capstone team report -the vicious circle of smart grid security

11
1 The Vicious Circle of Smart Grid Security Justin A. Turner, Amit K. Barik, Reuben Mathew [email protected], [email protected], [email protected] A capstone paper submitted as partial fulfillment of the requirements for the degree of Masters in Interdisciplinary Telecommunications at the University of Colorado, Boulder, 3 May 2011. Project directed by Jose R. Santos. 1 Introduction The massive push for energy efficiency and conservation is driving rapid development and deployment of Smart Grid technology around the globe, effectively driving integration and connection of Supervisory Control and Data Acquisition (SCADA) systems closer and closer to the user edge. The resulting network is vast, complex and very similar to the Internet. This environment greatly increases the possibility of cyber-attacks (Ten, Liu, & Manimaran, 2008) by introducing attack vectors that were nonexistent in the past. This is a serious threat to the national power infrastructure that must be addressed. The tragic events surrounding the Fukushima Daiichi nuclear power plant following the massive 2011 earthquake in Japan underscore the importance of system availability and data integrity. Initial reports indicate that primary systems remained intact. Unfortunately, critical axillary systems and communications infrastructure are significantly damaged. Without these systems, the reactor core is on the edge of a catastrophic meltdown. In 2010, the Stuxnet worm discovered in an Iranian nuclear plant could have created a similar situation. Several reports suggest that damage was extensive enough that it will take several years to recover from. Stuxnet demonstrates how devastating that a highly sophisticated and focused cyber-attack can be to a power utility. “If the critical infrastructures of the world are to be safe and secure, then the owners and operators need to recognize that their control systems are now the target of sophisticated attacks. Improved defense-in-depth postures for industrial control systems are needed urgently. Waiting for the next worm may be too late.” (Byres, Ginter, & Langil, 2011) Unfortunately we are treading down a dangerous path. Actions taken by utility companies, equipment manufacturers and regulators are not adding up to form a safe and secure environment for which the “smart grid” needs to become a reality. We believe that in order for stakeholders to build an advanced, efficient and attack resilient smart grid, we must address considerable gaps that exist between each stakeholder. According to the Department of Energy, “if we approach issues of reliability, affordability, energy independence and grid security piecemeal, piecemeal solutions are all we will get.” (DoE, 2010) The statement is clear! Utilities, equipment manufacturers and regulators must work together to solve the cyber-security crisis that we are seeing unfold within the power industry today. 2 Methodology This paper will analyze the perspective of three critical stakeholders. We will start with the Utility companies, followed by Regulators responsible for developing policies to shape the industry and finish with a look at the equipment manufacturers. All parties have a critical role in delivering the smart grid; however each has a unique set of challenges with respect to addressing cyber-security. This paper seeks to identify the most critical gaps that exist between the stakeholders today. With a better understanding of the existing environment we can then make

Upload: reubenmathew

Post on 21-Jan-2018

73 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Capstone Team Report -The Vicious Circle of Smart Grid Security

1

The Vicious Circle of Smart Grid Security

Justin A. Turner, Amit K. Barik, Reuben Mathew

[email protected], [email protected], [email protected]

A capstone paper submitted as partial fulfillment of the requirements for the degree of

Masters in Interdisciplinary Telecommunications at the University of Colorado, Boulder,

