You are on page 1of 8

Journal Online

Evolving Perimeter Information Security
Naresh Kurada, CISA,
MSEE, P.Eng., is a senior
consultant at KPMG LLP,
Toronto, Canada. Kurada
can be reached at nkurada@
Models in Smart Grids and Utilities
In September 2012, Telvent, the smart-grid framework for smart-grid perimeter (network
giant owned by Schneider Electric, reported that edge) devices, with an eye for adapting the
A. Alex Dhanjal, P.Eng., is
hackers broke through its firewall and security lessons learned from other information sensitive
a partner at KPMG Canada.
systems with breaches on OASyS SCADA. industries. At the same time, the article presents
Dhanjal can be reached at
Telvent uses the same system to control various and compares the evolving last-mile information
power grids, oil and gas pipelines, and industrial security models to the North American Electric
controls around the world and integrate with Reliability Corporation (NERC) Critical
Bala Venkatesh, Ph.D.,
utility enterprise systems and new smart-grid Infrastructure Protection (CIP) Reliability
P.Eng., is an associate
platforms.1 Incidents such as this, the Stuxnet Standards (CIP-002-4 through CIP-009-4). This
professor and academic
worm, the night dragon attacks and cyberhacking contextualization provides the specific boundaries
director for the Center for
for sport are being highly monetized and targeted for the treatment of information security for the
Urban Energy, Ryerson
toward the power and utility industry’s assets. value players in the last-mile transmission and
University (Toronto, Ontario,
In this case, a major part of the existing distribution operations of a smart grid.
Canada). Venkatesh can be
electric grid architecture and infrastructure
reached at
components in the operations of the distribution THE SMART-GRID VALUE NETWORK
electric networks are relatively basic without The National Institute of Standards and
advanced information analytics and resultant Technology (NIST) has developed the NIST
self-healing capabilities for power redistribution. Smart Grid Framework 1.0 as a reference model
However, as these grid infrastructure components for all other smart-grid architectures.
are fitted with information and communications Figure 1 reveals the stakeholders and illustrates
technology (ICT) for analytics and self-healing a high-level landscape of the interplay among
capabilities, the entire grid becomes even more the various players of the value network. The
susceptible to malicious attacks. Further, a recent value network players are the various technical
survey of 213 utility and smart-grid professionals equipment manufacturers that develop control,
revealed that 65 percent of executives believe that communications, monitoring and analytics
the technology most vulnerable to cyberattacks products within and across domains. Additionally,
is grid operations and information technologies. the technology standards committees and
It is estimated that cumulative investments in regulatory bodies are the other stakeholders.
smart-grid cybersecurity alone will total Interestingly, the demands in the 21st century for
US $14 billion through 2018. This is cleaner energy have given rise to new stakeholders
notwithstanding the US $200 billion investment who normally tap renewable energy sources such
in global smart grids, which includes a US $53 as wind and solar energy to generate power. The
billion investment in the US alone by 2015.2, 3 industry terms these stakeholders distributed
The existing electric-grid architecture is energy generators (DG). The DGs are incentivized
relatively a linear model with clear boundaries by government programs such as feed-in-traffic
among generation, transmission and distribution (FIT) programs that sell and supply energy to
of power. However, the smart-grid architecture consumers (and utilities) using the existing power-
brings about a paradigm shift from the linear to a grid infrastructure. Depending on the size, DGs
distributed energy-generation model. Therefore, normally tap into transmission and distribution
to devise a conceptual smart-grid security networks. The consumer is the ultimate
architecture, it is necessary to contextualize the stakeholder with demands for efficient and
smart-grid business with respect to the value smarter power consumption, including charging
network and the stakeholders. electric vehicles.
