Cyber Security for Power Grid (Graduate)

2018 Fall

Lecturer: Sugwon Hong, Professor
Department of Computer Engineering
office: 5723
email: swhong@mju.ac.kr
tel: 6777

Hour and Classroom

- course hour: Tue 2:00PM
- classroom: 5407

 

 

1. What do we intend to achieve by this course?

Almost all critical infrastructures of every states are based on the SCADA/ICS systems. These days we are observing the very sophisticated cyber attacks against the critical infrastructures including power systems. These incidents render us great concern since their impacts are exceedingly devastating to the whole society. This fact leads to raise the following questions.

  1. What is the vulnerability of the current SCADA/ICS systems that were or could have been taken advantage of by the cyber attacks?
  2. What is the limitation of the current IT security strategies in order to prevent the cyber attacks against the critical infrastructures?
  3. It is often said that a NEW integrated approach is needed for thwart these sophisticated cyber attacks. Then doing what can we call “integrated” approaches?

Through this course, we are going to try to answer these questions.

 

2. How are we going to approach to achieving the goal?

There are already a plethora of documents and publications on this issue. Many documents provide comprehensive insights on understanding the current problems and possible approaches. We are going to select some documents which are most relevant to our pursuit, and using these documents as a foothold we try to find as realistic and specific solutions as possible.

We will follow these topics using mainly the materials I will provide. And we will also select and use some other resourses to study the other topics.

 

3. How are we going to proceed this course?

The class will be a mixture of lectures and students’ contribution. Due to time limitation, we cannot deal with IT security methods. We assume that students are already familiar with the current network security solutions and technologies. With this background we focus on how we apply the possible security methods to the cyber security issues of the power grid in an integrated way. The topics we are going to treat are shown below. But the schedule is not final, subject to change if necessary

 

4. Course Outline

The following schedle is tentative, and will be subject to change if necessary.

week
topics
lecture notes
reading list
special topics
1

Intro

 

   
2

Evaluation of cyber security strategies for SCADA/ICS systems

[strategies.pdf]

   
3


- case studies: cyber attacks againt SCADA/ICS

- cyber kill chain

[case studies and attack model.pdf]

[case study stuxnet korean.pdf]

 

reading list1

 

4

case studies of cyber security incidents and its implication for cyber security strategies

 

   
5

Strategy for message communication security y

[IEC62351.pdf] reading list2

 

6

Drafts for reports

 

 

7
Management of power system for cyber security

[network management]

reading(EPRI report)

 

8

Midterm exam

 
9

Key management for power system equipments

   
10
Guide to ICS securit

 

 

 

11

Interim reports

     
12

Extension of power grid services and networks and its impact of cyber security

 

 

 

13

cyber security for AMI and AV infrastructure

 

 

 

   
14

cyber security for microgrid

   
15

Final reports and evaluation

   

 

16
Final reports and evaluation      

Prerequisites

Basic knowledge of network security and power systems is recommended.

lecture notes

I will prepare and post lecture notes on the home page. In addition I will post relevant documents and papers which students should refer to as a reading list.

 

5. What are you expected to do at the end of semester?

Each student is required to write his own report on the subject discussed in the course. The topic is open and its approach and solution is on his own. The final report will be evaluated on the following factors.

  • It should be comprehensive which means it should define the problem and fully survey the current state and suggest the possible enhanced solutions.
  • The domain which you are dealing with should be clearly understood and defined.
  • The current state should be correctly examined, so not barking on the wrong tree.
  • The suggestion is expected to be novel. Yes, novel. How can you have fresh perspectives on this issue?