TY - BOOK AU - Knapp,Eric D. AU - Samani,Raj TI - Applied cyber security and the smart grid: implementing security controls into the modern power infrastructure SN - 9781597499989 (pbk.) AV - TK3105 .K63 2013 U1 - 621.310285/58 23 PY - 2013///] CY - Amsterdam PB - Elsevier, Syngress KW - Smart power grids KW - Security measures KW - Computer networks N1 - Includes bibliographical references and index; Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary N2 - "Understanding how the Smart Grid works first requires an understanding of how industrial networks operate, which in turn requires a basic understanding of the underlying communications protocols that are used, where they are used, and why. There are many systems that comprise the larger system of the "Smart Grid," which utilize both common and open protocols as well as many highly specialized protocols used for industrial automation and control, most of which are designed for efficiency and reliability to support the economic and operational requirements of large distributed control systems. Similarly, industrial protocols are designed for real-time operation requiring deterministic results with continuous availability. Combined together, this blend of open and proprietary networks enables the much larger network of measurements, controls, metering and automation that is the Smart Grid. This amalgam of disparate systems and networks is also a major factor in the cyber security concerns facing the Smart Grid today"-- ER -