STRUCTURING CYBERSECURITY CONCLAVE

Main Article Content

NITYASH SOLANKI

Abstract

There has been a dramatic shift from the traditional to the smart grid in recent years. A smart grid is only one example of how innovation can have its drawbacks. Safeguarding the smart grid against possible hackers is one of its biggest difficulties. The largest problem is maintaining such a massive network, as millions of sensors are constantly transmitting and receiving data packets over it. The availability, confidentiality, and integrity of the smart grid are crucial components that can be compromised by any cyberattack. cyberattacks can affect any level of the smart grid network, including customers using the network, smart devices and sensors communicating with one another, and decision makers overseeing the network. The smart grid network's cybersecurity from every angle has been looked upon, identifying potential risks and weaknesses and outlining three tiers of protection to keep them at bay.

Article Details

Section
Articles

References

Lun, Y.Z.; et al.: Cyber-physical systems security: a systematic mapping study. arXiv:1605.09641 (2016)

Razzaq, A.; et al.: Cyber security: threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. In: 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS). IEEE (2013)

Von Solms, R.; Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013)

Benson, V.; McAlaney, J.; Frumkin, L.A.: Emerging threats for the human element and countermeasures in current cyber security landscape. Psychological and Behavioral Examinations in Cyber Security, pp. 266–271. IGI Global, Hershey (2018)

Floyd, D.H.; Shelton, J.W.; Bush, J.E.: Systems and methods for detecting a security breach in an aircraft network. Google Patents (2018)

Valeriano, B.; Maness, R.C.: International relations theory and cyber security. In: Brown, C., Eckersley, R. (eds.) The Oxford Handbook of International Political Theory, p. 259. Oxford University Press, Oxford (2018)

von Solms, B.; von Solms, R.: Cybersecurity and information security—what goes where? Inf. Comput. Secur. 26(1), 2–9 (2018)

Ron, M.: Situational status of global cybersecurity and cyber defense according to global indicators. Adaptation of a model for ecuador. In: Developments and Advances in Defense and Security: Proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2018). Springer (2018)

Al Mazari, A.; et al.: Cyber terrorism taxonomies: defnition, targets, patterns, risk factors, and mitigation strategies. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, pp. 608–621. IGI Global, Hershey (2018)

“4.1 Electronic Payment Systems (EPS)”. n.d. Available from: http://ocw.metu.edu.tr/pluginfile.php/354/mod_resource/content/0/Lecture_4.pdf.

“Know more about Blockchain: Overview, Technology, Application Areas and Use Cases” 2018. MEDICI, Available from: https://gomedici.com/an-overview-of-Blockchain-technology.

Ramanpreet Kaur, Dušan Gabrijelčič, Tomaž Klobučar, Artificial intelligence for cybersecurity: Literature review and future research directions, Information Fusion, Volume 97, 2023, 101804, ISSN 1566-2535,https://doi.org/10.1016/j.inffus.2023.101804.(https://www.sciencedirect.com/science/article/pii/S1566253523001136)

J. Petters, “What is Zero Trust? A Security Model,” Inside Out Security Blog, 2021. https://www.varonis.com/blog/what-is-zerotrust

L. Odell, B. Farrar-Folley, C. Fauntleroy, and R. Wagner, “In-Use and Emerging Disruptive Technology Trend,” Inst. Def. Anal., 2015.

Claudina Castro Tanco, Merchants getting ready for crypto: Merchant Adoption of Digital Currency Payments Survey, Deloitte, 2022.

Kathleen Marshall, “Fidelity to start offering bitcoin and ether trading,” Investopedia, November 3, 2022.

Z. Zaheer, H. Chang, S. Mukherjee, and J. Van Der Merwe, “EZTrust: Network-Independent Zero-Trust Perimeterization for Microservices,” 2019, doi: 10.1145/3314148.3314349.

S. Tyagi, “7 Key Tenets of Zero Trust Architecture,” Colortokens, 2021. https://colortokens.com/blog/key-tenets-zero-trustarchitecture/.

Houichi, M.; Jaidi, F.; Bouhoula, A. A Systematic Approach for IoT Cyber-Attacks Detection in Smart Cities Using Machine Learning Techniques. In Proceedings of the International Conference on Advanced Information Networking and Applications, Toronto, ON, Canada, 12–14 May 2021; pp. 215–228.