Grid lockdown

MacWilson, Alastair
January 2011
Utility Week;1/28/2011, Vol. 34 Issue 3, p20
Trade Publication
The article presents a discussion about the need for public utilities in Great Britain to protect their smart grids which are vulnerable to cyberattacks. These attacks on smart grids have various goals, such as fraud by corrupting electricity data, breaching privacy by accessing customer accounts and corrupting assets on the network. It is suggested that utilities allow interoperability of security controls and compliance with standards to better protect smart grids.


Related Articles

  • Installation faults caused blackouts.  // Utility Week;10/10/2003, Vol. 20 Issue 15, p3 

    Reports on the possible cause of the blackouts in London and Birmingham, England on August 28 and September 5, 2003 respectively, according to a preliminary report from British energy regulator Ofgem. Problems with regard to the installation of protection equipment; Concerns of Ofgem about the...

  • New cybersecurity tool suite demonstrated this week.  // Biomedical Market Newsletter;8/28/2012, Vol. 21, p1 

    The article a suite of cybersecurity software tools has been developed for the electric utility industry to prevent cyber attacks of their control system.

  • Energy providers: New players in the marketplace. Hubbard, Kim L. // Business Journal (Central New York);06/18/99, Vol. 13 Issue 24, p15 

    Focuses on the role of independent power producers in the energy-producing industry as providers face deregulation and increased competition. Consumers' influence in the industry as opposed to policy experts'; Availability of options for consumers; Four players in the marketplace.

  • PART WAY DOWN A SLIPPERY SLOPE. Bradner, Scott // Network World;04/16/2001, Vol. 18 Issue 16, p42 

    Comments on the initiatives of different governments worldwide to secure computer networks against acts of cyberterrorism. Use of state sponsored cyberterrorism against illegal Web sites; Concerns regarding violations of the sovereignty of other nations to uphold computer security.

  • Time to treat all e-crimes with equal seriousness. Woolfson, Marc // New Media Age;12/16/2004, p12 

    This article presents the author's views on electronic crimes. Security, in Great Britain and abroad, dominated the Queen's Speech last month, with planned legislation for compulsory identification cards, electronic tagging of offenders and a legislative bill to create the Federal Bureau of...

  • Testing times, but relays race ahead. Marshall, Derek // European Power News;Oct2004, Vol. 29 Issue 7, p25 

    The article focuses on protective relay testing for all electricity supply utilities, power plant and heavy industrial installations. Megger Ltd., one of the world's leading suppliers of test equipment for protective systems, developed MPRT protective relay test system. Each MPRT test set can...

  • Smart Protection Concept for LV Microgrid. Laaksonen, H.; Kauhaniemi, K. // International Review of Electrical Engineering;Mar/Apr2010 Part B, Vol. 5 Issue 2, p578 

    The conventional protection in distribution networks is designed to operate for high fault current levels in radial networks, but during island operation of the microgrid high fault currents from the utility grid are not present. Also most of the distributed generation (DG) units that will be...

  • Implementing the Future Today In Naperville, Illinois. Gacek, Daniel; Self, Howard // Utility Automation & Engineering T&D;Nov2006, Vol. 11 Issue 9, p32 

    The article focuses on the implementation of the IEC 61850, an international standard for substation automation, in Naperville, Illinois. The city worked on a plan to upgrade the Chicago 50 and Modaff 70 substations in order to meet future demands. The new design of the Chicago 50, as discussed,...

  • Cyber-Terror a Certainty, and Government Is Most Vulnerable. Lemke, Tim // Insight on the News;1/7/2002, Vol. 18 Issue 1, p31 

    Reports on the vulnerability of computer networks worldwide to hackers and terrorist attacks. Increases in the number of reported incidents of cyber attacks; Order issued by U.S. President George W. Bush to eliminate cyberterrorism; Amount spent by companies for computer security measures.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics