Difference between revisions of "Evolving Cybersecurity Issues in the Utility Industry"

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Full Title of Reference== Evolving Cybersecurity Issues in the Utility Industry ==Full Citation== Earl Perkins, ''Evolving Cybersecurity Issues in the Utility Industry'', published by...)
Line 17: Line 17:
==Key Words==  
==Key Words==  
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Intelligence_Infrastructure.2FInformation_Infrastructure Information Infrastructure]  
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Intelligence_Infrastructure.2FInformation_Infrastructure Information Infrastructure], [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Interdependencies Interdependencies]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Interdependencies Interdependencies]

Revision as of 14:21, 17 June 2010

Full Title of Reference

Evolving Cybersecurity Issues in the Utility Industry

Full Citation

Earl Perkins, Evolving Cybersecurity Issues in the Utility Industry, published by Gartner Research, 20 August 2009.




Issues: Private Critical Infrastructure, Electrical Grid, Water, Sewer, etc., Public-Private Cooperation

Key Words

Information Infrastructure, Interdependencies


This research explores significant cybersecurity issues for global utilities and offers a means to address them. It is past time to implement a top-down approach to address utility cybersecurity.

Key Findings:

  • Cybersecurity oversight for utilities at all levels is unclear and requires consolidation and


  • Cybersecurity and physical security for utilities are critical, but neither is well-defined

technologically or in policy terms.

  • While traditional IT cybersecurity can provide a foundation, utility operations security

does have distinct differences due to environment and requirements.

  • Too much discussion about smart-grid security, supervisory control and data acquisition

(SCADA) security, advanced metering infrastructure (AMI) security, or securing "cyberassets" focuses inordinately on the technical standards and products rather than on delivering a solution.

Additional Notes and Highlights