3 May 2011. Project directed by Jose R. Santos.

1 Introduction

The massive push for energy efficiency and conservation is driving rapid development and deployment of Smart Grid technology around the globe, effectively driving integration and connection of Supervisory Control and Data Acquisition (SCADA) systems closer and closer to the user edge. The resulting network is vast, complex and very similar to the Internet. This environment greatly increases the possibility of cyber-attacks (Ten, Liu, & Manimaran, 2008) by introducing attack vectors that were nonexistent in the past. This is a serious threat to the national power infrastructure that must be addressed. The tragic events surrounding the Fukushima Daiichi nuclear power plant following the massive 2011 earthquake in Japan underscore the importance of system availability and data integrity. Initial reports indicate that primary systems remained intact. Unfortunately, critical axillary systems and communications infrastructure are significantly damaged. Without these systems, the reactor core is on the edge of a catastrophic meltdown. In 2010, the Stuxnet worm discovered in an Iranian nuclear plant could have created a similar situation. Several reports suggest that damage was extensive enough that it will take several years to recover from. Stuxnet demonstrates how devastating that a highly sophisticated and focused cyber-attack can be to a power utility. “If the critical infrastructures of the world are to be safe and secure, then the owners and operators need to recognize that their control systems are now the target of sophisticated attacks. Improved defense-in-depth postures for industrial control systems are needed urgently. Waiting for the next worm may be too late.” (Byres, Ginter, & Langil, 2011) Unfortunately we are treading down a dangerous path. Actions taken by utility companies, equipment manufacturers and regulators are not adding up to form a safe and secure environment for which the “smart grid” needs to become a reality. We believe that in order for stakeholders to build an advanced, efficient and attack resilient smart grid, we must address considerable gaps that exist between each stakeholder. According to the Department of Energy, “if we approach issues of reliability, affordability, energy independence and grid security piecemeal, piecemeal solutions are all we will get.” (DoE, 2010) The statement is clear! Utilities, equipment manufacturers and regulators must work together to solve the cyber-security crisis that we are seeing unfold within the power industry today.

2 Methodology

This paper will analyze the perspective of three critical stakeholders. We will start with the Utility companies, followed by Regulators responsible for developing policies to shape the industry and finish with a look at the equipment manufacturers. All parties have a critical role in delivering the smart grid; however each has a unique set of challenges with respect to addressing cyber-security. This paper seeks to identify the most critical gaps that exist between the stakeholders today. With a better understanding of the existing environment we can then make

Page 2: Capstone Team Report -The Vicious Circle of Smart Grid Security

2

recommendations to close gaps, improve awareness and ultimately the overall security posture of the smart grid going forward.

3 Analysis of Stakeholders

3.1 Utilities

Utilities in the United States are a mixture of public and private companies. Similar to other for profit businesses, they strive to maximize profits to survive in order to provide services to society. Currently, electric utility companies are leveraging U.S stimulus money to rapidly deploy smart meters throughout the U.S. (Mills, 2010). It can be inferred from current research, that utilities are expanding their markets by working on multiple smart grid projects simultaneously (Leeds, 2010). From a security perspective, this rapid deployment approach is troublesome as it decreases the amount of time to plan and deploy security measures. This in turn increases the cyber threat surface to the power grid by exposing new devices that are not fully vetted and secured.

According to a recent report, “U.S. based utilities will invest $21 billion by 2015 in cyber security related activities and technologies to protect the smart grid” (Pike Research, 2010). This is only a prediction; however this indicates the substantial monetary requirement for securing the grid. Even though the government is supporting utilities to some degree, small to mid-sized companies are not often capable of investing in their cyber-security infrastructure at high enough rates to maintain a good security posture. According to Bigger & Willingham, 2005, Small electric and gas utilities are concerned with what they see as “looming security requirements” that they cannot afford or that the results will not benefit their customers. This indirectly creates two possible scenarios which negatively affect the security posture of the entire smart grid. First, small utilities which are unable to rapidly invest in security will form weak links in the interconnected smart grid. Second, if smaller utilities have little to no influence over vendor decisions due to lack of spending ability, larger utilities will disproportionately influence manufacturing decisions. The resulting equipment options may not be suitable for smaller deployments and will force smaller utilities to selectively choose only core capabilities without advanced cyber-security options.