This article introduces and puts into
perspective the last-mile InfoSec Frames

©2013 ISACA. All rights reserved. ISACA JOURNAL Volume 4, 2013 1

Additionally. bus-bars. key objective of information security in smart-grid networks Compromises to the control data and signals can significantly is to protect human life and ensure system reliability during alter the state of the grid and negatively affect the reliable power generation.pdf ENTERPRISE NETWORK AND SMART-GRID NETWORK SECURITY the less important analytical data (such as for metering and Unlike traditional information security in enterprise networks. availability must ensure protection of data for safe and reliable Consequently. www. which emphasize economics as electrical isolation and protection relays. economics and. the very critical nature of generating and delivering asset is critical for the reliable operation of the grid. delivery of power. NIST Framework and Roadmap for Smart Grid Interoperability Standards. Figure 1—Practical Layout of the Key Value Players in the Value Network ENERGY REGULATION.isaca. the the transmission and distribution of power within the grid. command and control. the focus of information security in the capacitor banks. and efficiency. critical fact clearly differentiates and high-availability www. transmission and distribution.4 and reliability is set for utilities and normally overrides other In addition to the general enterprise networks. systems such as enterprise resource planning (ERP) systems quality of power. The smart-grid perimeter devices generate intelligent machine-to-machine communications for reliable 2 ISACA JOURNAL Volume 4.nist. With the smart grid. on protecting data. representing dynamic and compromised. feeders. 2013 ©2013 ISACA. efficiency purposes) and the more important control data for which has as its primary objective the protection of data. the smart-grid network asset power and electricity encompass every aspect of human society has a higher value than the information it generates because the and nations. the business precedence for human safety grid operation. Furthermore. devices and systems become numerous active perimeter information security has to primarily address what will happen devices of the smart-grid network and leverage ICT for to the electrical state of the grid when one of its devices is analytics. therefore. Release 1. This simple. In general. manufacturing and banking.0. electric grids have a variety of the utilities from other enterprise business networks such as critical energy storage and switching devices and systems such retail. power establishes a business objective that requires 100 percent the information security tenets of confidentiality. pole-mounted transformers. unlike the systems of enterprise switchgears. All rights reserved. networks where the information security is primarily focused flexible alternating current transmission systems (FACTS). STANDARDS AND EQUIPMENT MANUFACTURERS BULK POWER CONSUMER GENERATOR TRANSMISSION SERVICE PROVIDER DISTRIBUTION SERVICE PROVIDER GRID GRID BPG OPERATIONS TRANSMISSION OPERATIONS DISTRIBUTION OPERATIONS INFORMATION AND COMMUNICATION NETWORKS FOR SMART GRID OPERATIONS AND MANAGEMENT Source: Adapted from the National Institute of Standards and Technology. In smart-grid networks. January 2010. NIST Special Publication 1108. in some instances. with attributes such as efficiency. power transformers. integrity and reliable availability and delivery of power at any . these smart-grid network is multifaceted. and auxiliaries.

to models of information security architecture. and special protection systems that support the reliable operation of the BES and protection systems.1 The processes and mechanisms shall use an access control model that denies access by default such that explicit access permissions must be specified. •R  1. in a manner that identifies.3 Communication links connecting discrete electronic security perimeters shall not be considered part of the electronic security perimeter.nerc. the BES cybersystem can be viewed as a grouping of critical cyberassets and includes control centers and a backup control center. as per CIP-002-5. including Blackstart Resources. data requirements. integrity and availability of information during transit and no corroboration and/or benchmark frameworks exist for residency. definitions and frameworks for the protection modeling and treatment. standard CIP-007-4 requirements R1 and R3 through R9. 2. modifying. standard CIP-008-4. Source: North American Electric Reliability Corporation (NERC). •R  2. transmission stations and substations. when the information criteria have system-to-system trust models.php?cid=2|20 ©2013 ISACA. replacing or removing critical cyberasset hardware or software.g. 3. and standard CIP-009-4. and asset management because of of cyberassets in support of reliable operation of the bulk the scale and scope of the large number of active devices. Compliance requirements of standard CIP-010-1: • R1 Each responsible entity shall implement.5 Cyberassets used in the access control and/or monitoring of the electronic security perimeter shall be afforded the protective measures as specified in standard CIP-003-4. Critical Information Protection.or vendor-related changes to hardware and software components of critical cyberassets pursuant to the change control process. assesses and corrects deficiencies. (especially for perimeter devices) is in its infancy. data modeling and treatment. www.2 At all access points to the electronic security perimeter. the responsible entity shall enable only ports and services required for operations and for monitoring cyberassets within the electronic security perimeter and shall document. for the purposes of this