1.2. The Structure of a Smart Grid System
1.3. The Two Key Challenges to be Solved by Smart Grids
1.4. Smart Grid Applications and their Critical Nature
1.5. Challenges in Smart Grid Security
1.6. The Storyline of this Book
2.2. The Dutch Case Study: A Smart Grid Roll-Out that Neglected Individual Interests
2.3. The Smart Grid: A Socially Complex Phenomenon with a Surveillance Dimension
2.4. Privacy and Personal Data Protection in the European Legal Order
2.5. Privacy Testing and Data Protection Testing of Smart Grids
2.6. Regulating Smart Grids in Europe: A “Light” Approach to Personal Data Protection
2.7. The EU “Light” Regulatory Approach to Personal Data Protection in Smart Grids: An Evaluation
Chapter 3: The Evolution of the Smart Grid Threat Landscape and Cross-Domain Risk Assessment
3.2. Smart Grid Architectures: The Basics
3.3. Smart Grid threat Landscape
3.4. Smart Grid Risk Assessment
Chapter 4: Resilience Against Physical Attacks
4.3. Basic Protection Mechanisms
4.4. Hardware Security Modules
4.5. Integrity Protection and Attestation
4.6. Physical Uncloneable Functions
Chapter 5: Secure Communications in Smart Grid: Networking and Protocols
5.2. Smart Grid Communication Standards
5.3. Attacking Smart Grid Network Communications
5.4. Approaches to Smart Grid Network Communication Security
Chapter 6: Cyber-Secure and Resilient Architectures for Industrial Control Systems
6.2. Design of Cyber-secure and Resilient Industrial Control Systems
6.3. Cyber Security Challenges in Electric Power Systems
6.4. Case Studies: Risk Assessment for False-Data Injection Attacks on Power Systems
Chapter 7: Establishing a Smart Grid Security Architecture
7.2. Adopting a Smart Grid Security Architecture Methodology
7.3. Defining your Smart Grid Security Architecture
7.4. Moving from Architecture to Design
7.5. Validating your Smart Grid Security Architecture
Chapter 8: Secure Development Life Cycle
8.2. The Secure System Development Lifecycle
8.3. Security Assurance Standards
8.4. Safety-Critical System Development and Best Practices
8.5. Secure Development Activities
Chapter 9: Operational Smart Grid Security
9.1. Introduction to the Operational Smart Grid Security Model
9.2. Visibility: Cyber Intelligence and Information Sharing
9.3. Analytics: Deriving Patterns and Understanding Anomalies
9.4. Action: Mitigation, Remediation and Recovery
9.5. The Human Factor as Asset
9.6. Conclusion: Security Shared is Security Strengthened
10.2. Sustainable Building Integrated Energy Test-Beds
10.3. Security Measures and Protection Mechanisms
10.4. Anticipated Results: Smart Grid Test-Bed Use-Cases
18.224.62.105