Evolving Cybersecurity Issues in the Utility Industry: Difference between revisions
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
==Full Citation== | ==Full Citation== | ||
Earl Perkins, ''Evolving Cybersecurity Issues in the Utility Industry'', published by Gartner Research, 20 August 2009. | Earl Perkins, ''Evolving Cybersecurity Issues in the Utility Industry'', published by Gartner Research, 20 August 2009. [http://www.gartner.com/DisplayDocument?id=1142512 ''Purchase''] | ||
[http://www.gartner.com/DisplayDocument?id=1142512 ''Purchase''] | |||
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=Perkins2009&f=wikibiblio.bib ''BibTeX''] | [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=Perkins2009&f=wikibiblio.bib ''BibTeX''] |
Revision as of 09:21, 17 June 2010
Full Title of Reference
Evolving Cybersecurity Issues in the Utility Industry
Full Citation
Earl Perkins, Evolving Cybersecurity Issues in the Utility Industry, published by Gartner Research, 20 August 2009. Purchase
Categorization
Issues: Private Critical Infrastructure, Electrical Grid, Water, Sewer, etc., Public-Private Cooperation
Key Words
Information Infrastructure, Interdependencies
Synopsis
This research explores significant cybersecurity issues for global utilities and offers a means to address them. It is past time to implement a top-down approach to address utility cybersecurity.
Key Findings:
- Cybersecurity oversight for utilities at all levels is unclear and requires consolidation and
development.
- Cybersecurity and physical security for utilities are critical, but neither is well-defined
technologically or in policy terms.
- While traditional IT cybersecurity can provide a foundation, utility operations security
does have distinct differences due to environment and requirements.
- Too much discussion about smart-grid security, supervisory control and data acquisition
(SCADA) security, advanced metering infrastructure (AMI) security, or securing "cyberassets" focuses inordinately on the technical standards and products rather than on delivering a solution.