article’s challenges for all of the players in the value network. • R4 The responsible entity shall perform a cybervulnerability assessment of the electronic access points to the electronic security perimeter at least annually. these compliance requirements can be easily and asset management that pose practical implementation mapped to COBIT® and. the configuration of those ports and services. individually or by specified grouping. Compliance requirements of standard of CIP-005-4a are: •R  1. • R2. unlike enterprise networks.. • R3 The responsible entity shall implement and document an electronic or manual process(es) for monitoring and logging access at access points to the electronic security perimeter 24/7. Compliance requirements of standard CIP-002-4a (Critical Cyberasset Identification): • R2 Critical cyberassets are qualified as those assets having at least one of the following characteristics: – Uses a routable protocol to communicate outside the electronic security perimeter – Uses a routable protocol within a control center – Is dial-up accessible Furthermore. However. 4. systems and facilities critical to system restoration. Therefore. dial-up modems) terminating at any device within the electronic security perimeter(s). been established.5 Figure 2—Requirements From NERC CIP Standards 1. focus. standard CIP-006-4c requirement R3. The requirements from pertinent standards are listed in figure 2. and implement supporting configuration management activities to identify. developing a balance between NERC CRITICAL INFORMATION PROTECTION STANDARDS information security and reliable grid operation is a unique NERC has developed the CIP standards to set the compliance challenge for establishing system-to-system trust models. control and document all entity. one or more documented processes that collectively include each of the applicable requirement parts in CIP-010-1. end points of these communication links within the electronic security perimeter shall be considered access points to the electronic security perimeter. standard CIP-005-4a requirements R2 and R3. generation resources. Compliance requirements of standard CIP-003-3: • R1 Cybersecurity policy—The responsible entity shall document and implement a cybersecurity policy that represents management’s commitment and ability to secure its critical cyberassets. •R  1. standard CIP-004-4 requirement R3. electric system (BES). Analyses of these standards reveal Finally. cranking paths and initial switching requirements. www. All rights reserved. Furthermore.1 Access points to the electronic security perimeter(s) shall include any externally connected communication end point (e. 2013 3 . the smart-grid network that they are generally accepted principles of confidentiality. • R6 Change control and configuration management—The responsible entity shall establish and document a process of change control and configuration management for adding.isaca.grid operation. as ISACA JOURNAL Volume

11 Furthermore. In addition. Examples of such effectiveness are as independent networks. are technically flexible with capabilities to encapsulate or As these devices and systems begin to evolve into active tunnel existing grid communication protocols such as devices in the smart grid. purposes. and the power through alternative paths.7. numerous substations and automation controls are networked together equipment manufacturers either have attempted or are over Ethernet or serial communication ports using protocols attempting to evolve BES by leveraging the technical such as IEC 61850 communications standards. INTEROPERABILITY WITH EXISTING GRID TECHNOLOGIES of improved efficiency and effectiveness of reliable power The current communication and control of the devices that generation. they provide a uniform data and system-to-system trust models for analytics as abstraction of the network that hides the differences among well as control. 10. The existing intelligent electronic self-healing power networks realized by redistribution of devices (IEDs).org .12. Control Center/SCADA Systems Technologies Acces s Tec hnolo gies Smart Substation Mic row ave RF Com Substation mu LAN on nica Modbus/DNP3 tion Substation LAN on Modbus/DNP3 Smart Substation 4 ISACA JOURNAL Volume 4. the The Transmission Control Protocol/Internet Protocol current power grid wide area networks (WANs) also utilize (TCP/IP) stack and the widely available WAN technologies power line communication and dark fiber. grid asset maintenance supervisory control and data acquisition (SCADA) systems in and advanced asset monitoring. Network Protocol (DNP 3) and Modbus. DNP3 and foreseen with respect to creating efficient and optimized Modbus. distribution and transmission when these systems make up the existing grid and BES are localized and operate can be interconnected.isaca. 8. the remote terminal units (RTUs). All rights reserved. Consequently.6 Distributed flexibility of the Internet Protocol (IP) and WAN technologies. These technical challenges are in addition various network technologies. This evolution has led to the creation of be generated for meaningful warehousing and mining communication network setups (see figure 3). the opportunities are huge in terms Figure 3—Smart-grid ICT Energy Service Provider Enterprise Systems and Networks GRID Master Energy Consumption Energy Demand Response Control System Analytics Management Systems WAN Public/Private Network Service Providers LANX/Frame Relay ATM/ MPLS/VPN/Power Line IP/Internet Access IP\Int IP/Internet Access Technologies ernet Communications. 13 facilitating enhanced to the management of the huge amount of data that could interoperability. 2013 ©2013 ISACA. www. numerous challenges can be IEC 61850 communication standards. 9. However. Etc.