The rapid state of change combined with the monetary challenges highlighted above is creating a difficult environment in which utility cyber-security professionals are struggling to overcome. One of the major problems faced by utility companies is “explaining the technical advantages of cyber-security to their executives” (Wheatman, 2011). Finding metrics that show clear business advantages to investing in cyber-security are hard to find. This makes it increasingly difficult to justify what are in many cases mandated cyber-security practices. Cyber-security training programs can be expensive and are not always implemented willingly as a result. Additionally, there is a knowledge gap between IT security personnel and SCADA engineers. All of these challenges contribute to difficulties with implementing strong cyber-security practices and technologies within utilities (Clements & Kirkham, 2010).

Looking at security from another perspective, interoperability is one challenge that is widely recognized but largely unresolved. “The need for standards is urgent” (Lee, 2011). Defining standards and migrating towards them is important for the smart grid to become a reality, however combining various networks which operate on different standards exponentially

Page 3: Capstone Team Report -The Vicious Circle of Smart Grid Security

3

increases vulnerabilities. According to Idaho National Laboratory, 2006, “multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization”. If utilities had the luxury to implement a single vendor, single standard environment they would, however that will likely never be an option. The reality is that equipment manufacturers are focused on individual pieces of the larger smart grid puzzle. Until we have developed widely recognized standards that are economically feasible to adopt, the industry will be stuck in a vicious circle trying to balance proprietary vender technologies with increasing cyber threats.

From the utilities perspective a critically important security issue lies with the alarming increase in known vulnerabilities to the systems and networks that we depend on. Consider the Night-Dragon case (McAfee Foundstone Professional Services and McAfee Labs, 2011). The Night-Dragon, code named by MacAfee, emerged in November of 2009 in the U.S., Greece, Kazakhstan and Taiwan. According to McAfee Foundstone Professional Services and McAfee Labs, China was the origination point of this attack which exploited various utility companies targeting important proprietary information. The attack used the following methods to compromise and infiltrate systems:

• Targeted Command and Control systems (in U.S.) using social engineering techniques which confuse operators into erroneously providing information such as usernames and passwords.

• Used RAT and other available hacker tools (like ASPXSpy and WebShell) to compromise and penetrate security systems.

• Used SQL-injections to compromise firewalls and database systems.

• Gained access to executive workstations and other sensitive devices (all running Windows OS) using credentials gathered through social engineering efforts and know windows exploits.

The attack suggests that victim utilities did not follow a defense-in-depth security approach. The practice of isolating critical control systems using basic firewall configurations, considered by many utilities to be their cyber-security savior is an antiquated practice when used alone and was easily exploited by the Night-Dragon attack using common tools and techniques that take advantage of untrained and generally unaware users. This attack was sophisticated and deliberate in nature, indicating that basic measures for securing critical systems is not enough.

SCADA systems which sit at the heart of most utility company operations are increasingly targeted due to their known reputation for lackadaisical security controls. In 2010, Stuxnet revealed exactly how critical systems can become crippled by sophisticated attacks. Stuxnet is “malware made specifically for sabotaging SCADA processes using PCS7 and Siemens WinCC control systems” (Byres, Ginter, & Langil, 2011) . The Stuxnet attack which targeted nuclear power plants in Iran propagated using multiple vectors including USB flash drives, infected PDF files and unpatched hosts. Apart from considering all of the possible attack vectors used, it is important to know that targeted machines used for command and control of the worm were mainly Windows based. The worm took advantage of Windows vulnerabilities in order to infiltrate the network targeting specific models of Siemens control systems. The attack was not detected by antivirus software since signatures did not exist at the time of attack. Furthermore, the sophisticated design of the Stuxnet worm allowed it to “live on the victim’s network for a long time undetected while penetrating all the way through to reach critical control

Page 4: Capstone Team Report -The Vicious Circle of Smart Grid Security

4

systems.” (Malcho, Harley, Rodionov, & Matrosov, 2010) Many security researchers who have examined the Stuxnet worm believe it would successfully infiltrate utility networks in the U.S. today even if the victims followed all of the standards outlined by Siemens in their security best practices documentation. The Stuxnet attack is a clear indication that highly sophisticated and targeted attacks are a reality today. Utilities must not wait until the next attack occurs on a U.S. facility to take serious measures to secure their environments.

