“The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject – a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!.”– Dr. Patrick Engebretson, Assistant Professor of Computer Security, Dakota State University.
“Easy to read and full of valuable information, this book provides a wide-eyed view of our future and the security challenges we will be facing in our day-to-day lives. Exploring everything from home systems to large-scale power plants, this is a must-read for everyone in our technological society.”– Thomas Wilhelm, ISSMP, CISSP, SCSECA, SCNA, SCSA, IEM, IAM
Smart Grids are the future of energy. By creating networks from power plant to home, utility companies will be able to regulate power consumption making sure that consumers are receiving the amount that is needed, no more or less. While this new use of networking technology and unique applications such as smart meters will help to conserve energy it also opens up a pipeline, that was regulated manually, into the computer world of interconnected networks. The infrastructure that is being built will need to have robust security as an attack on this network could create chaos to tens of thousands of power consumers, stop a utility company in its tracks, or be used in a cyberwar.
Securing the Smart Grid takes a look at grid security today, how it is developing and being deployed into now over 10 million households in the US alone. Direct attacks to smart meters as well as attacks via the networks will be detailed along with suggestions for defense against them. A framework for how security should be implemented throughout this growing system will be included directing security consultants, and system and network architects on how to keep the grid strong against attackers big and small.
- Details how old and new hacking techniques can be used against the grid and how to defend against them
- Discusses current security initiatives and how they fall short of what is needed
- Find out how hackers can use the new infrastructure against itself
Click here to buy from Amazon
Increasingly, the power of a large, complex, wired nation like the United States rests on its ability to disrupt would-be cyber attacks and to be resilient against a successful attack or recurring campaign. Addressing the concerns of both theorists and those on the national security front lines, Chris C. Demchak presents a unified strategy for survival in an interconnected, ever-messier, more surprising cybered world and examines the institutional adaptations required of our defense, intelligence, energy, and other critical sectors for national security.
Demchak introduces a strategy of “security resilience” against surprise attacks for a cybered world that is divided between modern, digitally vulnerable city-states and more dysfunctional global regions. Its key concepts build on theories of international relations, complexity in social-technical systems, and organizational-institutional adaptation. Demchak tests the strategy for reasonableness in history’s few examples of states disrupting rather than conquering and being resilient to attacks, including ancient Athens and Sparta, several British colonial wars, and two American limited wars. She applies the strategy to modern political, social, and technical challenges and presents three kinds of institutional adaptation that predicate the success of the security resilience strategy in response. Finally, Demchak discusses implications for the future including new forms of cyber aggression like the Stuxnet worm, the rise of the cyber-command concept, and the competition between the U.S. and China as global cyber leaders.
Wars of Disruption and Resilience offers a blueprint for a national cyber-power strategy that is long in time horizon, flexible in target and scale, and practical enough to maintain the security of a digitized nation facing violent cybered conflict.
Click here to buy from Amazon
The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks on the cyber infrastructure by network predators. The lack of security as a core element in the initial design of these information systems has made common desktop software, infrastructure services, and information networks increasingly vulnerable to continuous and innovative breakers of security. Worms, viruses, and spam are examples of attacks that cost the global economy billions of dollars in lost productivity. Sophisticated distributed denial of service (DDoS) attacks that use thousands of web robots (bots) on the Internet and telecommunications networks are on the rise. The ramifications of these attacks are clear: the potential for a devastating largescale network failure, service interruption, or the total unavailability of service. Yet many security programs are based solely on reactive measures, such as the patching of software or the detection of attacks that have already occurred, instead of proactive measures that prevent attacks in the first place. Most of the network security configurations are performed manually and require experts to monitor, tune security devices, and recover from attacks. On the other hand, attacks are getting more sophisticated and highly automated, which gives the attackers an advantage in this technology race. A key contribution of this book is that it provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It covers not only strategy and policy issues, but it also covers social, legal, and technical aspects of cyber security as well. We strongly recommend this book for policymakers and researchers so that they may stay abreast of the latest research and develop a greater understanding of cyber security issues.
Click here to buy from Amazon