Pub Date : 1900-01-01DOI: 10.1002/9781119070740.ch4
{"title":"Applying Security Principles to Smart Grid","authors":"","doi":"10.1002/9781119070740.ch4","DOIUrl":"https://doi.org/10.1002/9781119070740.ch4","url":null,"abstract":"","PeriodicalId":415034,"journal":{"name":"Building an Effective Security Program for Distributed Energy Resources and Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116649998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1002/9781119070740.ch5
{"title":"Planning Security Protection","authors":"","doi":"10.1002/9781119070740.ch5","DOIUrl":"https://doi.org/10.1002/9781119070740.ch5","url":null,"abstract":"","PeriodicalId":415034,"journal":{"name":"Building an Effective Security Program for Distributed Energy Resources and Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132591624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1002/9781119070740.CH10
M. Hentea
Classic electricity grids are based on large central power stations connected to high‐voltage transmission systems. Distributed energy systems include a diverse array of distributed generation, energy storage and energy monitoring, and control solutions. Energy storage technologies are analyzed under the criteria such as operation and advantages, applications, cost, disadvantages, and future potential applications. Distributed energy resource (DER) systems typically use renewable energy sources, communication technologies, and interfaces to connect to utilities and consumers. DER integration and management is applicable to both distribution and transmission systems. A global survey was conducted in 2012 on security governance, specifically how boards of directors and senior management are governing the security of their organizations’ information, applications, and networks. The chapter provides an overview of the recent cyber incidents targeting electricity sector and energy sector for the period of 2012‐2016. The smart grid brings new challenges and privacy issues, which require regulatory frameworks and adequate protection.
{"title":"Distributed Energy Systems","authors":"M. Hentea","doi":"10.1002/9781119070740.CH10","DOIUrl":"https://doi.org/10.1002/9781119070740.CH10","url":null,"abstract":"Classic electricity grids are based on large central power stations connected to high‐voltage transmission systems. Distributed energy systems include a diverse array of distributed generation, energy storage and energy monitoring, and control solutions. Energy storage technologies are analyzed under the criteria such as operation and advantages, applications, cost, disadvantages, and future potential applications. Distributed energy resource (DER) systems typically use renewable energy sources, communication technologies, and interfaces to connect to utilities and consumers. DER integration and management is applicable to both distribution and transmission systems. A global survey was conducted in 2012 on security governance, specifically how boards of directors and senior management are governing the security of their organizations’ information, applications, and networks. The chapter provides an overview of the recent cyber incidents targeting electricity sector and energy sector for the period of 2012‐2016. The smart grid brings new challenges and privacy issues, which require regulatory frameworks and adequate protection.","PeriodicalId":415034,"journal":{"name":"Building an Effective Security Program for Distributed Energy Resources and Systems","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114860712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1002/9781119070740.app4
{"title":"D: Smart Grid Concepts","authors":"","doi":"10.1002/9781119070740.app4","DOIUrl":"https://doi.org/10.1002/9781119070740.app4","url":null,"abstract":"","PeriodicalId":415034,"journal":{"name":"Building an Effective Security Program for Distributed Energy Resources and Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125106380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1002/9781119070740.refs2
{"title":"References Part 2","authors":"","doi":"10.1002/9781119070740.refs2","DOIUrl":"https://doi.org/10.1002/9781119070740.refs2","url":null,"abstract":"","PeriodicalId":415034,"journal":{"name":"Building an Effective Security Program for Distributed Energy Resources and Systems","volume":"7 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126103875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1002/9781119070740.ch12
{"title":"Security Management for Smart Grid Systems","authors":"","doi":"10.1002/9781119070740.ch12","DOIUrl":"https://doi.org/10.1002/9781119070740.ch12","url":null,"abstract":"","PeriodicalId":415034,"journal":{"name":"Building an Effective Security Program for Distributed Energy Resources and Systems","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132690270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1002/9781119070740.app2
{"title":"B: Power Grid Concepts","authors":"","doi":"10.1002/9781119070740.app2","DOIUrl":"https://doi.org/10.1002/9781119070740.app2","url":null,"abstract":"","PeriodicalId":415034,"journal":{"name":"Building an Effective Security Program for Distributed Energy Resources and Systems","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116154166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1002/9781119070740.ch2
{"title":"Advancing Security","authors":"","doi":"10.1002/9781119070740.ch2","DOIUrl":"https://doi.org/10.1002/9781119070740.ch2","url":null,"abstract":"","PeriodicalId":415034,"journal":{"name":"Building an Effective Security Program for Distributed Energy Resources and Systems","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132518700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1002/9781119070740.ch11
{"title":"Security Management","authors":"","doi":"10.1002/9781119070740.ch11","DOIUrl":"https://doi.org/10.1002/9781119070740.ch11","url":null,"abstract":"","PeriodicalId":415034,"journal":{"name":"Building an Effective Security Program for Distributed Energy Resources and Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126831128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1002/9781119070740.ch9
{"title":"Power System Characteristics","authors":"","doi":"10.1002/9781119070740.ch9","DOIUrl":"https://doi.org/10.1002/9781119070740.ch9","url":null,"abstract":"","PeriodicalId":415034,"journal":{"name":"Building an Effective Security Program for Distributed Energy Resources and Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114012827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}