3.2 Regulators

Regulators have always played an important role in directing and shaping the landscape for which utilities and equipment manufacturers operate in any industry. In 2007, the Department of Energy was directed by the Energy Independence and Security act to “modernize the nation’s electricity grid to improve its reliability and efficiency.” (DoE, 2010) Since then, utilities and manufacturers have scrambled to begin shaping this new and rapidly changing environment now called the smart grid. This monumental task comes with great risk. Cyber-security considerations were not heavily measured when initial policies emerged directing and shaping the smart grid. Focus has improved, however it is increasingly clear that confusion and gaps among interested parties is prohibiting progress. The following diagram presented in a Depart of Energy briefing in March of 2011 visually depicts a confusing and difficult to follow landscape. Figure 1 below depicts government entities at the state and federal level, working groups, commissions, Industry associations and utilities.

Figure 1: Cyber Security Standards / Requirements relationship map (Hunteman, 2011)

Page 5: Capstone Team Report -The Vicious Circle of Smart Grid Security

5

As the title suggests, this map depicts the relationships between organizations involved in developing standards for manufacturers and utilities to follow in order to secure the smart grid. Context is missing from this diagram however in the briefing Mr. Hunteman specifically highlights several key challenges to addressing cyber-security for the smart grid which include inconsistent standards at the federal, state, and local levels; significant gaps between implementation of policies by Federal and State agencies and lack of clearly defined roles and responsibilities for cyber-security in the smart grid. This sentiment is shared by several utilities and equipment manufacturers who responded to the DoE’s request for comments on addressing policy and logistical challenges to smart grid implementation. For example Edison Electric Institute states in their response that “there is insufficient coordination among the many independent groups doing testing, or proposing to do testing, and that there should be a certifying body to oversee compliance with testing and certification procedures.” (EEI, 2010) Others such as Cisco systems commented that “various federal agencies involved in the creation of the Smart Grid and the standards on which it will be based can and should address risks as early as possible.” (Cisco, 2010) The Department of Energy web site contains over seventy five responses from equipment manufacturers and utilities, many of which repeat this sentiment over and over.

We can say a few things with certainty regarding the organizational structure of the

regulatory environment and smart grid cyber-security today. First, congress has directed the Department of Energy to lead the charge with development and implementation of the smart grid including cyber-security related issues as discussed above. Second, congress has charged the National Institute of Standards and Technology (NIST) with developing standards for smart grid technology and implementation. NIST issued standards and/or best practices for smart grid security in a 2010 document. The policy is a good attempt to lead utilities and equipment manufacturers in the right direction however several key pieces of information were not addressed. In the January 2011 Government Accountability Office (GAO) report titled “Electricity Grid Modernization” the GAO states that while NIST efforts to include missing pieces to policy are underway, “the plan and schedule are still in draft form.” “Until the missing elements are addressed, there is an increased risk that smart grid implementations will not be secure as otherwise possible.”

The Federal Energy Regulatory Commission (FERC) is a federal yet independent agency similar to the Federal Communications Commission and is charged with “regulation of public utility transmission and sales” (Greenfield, 2010). This is an oversimplified description of FERC responsibilities, but in their own words, FERCs authority to regulate does not include local distribution or resale. If the smart grid is supposed to be an end-to-end system, this policy must change.

The National Energy Reliability Commission (NERC) which is designated by FERC to develop reliability standards for bulk power generation and transmission within North America has published seventeen cyber-security guidelines to date. These guidelines fall under their Critical Infrastructure Protection (CIP) standards addressing critical asset identification, security management controls, personnel and training, electronic security parameters, physical security, systems security management, incident reporting and recovery management. NERC according to their Chief Information Officer Mark Weatherford, believes that CIP standards are having an impact. Industry experts agree with one caveat, which is that “utilities are focusing on regulatory

Page 6: Capstone Team Report -The Vicious Circle of Smart Grid Security

6

compliance instead of comprehensive security” (GAO, 2011). Regardless, NERC regulatory oversight governs bulk power generation and transmission only. To date there is no uniform regulation or cross cutting authority given to any agency to provide a common direction and oversight to smart grid cyber-security efforts.

