Читать книгу Building an Effective Security Program for Distributed Energy Resources and Systems - Mariana Hentea - Страница 81

2.3.2 Advancing Cybersecurity and Privacy Design

Оглавление

Progress in cybersecurity for DER applications depends on achieved more quantitative and more visually understanding of the performance of the DER communications and control components, data and information characteristics, cyber infrastructure, business objectives, application requirements, security architecture design principles, data traffic patterns, vulnerabilities, and threats. Therefore, it is necessary to build cybersecurity and privacy by design into all DER systems and processes from the beginning. This saves on system life cycle development costs and protects organizations from expensive system modifications to meet the evolving threats.

Security by design and privacy by design are not new buzzwords; they are old principles to be applied by developers during development cycle. Security cannot be added to any system or application associated with power grid as an afterthought. There is a need to start from scratch, at the very beginning of any system development or technology integration, and consider privacy and security requirements in all design, test, and implementation criteria. Strategic consideration of these issues can make a huge difference in the confidence and protection that the overall system provides. This is necessary whether the design effort is focusing on DER applications, silicon chips, DER components, network components, end‐user devices, architecture, or the system as whole.

Building an Effective Security Program for Distributed Energy Resources and Systems

Подняться наверх