The controls. form subnetworks of neighborhood area networks emerging. with low asset value. important compared to availability. the information security treatment of the perimeter devices each device’s criticality for the safe operation of the grid is that fits into the subnetwork architectures of the smart-grid relatively low. 16 Examples of IEDs are electrical isolation and Risk: Analytical data generated by the devices protection relays. Furthermore. Home to Grid (H2G) and security characteristics similar to point of sale (POS) in the Industrial to Grid (I2G). The security risk for the network. (NANs). HANs or smart-utility networks (SUNs). on the surface. Typically. architectures of networks of devices are evolving in Furthermore. these devices typically attach to the power accordance to the NERC CIP Reliability Standards. Generally. and auxiliaries.14 retail industry. the framework facilitates confidentiality. The emergence and organization of smart. are directly deployed along the electrical Application criticality: Trust and nonrepudiation grid. field area networks (FANs) and customer billing and in-direct outage monitoring.isaca. Application criticality: Human safety and reliable capacitor banks. InfoSec Frames (figure 4) specifically describes reliable operation of the grid is normally confined to the data the security treatment for the subnetwork architectures for and not the device. All rights reserved. distributed energy generation and Numerous devices such as smart energy meters (advanced storage make their respective IEDs suitable candidates for FAN metering infrastructure [AMI]). The data operation from these devices typically involve. the data are quite critical for home area networks (HANs). To further grid networks is also evidenced by the NIST. such devices are part Application criticality: Human safety and reliable of power transmission and distribution networks. However. Therefore. Although. The energy-demand forecasting (demand-response systems). bus-bars. and the grouping of these devices is InfoSec Frames is an information security framework for in accordance with CIP-005-4a and CIP-002-4a. organization of the network and these devices are networked together with utilities communication architectures based on criticality (electrical demand-response and energy-forecasting systems and. chaotic and amorphous. communication and control of switching operation of devices (systems) and status parameters devices such as oil temperature levels in transformers. pole-mounted transformers. www. switching and control). power FAN High Very high Very high transformers. different conceptual involve power consumption and feed as analytics for architectural models are beginning to emerge. for example. a FACTS. the devices in subnetworks of NANs Department of Energy-led GridWise Domain Expert Working and HANs of the smart grid network have information Groups of Building to Grid (B2G). home energy classification because their criticality is higher on the grid. the FAN elements of the smart grid Risk: The communication and control of devices are networked together and leverage the TCP/IP stack for CN Very high Very high Very high communications and control. such network setups seem machine-to-machine (M2M) communications. Concept of NANs. HANs and SUNs the evolution of renewable. In essence. generation and consumption is ultimately. control networks (CNs). water heaters. feeders. switchgears.and the US put into perspective. these devices Frames) Confidentiality Integrity Availability (also known as IEDs) are localized to electrical substations HAN/SUN/NAN High High Medium to low and.15. 2013 5 . with slightly heightened security (to protect individual power consumption profiles) and extensive SECURITY ARCHITECTURE IN SMART GRIDS useful-device life. distribution networks. Nevertheless. Just as in the case of HAN/ operation SUN network elements. Figure 4—InfoSec Frames for Smart-grid Networks Concept of FANs FANs essentially comprise energy-transformation and Architecture (InfoSec switching devices with intelligence. HVAC and plug-in hybrid electric vehicles (PHEV) security risk for the reliable operation of the grid is normally the are leveraging TCP/IP smart objects with capabilities of ©2013 ISACA. integrity and nonrepudiation of data are abstraction with a common set of security attributes. control of Risk: The network. to an extent. The data from these devices typically As the smart-grid models ISACA JOURNAL Volume 4. In addition.