3.3 Equipment Manufacturers

Equipment manufacturers have an important role in assisting utilities and regulators implement smart grid technologies. Similar to auto and computer manufacturers, they are the subject matter experts for the systems they sell and support. As such they play a key role in the development and employment of robust end-to-end cyber-security technology and policies with respect to the smart grid. During the onset of smart grid deployment, many service providers and manufacturers considered security only relevant to smart metering thus ignoring the attention required towards automation, substation, control systems and SCADA. Recent events such as Stuxnet already discussed in this paper have reinvigorated attention to these critical control systems that sit at the heart of power utilities.

It is not immediately clear what specific security concerns that equipment manufacturers have. For the purpose of discussion we consider open source information from Siemens, Cisco and others who all provide systems critical to the smart grid. Several manufacturers produce SCADA systems. One of the major players is Siemens who develops hardware, software and networking equipment for utilities. Siemens happened to be the system targeted by Stuxnet; however this paper in no way intends to cast blame on Siemens alone for exploits used by Stuxnet. A common Siemens control system is the SIMATIC PCS 7 product suite which is primarily a Distributed Control System (DCS) automation technology for process control systems is developed around a defense-in-depth strategy. The system uses security features like automated Windows security patch management, remote access using IPSec and VPNs, virus scans and firewalls, time synchronization, user and access rights, active directory and work groups, network management, disaster recovery and system segmentation. Siemens has a published framework describing best practices to secure their systems. Unfortunately this framework is “not often implemented in practice” (Byres, Ginter, & Langil, 2011) according to reports describing how Stuxnet infected and damaged critical control systems.

Cisco Systems who is a manufacturer of enterprise level network devices, strongly believes that in order to approach the modern smart grid infrastructure, “a comprehensive security architecture is a must that has improved integration of diverse digital devices, increased use of sensors, layers of physical and cyber security integrated across all operational aspects of the grid.” (Cisco, 2010) Cisco like Siemens has developed their own security framework with best practices as they see them for securing the smart grid. Figure 2 depicts the Cisco approach for developing a smart grid security plan.

Page 7: Capstone Team Report -The Vicious Circle of Smart Grid Security

7

Figure 2: Cisco Grid Security Implementation Model

This model loosely depicts the idea of wrapping layers of security around critical infrastructure. Cisco’s report goes on to describe their technologies and implementation strategies to protect and defend critical infrastructure. The challenge with the Cisco model along with Siemens or others is applying it to an environment where multiple vender technologies exist. In many cases, the interoperability gap will interfere with best practices described in their security guideline framework. Equipment manufacturers need to continue working on development of interoperable standards for the safety and security of the smart grid. In an ideal scenario, equipment manufacturers providing equipment for all portions of a utility network would be drawn into the plant development process in order to deliver a robust end-to-end security framework. This is a utopia scenario which assumes that manufacturers will work together in harmony and openly share information that is often times considered proprietary and sensitive in nature. We know this will likely never happen, however if manufacturers knew that utilities would generally choose a manufacturer based on their ability to integrate whole solutions which incorporated cross brand solutions, manufacturers would start working towards common standards. Cisco highlighted this in their response to the DoE’s RFI noting that “the convergence of networking industry participants on the TCP/IP standard was critical to the rapid evolution of the internet.” (Cisco, 2010) Similar behavior on the part of smart grid manufacturers will “play the same role in the emerging Smart Grid, by ensuring that utilities and their customers will benefit from choices among standards-compliant devices that together will comprise the Smart Grid.” (Cisco, 2010)

Page 8: Capstone Team Report -The Vicious Circle of Smart Grid Security

8

4 Recommendations

Through our analysis of the stakeholder positions, we concur with statements made in the very recent report released by the Government Accountability Office. Specifically, we believe that “key players have to work together as a team” (GAO, 2011) in order to secure the smart grid.

