Securing Electricity Supply in the Cyber Age [electronic resource] : Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure / edited by Zofia Lukszo, Geert Deconinck, Margot P. C. Weijnen.

By: Lukszo, Zofia [editor.]Contributor(s): Deconinck, Geert [editor.] | Weijnen, Margot P. C [editor.] | SpringerLink (Online service)Material type: TextTextLanguage: English Series: Topics in Safety, Risk, Reliability and Quality: 15Publisher: Dordrecht : Springer Netherlands, 2010Description: VI, 187p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9789048135943Subject(s): Engineering | System safety | Telecommunication | Systems engineering | Electric engineering | Economic policy | Technology | Engineering | Energy Technology | Communications Engineering, Networks | Quality Control, Reliability, Safety and Risk | Circuits and Systems | Technology Management | Economic PolicyAdditional physical formats: Printed edition:: No titleDDC classification: 621.042 LOC classification: TK1001-1841Online resources: Click here to access online In: Springer eBooksSummary: The electricity infrastructure is one of society’s most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of trade within and between electricity systems, the associated market restructuring and an increasing share of decentralized generation. At the same time, there is a shift in public goals towards low-carbon and sustainable power generation. This requires a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation as well as for facilitating markets. A recent example is demand-side management, which requires detailed metering of consumption and decentralized electricity generation. The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether accidental or intentional such as in cyber attacks, are called for. These problems were addressed at an advanced research workshop, titled "Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT", which was organized in the Netherlands in May 2009. The objective of the workshop was to contribute to the security of current and future electricity infrastructures by analyzing the risks that are caused by the increasing reliance upon ICT and investigating options for managing these risks. This book presents the contributions to the workshop by distinguished invited keynote speakers and participants from the international scientific and industrial community.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

The electricity infrastructure is one of society’s most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of trade within and between electricity systems, the associated market restructuring and an increasing share of decentralized generation. At the same time, there is a shift in public goals towards low-carbon and sustainable power generation. This requires a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation as well as for facilitating markets. A recent example is demand-side management, which requires detailed metering of consumption and decentralized electricity generation. The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether accidental or intentional such as in cyber attacks, are called for. These problems were addressed at an advanced research workshop, titled "Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT", which was organized in the Netherlands in May 2009. The objective of the workshop was to contribute to the security of current and future electricity infrastructures by analyzing the risks that are caused by the increasing reliance upon ICT and investigating options for managing these risks. This book presents the contributions to the workshop by distinguished invited keynote speakers and participants from the international scientific and industrial community.

There are no comments on this title.

to post a comment.

Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha