Energy service interface
Electrical Transmission Network
Executive Training Programme
European Technology Platform
European Telecommunications Standards Institute
European Union
Electric Vehicle
Field Area Network
Fault Detection Isolation and Restoration
Framework Programme 7
File Transfer Protocol
Gross domestic product
Greenhouse Gas
geographic Information system
General Packet Radio Service
Home Area Network
Human Machine Interface
High Performance Computing
Hypertext Transfer Protocol
Hypertext Transfer Protocol Secure
High-Voltage Direct Current
Hardware
Integrity, Availability, Confidentiality
Industrial Area Networks
Industrial Control Systems
Information and communications technology
Information Exchange
International Electrotechnical Commission
92
PMU
PP
QoS
R&D
RBAC
RF
RISI
RMP
RTD
RTP
RTU
SCADA
SES
SFTP
SG
SGIS
SIEM
SL
SMART
SOC
SSH
ST
SW
TCP/IP
Telnet
TF
TOE
TP
TSO
UK
USA/US
USB
VPN
WAAPCA
WAMS
WAN
WASA
WG
WMD
94