Figure 3: The Vicious Circle of Smart Grid Security

Figure 3 above graphically depicts the vicious circle of smart grid security as we see it today. Starting with utility companies, we see policies and requirements put in front of them by regulators which do not always come with clear direction or a supporting business case. Moving clockwise around the circle we see equipment manufacturers who are working to respond to the needs of utility companies demanding secure, cost effective and flexible solutions, but do not have a clear understanding of what is required or standards to develop to. Finally we see regulators working to develop and provide smart grid standards and security measures to manufacturers while pushing utilities to modernize and deliver the smart grid to society. It is a difficult problem that will take some time to correct.

Page 9: Capstone Team Report -The Vicious Circle of Smart Grid Security

9

We recommend the following actions at a minimum to help correct the security crisis that we are facing with respect to smart grid implementation:

i. Appoint or nominate a single authority with national reach to assess and measure compliance with security standards developed by NIST, NERC and any other federal authority appointed to develop cyber-security standards. This authority should have the ability to evaluate the entire grid from SCADA system to the household meter.

ii. Reconsider time tables outlined in guidelines used by utilities to secure government assistance in deployment of smart grid technologies. The sense of urgency to meet these deadlines to acquire funding is causing utilities and manufacturers to rush through what should be carefully thought out security plans and implementation testing.

iii. Create a testing and certification body which independently tests and evaluates systems and technologies to ensure security and standards compliance. Regulators (Governments) must clearly define standards for the testing body to use. Utilities and Equipment manufacturers must participate in the development of these standards without bias. Leverage the process used by the Department of Defense to test and certify communications systems (Joint Interoperability Testing and Certification)

iv. Develop an anonymous reporting and discussion forum where utilities,

manufacturers, government entities and possibly law enforcement authorities can exchange information and ideas freely without fear of recourse.

5 Conclusion

The cyber threats that we face today are very real and dangerous. We know that cyber-attacks like Night Dragon and Stuxnet will continue to occur as networked technologies are integrated with the power grid. We also know that new cyber vulnerabilities are emerging with increasing frequency. Overcoming these challenges will require the entire smart grid industry from utilities to equipment manufacturers to regulators to work together to form a secure end-to-end power grid. Having explained the challenges faced by three of the key players, we hope that our recommendations will generate more action across the industry at a minimum. Security is paramount and we are all responsible for ensuring it is sufficiently addressed to make the smart grid a reality.

Acknowledgement

Our research project was successfully completed with the efforts and guidance of numerous

people from academia and industry alike. We would like to thank our project mentor, Jose

Santos and advisor Prof. Stephen Barnes for all their time and valuable insights throughout every

stage of our project. We had two amazing opportunities to speak with the chief Cyber Security

advisor at the Department of Energy, Mr. William Hunteman and the Chief Security Officer at

the National Energy Reliability Corporation (NERC) Mr. Mark Weatherford. Each provided

Page 10: Capstone Team Report -The Vicious Circle of Smart Grid Security

10

volumes of important insight from multiple perspectives. They each provided some level of

confirmation of conclusions that we have drawn throughout this paper. We would also like to

thank Arun Gerra, Security Engineer at Alchemy Security, LLC for his inputs and industry

perspective of smart grid security. Finally, we would like to take this opportunity to sincerely

thank Prof. Tim Brown for all his patience and detailed guidance in completing this paper.

References

Bigger, J., & Willingham, M. (2005). Critical Infrastructure Protection in the National Capital Region.

George Mason University.

