您好,欢迎访问三七文档
当前位置:首页 > 商业/管理/HR > 信息化管理 > Smart Electric Power Systems
©2009 No part of this presentation may be reproduced in any formwithout prior authorization.Smart Electric Power Systems: Smart Electric Power Systems: Toward More Toward More SecureSecure, Resilient, Robust and , Resilient, Robust and Smart SelfSmart Self‐‐healing Infrastructurehealing InfrastructureFaculty: Professors Massoud Aminand Bruce Wollenberg PhD Candidates/Research Assistants: Anthony GiacomoniLaurie Miller, and Sara MullenUniversity of Minnesota Center for Smart Grid TechnologiesDepartment of Electrical& Computer Engineeringpresented by:S. Massoud Amin, D.Sc.Director, Technological Leadership InstituteHoneywell/H.W. Sweatt Chair in Technological LeadershipProfessor of Electrical& Computer EngineeringSupportfromEPRI,NSF,ORNL,andUniversityofMinnesotastart-upresearchfundingforthisworkisgratefullyacknowledged.©2009 No part of this presentation may be reproduced in any formwithout prior authorization.Security©2009 No part of this presentation may be reproduced in any formwithout prior authorization.Context: Threats to SecuritySources of VulnerabilityIntentionalIntentionalhumanactshumanactsNetworkNetworkMarketMarketInformationInformation&decisions&decisionsNaturalNaturalcalamitiescalamitiesInternalInternalSourcesSourcesExternalExternalSourcesSources•Transformer,linereactors,seriescapacitors,transmissionlines...•ProtectionofALLthewidelydiverseanddispersedassetsisimpractical--202,835milesofHVlines(230kVandabove--6,644transformersinEasternIntercon.•ControlCenters•Interdependence:Gaspipelines,compressorstations,etc.;Dams;Raillines;Telecom–monitoring&controlofsystem•Combinationsoftheaboveandmoreusingavarietyofweapons:•Truckbombs;Smallairplanes;Gunshots–lineinsulators,transformers;moresophisticatedmodesofattack…•Hijackingofcontrol•Biologicalcontamination(realorthreat)•Over-reactiontoisolatedincidents•InternetAttacks•Over80,000hits/dayatanISO•Storms,Earthquakes,Forestfires&grasslandfires…Lossofmajorequipment–especiallytransformers…“…forwantofahorseshoenail…CommunicationCommunicationSystemsSystems©2009 No part of this presentation may be reproduced in any formwithout prior authorization.Unconventional Threats to SecurityConnectivityComplexity©2009 No part of this presentation may be reproduced in any formwithout prior authorization.Context: IT interdependencies and impactDependence on IT:Today’s systems require a tightly knit information and communications capability. Because of the vulnerability of Internet communications, protecting the system will require new technology to enhance security of power system command, control, and communications.Increasing Complexity:System integration, increased complexity: call for new approaches to simplify the operation of complex infrastructure and make them more robust to attacks and interruptions.Centralization and Decentralization of Control:The vulnerabilities of centralized control seem to demand smaller, local system configurations. Resilience rely upon the ability to bridge top‐‐down and bottom‐up decision making in real time.Assessing the Most Effective Security Investments:Probabilistic assessments can offer strategic guidance on where and how to deploy securityresources to greatest advantage.©2009 No part of this presentation may be reproduced in any formwithout prior authorization.Threat Evolution: Malicious CodeHoursTimeWeeksormonthsDaysMinutesSecondsClassIIHumanresponse:difficult/impossibleAutomatedresponse:possibleEarly1990sMid1990sLate1990s20002003ClassIIIHumanresponse:impossibleAutomatedresponse:unlikelyProactiveblocking:possibleContagionTimeframeFileVirusesMacroVirusese-mailWormsBlendedThreats“Warhol”Threats“Flash”ThreatsClassIHumanresponse:possible©2009 No part of this presentation may be reproduced in any formwithout prior authorization.The Threat SituationContinuing serious cyber attacks on information systems,large and small; targeting key federal, state, local, andprivate sector operations and assets…Attacks are organized, disciplined, aggressive, and well resourced; many are extremely sophisticated.Adversaries are nation states, terrorist groups, criminals, hackers, and individuals or groups with intentions of compromising federal information systems.Effective deployment of malicious software causing significant exfiltration of sensitive information (including intellectual property) and potential for disruption of critical information systems/services.‐‐Dr. Ron RossNIST, Computer Security DivisionInformation Technology Laboratory©2009 No part of this presentation may be reproduced in any formwithout prior authorization.Context: The North American Economy is Dependent on Electronic Communications•North America uses:–42% of world’s computing power–60% of world’s Internet assets–90% of large & 75% of small companies have Local Area Networks•Number* of documented computer attacks increasing‐‐from about 2,100 in 1997, 3,700 (1998), 9,800 (1999), 21,750 (2000), to 52,600 in 2001–Costs* of Worldwide economic impact (in billions of dollars): •1999: Expl
本文标题:Smart Electric Power Systems
链接地址:https://www.777doc.com/doc-5455662 .html