Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastru by Zofia LukszoSecuring Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastru by Zofia Lukszo

Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication…

EditorZofia Lukszo, Geert Deconinck, Margot P. C. Weijnen

Paperback | May 4, 2012

Pricing and Purchase Info

$204.18 online 
$232.95 list price save 12%
Earn 1021 plum® points
Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

The electricity infrastructure is one of society's most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of market-based power exchanges between electricity systems, the associated market restructuring and an increasing share of decentralized generation. As a consequence, the organizational complexity of power systems has exploded. At the same time, there is a shift in public and societal goals towards low-carbon and sustainable power generation. This will eventually require a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation and for facilitating markets. A recent example is demand-side management, based on detailed metering of consumption and decentralized electricity generation.The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether accidental or intentional such as in cyber attacks, are called for.To address the above mentioned problems an advanced research workshop: "Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT" was organized in the Netherlands in May 2009. The objective of the workshop was to contribute to the security of current and future electricity infrastructures by analyzing the risks that are caused by the increasing reliance upon ICT and investigating options for managing these risks. The book presents the contributions to the workshop by distinguished invited keynote speakers and participants from the international scientific and industrial community.
Title:Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication…Format:PaperbackDimensions:193 pages, 9.25 × 6.1 × 0 inPublished:May 4, 2012Publisher:Springer NetherlandsLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:9400731566

ISBN - 13:9789400731561

Look for similar items by category:

Reviews

Table of Contents

1. Introduction, by Z. Lukszo, M. Weijnen,G. Deconinck; 2. The future of electricity systems: general trends, developments (not yet focused on ICT), by M. llic; 3.Dependency on Electricity and Telecommunications, by B. Robert and L. Morabito ; 4. Critical interrelations between ICT and the electricity system, by J. Bialek; 5. The investigation by the US Government Accountability Office into the inadequate ICT security practices of Tennessee Valley Authority, one of the USA's largest electric utilities, by G. Wilshusen and N. Barkakati; 6. Smart metering: opportunities and threats, by G. Deconcinck; 7. ICT control strategies for electricity infrastructures, by N. Hadjsaid; 8. Experience from the financial sector with consumer data and ICT security, by M.J.J. Smulders; 9. Governance: how and by whom should decisions about the role of ICT in electricity be made?, by M. Masera; 10. Reflection: What does this mean for electricity network development and regulation?, by M. Masera and L. J. de Vries; 11. Conclusions, by G. Deconink, Z. Lukszo and M. Weijnen