Byres, E., Ginter, A., & Langil, J. (2011). White Paper: How Stuxnet Spreads. Multiple Cities: White

Paper.

Cisco. (2010, April 3). Cisco Smart Grid Security Solutions. Retrieved April 4, 2011, from Cisco.com:

http://www.cisco.com/web/strategy/docs/energy/CiscoSmartGridSecurity_solutions_brief_c22-

556936.pdf

Cisco. (2010). Comments of Cisco Systems to Office of Electricity Delivery and Energy Reliability

Department of Energy. San Jose: Cisco Systems.

Clements, S., & Kirkham, H. (2010). Cyber-security considerations for the smart grid. Power and Energy

Society General Meeting, 2010 IEEE, (pp. 1-5). Minneapolis.

DoE. (2010). What a Smart Grid means to our Nations Future. Washington D.C.: U.S. Department of

Energy.

EEI. (2010). RE: Smart Grid RFI: Addressing Policy and Logistical Challenges to Smart Grid

Implementation. Washington D.C.: Edison Electric Institute.

GAO. (2011). Electricity Grid Modernization Progress Being Made on Cybersecurity Guidelines, but Key

Challenges Remain to be Addressed. Washington D.C.: United States Government Accountability

Office.

Greenfield, L. R. (2010). An Overview of the Federal Energy Regulatory Commission and Federal

Regulation of Public Utilities in the United States. Washington D.C.: Associate General Counsel

– Energy Markets 1 Office of the General Counsel Federal Energy Regulatory Commission.

Hunteman, W. (2011). Electric Sector and Smart Grid Cyber Security. Smart Grid Security East.

Washington D.C.: U.S. Department of Energy.

Idaho National Laboratory. (2006, May). Control Systems Cyber Security: Defense in Depth Strategies.

Retrieved from United States Computer Emergency Readiness Team: http://www.us-

cert.gov/control_systems/practices/documents/Defense%20in%20Depth%20Strategies.pdf

Page 11: Capstone Team Report -The Vicious Circle of Smart Grid Security

11

Lee, A. (2011, January 11). NIST and the Smart Grid. Retrieved from National Institute of Standards and

Technology: http://csrc.nist.gov/cyber-md-summit/documents/presentations/nist-and-smart-

grid_ALee.pdf

Leeds, D. J. (2010, February 10). The 2010 North American Utility Smart Grid Deployment Survey.

Retrieved from GTM Research: http://www.gtmresearch.com/report/the-2010-north-american-

utility-smart-grid-deployment-survey

Malcho, J., Harley, D., Rodionov, E., & Matrosov, A. (2010). Stuxnet Under the Microscope [White

paper].

McAfee Foundstone Professional Services and McAfee Labs. (2011). Global Energy Cyberattacks:

“Night Dragon” [White paper]. Retrieved from McAfee:

http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-

dragon.pdf

Mills, E. (2010, May 15). Money trumps security in smart-meter rollouts, experts say | InSecurity

Complex - CNET News. Retrieved from Technology News - CNET News:

http://news.cnet.com/8301-27080_3-20007672-245.html

Pike Research. (2010, February 4). Utilities to Invest $21 Billion in Smart Grid Cyber Security by 2015.

Retrieved from Pike Research: http://www.pikeresearch.com/newsroom/utilities-to-invest-21-

billion-in-smart-grid-cyber-security-by-2015

Smart Grid Request for Information and Public Comments. (n.d.). Retrieved from U.S. Department of

Energy: http://www.oe.energy.gov/Smart Grid Request for Information and Public

Comments.htm

Ten, W., Liu, C., & Manimaran, G. (2008). Vulnerability assessment of cybersecurity for SCADA

systems. Power Systems. IEEE Transactions on Power Systems, 23(4), 1836-1846.

Wheatman, J. (2011, February 16). Why Communication Fails: Five Reasons the Business Doesn't Get

Security's Message. Retrieved from Gartner: www.gartner.com/DisplayDocument?id=1549927