17 Consequently. control and communication). can be mitigated with existing security features already specified by the protocol or by leveraging the security services offered Concept of CNs by other Internet Engineering Task Force (IETF) protocols. All rights reserved. SCADA systems normally have • Physical and data link layer security—The IEDs in FANs associated systems for human machine interfacing (HMI) and. especially in FAN devices and CN systems and compromises to them could seriously alter the state of 2. due diligence has to be afforded to establish system-to-system and user-to-system trust models. the common range of attacks and availability on communication networks are all important for vulnerabilities apply. integrity and availability of FANs. Therefore. the vulnerabilities of IP for the smart grid accomplished using SCADA systems and programmable are grouped as follows: logic controllers (PLCs). Additionally. Finally.. Individuals/systems that have access to the data out using instruments such as potential transformers (PT) 3. which given for: includes analytics. 1. transformers is an indirect . VLANs. 2013 ©2013 ISACA. threats 6 ISACA JOURNAL Volume 4. identify switching. they can be distributed in substations interference (EMI) implications when the communication or centrally control multiple substations. That is. Control of transmission and distribution devices of 19.e. Smart-grid information security should be established on the • Network and transport layer security—As the devices in foundations of confidentiality. 20 Just as in the traditional Open Systems Interconnect (OSI) transformers and relays along the electric grid is normally seven-layer models. These instruments transmit 4. satellite). consideration must be the entire control subnetwork of the smart grid. form some of the most cellular. in which confidentiality. The intention for capturing and transmitting data critical data about the state and analytical information of the Once these are clearly established. They can control and operate environmental conditions. The type of data being transmitted such as device control. they normally have to be highly address spoofing. 1. 3. no matter how they are deployed. However. measurement of electrical characteristics of device management traffic and data traffic (including voltage. Consideration must be given to securing available and highly secure. communication and control of the device and the device itself. they are subject to MAC power. Consequently. substation CNs are deployed in harsh and trending (e. precedence is set to transformers. channel is established wirelessly (i. as shown in figure 3. Historian). Avoidance of single-point-of-communication link failure These three points become extremely important when TECHNOLOGY THREATS AND CONSIDERATIONS IN SMART GRIDS wireless SCADA systems are deployed. The origin and destination of the data and current transformers (CT). This has particular electromagnetic and requirements. cellular and satellite communications. The security risk for the reliable wireless links (Wi-Fi and WiMax). Another vulnerability with wireless is important critical assets in a bulk energy system because of eavesdropping. control. Alternative paths for physical and logical the entire grid. current and phase from high voltage devices such as communications and control). integrity and stack. threats data for safe and reliable operation of the grid. all securing data (analytical. because they are directly involved in energy transformation and device status monitoring or analytical.g. microwave. Furthermore. and the devices generate strong a large number of devices. Therefore. over conventional WAN/LAN technologies on the TCP/IP 002-4a and CIP-002-5. which is normally carried 2. just as in operation of the grid is not just the control system but other information-sensitive systems. www. SCADA systems are advance systems and redundancy such as sourcing services from different can be deployed using wireless technology built on private telecommunications service providers microwave radios.18. data are being transmitted Grouping of these devices into FANs is a consequence of CIP. IP spoofing.. Separating management traffic from data traffic to separate CNs essentially control large subnetworks of the smart grid. Depending on the technical goals electromagnetic fields. it is at the network and transport layer are denial-of-service critical to identify and rationalize: (DoS) attacks by TCP SYN flooding. these attacks and vulnerabilities reliable operation. transform and redistribute leverage Ethernet technology. as most of the devices in FANs their ability to directly control. SCADA systems. communications and devices. NANs and CNs run on the TCP/IP stack. Furthermore. to an extent.

