Add abstract
Want to add your dissertation abstract to this database? It only takes a minute!
Search abstract
Search for abstracts by subject, author or institution
Want to add your dissertation abstract to this database? It only takes a minute!
Search for abstracts by subject, author or institution
Advanced metering infrastructure reference model with automated cyber security analysis
by Rikard Blom
Institution: | KTH |
---|---|
Year: | 2017 |
Keywords: | Advanced Metering infrastructure; AMI; Smart meter infrastructure; smart meter; securiCAD; DSO; Enterprise architecture; system architecture; architecture analysis; cyber security analysis; network security; Electrical Engineering, Electronic Engine |
Posted: | 02/01/2018 |
Record ID: | 2183402 |
Full text PDF: | http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204910 |
European Union has set a target to install nearly 200 million smart metersspread over Europe before 2020, this leads into a vast increase of sensitiveinformation flow for Distribution System Operators (DSOs), simultaneously thisleads to raised cyber security threats. The in and outgoing information of the DSOneeds to be processed and stored by different Information technology (IT)- andOperational Technology (OT)-systems depending on the information. High demandsare therefore required of the enterprise cyber security to be able to protect theenterprise IT- and OT-systems. Sensitive customer information and a variety ofservices and functionality is examples that could be fatal to a DSO if compromised.For instance, if someone with bad intentions has the possibility to tinker with yourelectricity, while youre away on holiday. If they succeed with the attack and shuttingdown the house electricity, your food stored in your fridge and freezer would mostlikely to be rotted, additionally damage from defrost water leaking could cause severedamaging on walls and floors. In this thesis, a detailed reference model of theadvanced metering architecture (AMI) has been produced to support enterprisesinvolved in the process of implementing smart meter architecture and to adapt to newrequirements regarding cyber security. This has been conduct using foreseeti's toolsecuriCAD, foreseeti is a proactive cyber security company using architecturemanagement. SecuriCAD is a modeling tool that can conduct cyber security analysis,where the user can see how long time it would take for a professional penetrationtester to penetrate the systems in the model depending of the set up and defenseattributes of the architecture. By varying defense mechanisms of the systems, fourscenarios have been defined and used to formulate recommendations based oncalculations of the advanced meter architecture. Recommendation in brief: Use smalland distinct network zones with strict communication rules between them. Do diligentsecurity arrangements for the system administrator PC. The usage of IntrusionProtection System (IPS) in the right fashion can delay the attacker with a percentageof 46% or greater. Europeiska Unionen har satt upp ett ml att installera nra 200miljoner smarta elmtare innan r 2020, spritt utver Europa, implementeringen ledertill en rejl kning av knsliga dataflden fr El-distributrer och intresset av cyberattacker kar. Bde ingende och utgende information behver processas och lagrasp olika IT- och OT-system beroende p informationen. Hga krav gllande ITskerhet stlls fr att skydda till exempel knslig kundinformation samt en mngdvarierande tjnster och funktioner som r implementerade i systemen. Typer avattacker r till exempel om ngon lyckats f kontroll over eltillgngligheten och skullestnga av elektriciteten till hushll vilket skulle till exempel leda till allvarligafuktskador till fljd av lckage frn frysen. I den hr uppsatsen s har en tillrckligtdetaljerad referens modell fr smart elmtar
Want to add your dissertation abstract to this database? It only takes a minute!
Search for abstracts by subject, author or institution
Electric Cooperative Managers' Strategies to Enhan...
|
|
Bullied!
Coping with Workplace Bullying
|
|
The Filipina-South Floridian International Interne...
Agency, Culture, and Paradox
|
|
Solution or Stalemate?
Peace Process in Turkey, 2009-2013
|
|
Performance, Managerial Skill, and Factor Exposure...
|
|
The Deritualization of Death
Toward a Practical Theology of Caregiving for the ...
|
|
Emotional Intelligence and Leadership Styles
Exploring the Relationship between Emotional Intel...
|
|
Commodification of Sexual Labor
Contribution of Internet Communities to Prostituti...
|
|
The Census of Warm Debris Disks in the Solar Neigh...
|
|
Risk Factors and Business Models
Understanding the Five Forces of Entrepreneurial R...
|
|