Evolving Cybersecurity Issues in the Utility Industry: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 24: Line 24:
   
   
Key Findings:
Key Findings:
*Cybersecurity oversight for utilities at all levels is unclear and requires consolidation and  
*Cybersecurity oversight for utilities at all levels is unclear and requires consolidation and development.  
development.  
*Cybersecurity and physical security for utilities are critical, but neither is well-defined technologically or in policy terms.  
*Cybersecurity and physical security for utilities are critical, but neither is well-defined  
*While traditional IT cybersecurity can provide a foundation, utility operations security does have distinct differences due to environment and requirements.  
technologically or in policy terms.  
*Too much discussion about smart-grid security, supervisory control and data acquisition (SCADA) security, advanced metering infrastructure (AMI) security, or securing  
*While traditional IT cybersecurity can provide a foundation, utility operations security  
"cyberassets" focuses inordinately on the technical standards and products rather than on delivering a solution.  
does have distinct differences due to environment and requirements.  
*Too much discussion about smart-grid security, supervisory control and data acquisition  
(SCADA) security, advanced metering infrastructure (AMI) security, or securing  
"cyberassets" focuses inordinately on the technical standards and products rather than  
on delivering a solution.  




==Additional Notes and Highlights==
==Additional Notes and Highlights==

Revision as of 10:22, 17 June 2010

Full Title of Reference

Evolving Cybersecurity Issues in the Utility Industry

Full Citation

Earl Perkins, Evolving Cybersecurity Issues in the Utility Industry, published by Gartner Research, 20 August 2009. Purchase

BibTeX

Categorization

Issues: Private Critical Infrastructure, Electrical Grid, Water, Sewer, etc., Public-Private Cooperation

Key Words

Information Infrastructure, Interdependencies

Synopsis

This research explores significant cybersecurity issues for global utilities and offers a means to address them. It is past time to implement a top-down approach to address utility cybersecurity.

Key Findings:

  • Cybersecurity oversight for utilities at all levels is unclear and requires consolidation and development.
  • Cybersecurity and physical security for utilities are critical, but neither is well-defined technologically or in policy terms.
  • While traditional IT cybersecurity can provide a foundation, utility operations security does have distinct differences due to environment and requirements.
  • Too much discussion about smart-grid security, supervisory control and data acquisition (SCADA) security, advanced metering infrastructure (AMI) security, or securing

"cyberassets" focuses inordinately on the technical standards and products rather than on delivering a solution.


Additional Notes and Highlights