network services such as Domain Name System (DNS). firewalls and next-generation firewalls provide mitigation techniques to CONCLUSION detect DoS attacks and IP spoofing with capabilities to block As smart grids evolve. SUNs. such that explicit access permissions must be specified. ISACA JOURNAL Volume 4. the reliable operation of the electric grid has end-user power consumption ©2013 ISACA. for information security and audit professionals. Critical Information Protection. forward functions and illustrations of role-based groupings of devices as they align web applications. nature of devices in critical infrastructure and the role they they may utilize power-line communications. B. without compromising performance. However. they are experiencing the proliferation TCP/UDP ports and ensure TCP session state integrity using of perimeter devices with uncontrolled intelligence along the stateful firewalls. All rights processes and mechanisms shall use an access control ip-enabled-smart-objects-and-smart-g-7465 model that denies access by default. cellular and engineers. Loffler..mckinseyquarterly. Simple www. principle as per the NERC CIP requirements is. In logging—from the enterprise networks to these devices. O. www. due consideration must of knowledge for power-grid infrastructure into perspective be taken to prevent exposure to eavesdropping. When these systems are deployed between information security practitioners and power wirelessly through private microwave radios. 27 Augugst 2010. Roberts. in some instances. access and authentication—As the Chui. NAN devices—much contain the threats. they will utilize enterprise North American Electric Reliability Corporation (NERC).” smart grid evolves. for user access to systems and system-to-system access. B. like smartphones and tablets—have operating systems. R. IEC 61850 Protocol API precedent for establishing information security trust models User Manual: Protocol Integration Stack. Therefore. “The www. For all these network services. TCP/IP stack. the guiding Objects and the Smart Grid. resulting in information security issues for safe be given to routing traffic through firewalls. REFERENCES • Network services. The primary play in generating. and access and traceability and alter the routing table database or overload the processor. and reliable distribution of power.isaca. the devices on FANs. “A New Revolution Part 2: IP Enabled Smart authentication. Dynamic Host Configuration Protocol (DHCP). due traditionally been a discipline within electrical engineering consideration must be given to ensure that the application and power systems engineering.sensorsmag. In FAN and CN devices. M. as the existing gateways are within the utility provider’s enterprise network electric grid evolves into the smart grid. especially of the application data in transit.” Sensors. HANs. M. www. and threats to IP Efforts must be made to extend the established security routing protocols. March 2010. CNs will align to the Internet of Things running on the www. on well-known TCP and UDP ports. These devices typically connect to the with the Internet of Things for smart-grid networks.php?cid=2|20 Network Management Protocol (SNMP). This article outlines the • Application layer security—Application layer security is threats to information security practitioners and assurance specifically relevant to CN systems (such as SCADA) and professionals and suggests the use of InfoSec Frames to NAN devices (such as Smart Meters). Naval. CNs and FANs are architectural embedded databases for storage. This article puts the regulatory and technical bodies satellite communications.nettedautomation. Myers. threat with NANs is exploiting vulnerabilities to determine Furthermore. The distribution and transmission networks and other analytic security risk profiles in smart grids are different from those of systems in the service provider utility through a gateway on traditional businesses and enterprise networks because of the the HTTPS service over the Internet or.” This requirement sets the Sreenivasan.. consideration must power grid.. NANs. the secure and DMZ and protected by firewalls. SCADA systems in general reliable operation of the electric grid becomes interdisciplinary are highly critical systems. 2013 7 . “The Internet Of Things. NANs and McKinsey Quarterly. transmitting and distributing power.nerc. The intent in all these cases is to either principles of authentication (dual-factor). accordance with NERC CIP-005-4a requirements.

