Research and Markets: Securing the Smart Grid - The Future of Energy
Nov 09, 2012 (M2 PRESSWIRE via COMTEX) --
Research and Markets (http://www.researchandmarkets.com/research/rjtjkg/securing_the) has announced the addition of Elsevier Science and Technology's new book "Securing the Smart Grid" to their offering.
Smart Grids are the future of energy. By creating networks from power plant to home, utility companies will be able to regulate power consumption making sure that consumers are receiving the amount that is needed, no more or less. While this new use of networking technology and unique applications such as smart meters will help to conserve energy it also opens up a pipeline, that was regulated manually, into the computer world of interconnected networks. The infrastructure that is being built will need to have robust security as an attack on this network could create chaos to tens of thousands of power consumers, stop a utility company in its tracks, or be used in a cyberwar.
Securing the Smart Grid takes a look at grid security today, how it is developing and being deployed into now over 10 million households in the US alone. Direct attacks to smart meters as well as attacks via the networks will be detailed along with suggestions for defense against them. A framework for how security should be implemented throughout this growing system will be included directing security consultants, and system and network architects on how to keep the grid strong against attackers big and small.
- Details how old and new hacking techniques can be used against the grid and how to defend against them
- Discusses current security initiatives and how they fall short of what is needed
- Find out how hackers can use the new infrastructure against itself
Key Topics Covered:
Chapter 1: Smart Grid: What is it
Chapter 2: Threats and Impacts: Consumers
Chapter 3: Threats and Impacts: utility companies & Beyond
Chapter 4: Federal Effort to Secure Smart Grids
Chapter 5: State and Local Security Initiatives
Chapter 6: Public and Private Companies
Chapter 7: Attacking the Utility Companies
Chapter 8: Securing the Utility Companies
Chapter 9: Third-Party Services
Chapter 10: Mobile Applications
Chapter 11: Social Networking & The Smart Grid
Chapter 12: Home Area Network: Smart Meters
Chapter 13: Home Area Network: Smart Devices and Interfaces
Chapter 14: What's Next
For more information visit http://www.researchandmarkets.com/research/rjtjkg/securing_the
Source: Elsevier Science and Technology
Research and Markets,
Fax from USA: 646-607-1907
Fax from rest of the world: +353-1-481-1716
Sector: Computing and Technology (http://www.researchandmarkets.com/categories.asp cat_id=4&campaign_id=rjtjkg)
((M2 Communications disclaims all liability for information provided within M2 PressWIRE. Data supplied by named party/parties. Further information on M2 PressWIRE can be obtained at http://www.presswire.net on the world wide web. Inquiries to email@example.com.
[ InfoTech Spotlight's Homepage ]