Читать книгу Building an Effective Security Program for Distributed Energy Resources and Systems - Mariana Hentea - Страница 85

2.4.1 Forces Shaping Cybersecurity

Оглавление

Cybersecurity progress requires understanding of all its aspects as a vector quantity including the forces shaping its evolution as identified in [Agresti 2010]:

 Rebranding exercise means cybersecurity is replacing information security and information assurance as the term of choice; this move promises an engagement with the public.

 Organizational imperative means that offering information assurance in cyberspace, although infeasible, might be required because of assets ownership changes in contracts and service agreements with outside parties.

 Cyberspace domain redefinition means becoming part of a virtual world that:Refers to the virtual environment of information and interactions between people [FERC 2009]Includes the physical world such as CPS and IoT [NSF 2014], [Lee 2010], [IoT], [EC‐EPoSS 2008]In this context, the Smart Grid and process control systems are types of CPS [CPS 2014], and smart meters and home automation are examples of the IoT applications.

 National defense priority requires securing cyberspace, which is a matter of survival for any nation; one strategy is providing new interaction models such as engaging the public and private sectors to collaborate on the protection of critical infrastructures.

Figure 2.13 is a view of these forces categorized as style (rebranding) and substance (organizational imperative, cyberspace domain, and national defense priority). These forces require us to consider new tasks to include engaging the public, externalizing (globalization) the organization, understanding the virtual domain, and establishing protection strategies for critical infrastructures. Due to cyberspace prominence and collaboration, securing cyberspace must be a personal, organizational, national, and global priority.


Figure 2.13 Forces shaping cybersecurity.

Source: [Agresti 2010]. © 2010, IEEE.

Energy sector users and organizations need to succeed in understanding these forces including disturbances created by emerging technologies and trends.

Building an Effective Security Program for Distributed Energy Resources and Systems

Подняться наверх