.nerc.” case study.pdf 1 Zetter. 2011.alcatel-lucent. Sharif.scadalink. “Building the Smart Grid Promise. refer to for 2 Navigant Research. They may differ from policies and official statements of ISACA and/or the IT Governance Institute® and their committees. Send payment to the CCC stating the ISSN (1526-7407). p. Tipper. Grid Interoperability. reprint or republication. Cisco Connected Grid Security for Field 8 GridWise Architecture Council (GWAC).ruggedcom. Membership in the association.php smart-grid-cyber-security-to-total-14-billion-through-2018 12 Op cit. Rasmussen. and first and last page number of each article. Y.. NIST Special Publication 1108. “Smart Grid Area Network.nerc. www. Cisco Systems Inc. Michael. MA 01970. A Standardized and Flexible IPv6 16Mar2012_Final. All rights reserved. date.. Popper. N. For other copying. Where necessary. Op cit. 2011 Communication Networks and Systems in Substations: An 20 Op cit.pdf Architecture for Field Area Networks Smart: Grid Last Mile Infrastructure.” IEEE 15 Op cit.  18 Op cit. “Investments in Smart Grid Cyber Refurbishment of MEPSO High Voltage Substation in Security to Total $14 Billion Through 2018. www. 4. www. K.php?cid=2|20. C. case-studies/mepso/mepso. Cisco Systems Inc. 11-13 November public/si/pdf_smartBuilding.wired.html www. O. “A Survey on proceedings. D.isaca. Baker and Meyer 3 Roney. Capkun.” proceedings.” 2012 Communications Surveys & Tutorials.pdf www. 2012. vol. Salem. or the editors of this Journal. D. S. and from opinions endorsed by authors’ employers. Baker and Meyer Overview for Users. Copying for other than personal use or internal reference. Release 1 March 2012.50 per article plus 25¢ per page. 27 Congress St. energy/ ENDNOTES docs/energy/ip_arch_sg_wp. “KONCAR-KET Chooses Rugged. R.. D. for a flat fee of US $2. © 2013 ISACA.. www. or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly prohibited. “Internet Protocols for the Smart Hacked. Y. www. All rights reserved. NIST Tippenhauer. 14 GridWise Architecture Council (GWAC). Mackiewicz.” Alcatel-Lucent.. Cisco Systems Inc. Meyer. “Maker of Smart-Grid Control Software 10 Baker.” 4 Yan. entitles one to receive an annual subscription to the ISACA Journal. Yan. 5 For a comprehensive list of the NERC compliance “An Introduction to SCADA..gridwiseac. permission must be obtained in writing from the association. Baigent. 13 Op cit. www.. a voluntary organization serving IT governance professionals. p. www. Framework and Roadmap for Smart Grid Interoperability “On the Requirements for Successful GPS Spoofing Attacks.. 61850%20Protocol%20API%20User%20Manual. Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee.pdf Cyber Security for Smart Grid Communications.” GE Digital Energy The ISACA Journal is published by ISACA. “Ensuring Smart http://enterprise. no. F. volume.” 16 March 2012. 2011 16 fourth quarter 2012. H. Opinions expressed in the ISACA Journal represent the views of the authors and advertisers.. Cisco Systems Inc. 14.” requirements of standards.” Cisco Systems threatlevel/2012/09/scada-vendor-telvent-hacked 11 Rugged. B. “IEC 61850 6 19 Op cit. ISACA Journal does not attest to the originality of authors’ content.nist.pdf Cisco Systems Interoperability Maturity Model Summary. 2013 ©2013 . M. et al Challenge and Transformation.0.” 1 March Macedonia. Qian.. Communications Security.pdf 7 National Institute for Standards and Technology. to photocopy articles owned by ISACA. 2012 Adamiak..isaca. 26 September 2012. permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC).com/files/NERC_GridEx_AAR_ 9 Cisco Systems Inc. 998 17 Bentek Systems SCADA & Telemetry Solutions. 75-86 upload/ 8 ISACA JOURNAL Volume 4. Proceedings of the 18th ACM Conference on Computer and January 2010.