Cyber Security for Power Grid (Graduate)

2018 Fall

Lecturer: Sugwon Hong, Professor
Department of Computer Engineering
office: 5723
tel: 6777

Hour and Classroom

- course hour: Tue 2:00PM
- classroom: 5407



1. What do we intend to achieve by this course?

Almost all critical infrastructures of every states are based on the SCADA/ICS systems. These days we are observing the very sophisticated cyber attacks against the critical infrastructures including power systems. These incidents render us great concern since their impacts are exceedingly devastating to the whole society. This fact leads to raise the following questions.

  1. What is the vulnerability of the current SCADA/ICS systems that were or could have been taken advantage of by the cyber attacks?
  2. What is the limitation of the current IT security strategies in order to prevent the cyber attacks against the critical infrastructures?
  3. It is often said that a NEW integrated approach is needed for thwart these sophisticated cyber attacks. Then doing what can we call “integrated” approaches?

Through this course, we are going to try to answer these questions.


2. How are we going to approach to achieving the goal?

There are already a plethora of documents and publications on this issue. Many documents provide comprehensive insights on understanding the current problems and possible approaches. We are going to select some documents which are most relevant to our pursuit, and using these documents as a foothold we try to find as realistic and specific solutions as possible.

We will follow these topics using mainly the materials I will provide. And we will also select and use some other resourses to study the other topics.


3. How are we going to proceed this course?

The class will be a mixture of lectures and students’ contribution. Due to time limitation, we cannot deal with IT security methods. We assume that students are already familiar with the current network security solutions and technologies. With this background we focus on how we apply the possible security methods to the cyber security issues of the power grid in an integrated way. The topics we are going to treat are shown below. But the schedule is not final, subject to change if necessary


4. Course Outline

The following schedle is tentative, and will be subject to change if necessary.

lecture notes
reading list
special topics




Evaluation of cyber security strategies for SCADA/ICS systems



- case studies: cyber attacks againt SCADA/ICS

- cyber kill chain

[case studies and attack model.pdf]

[case study stuxnet korean.pdf]


reading list1



case studies of cyber security incidents and its implication for cyber security strategies



Strategy for message communication security y

[IEC62351.pdf] reading list2



Drafts for reports



Management of power system for cyber security

[network management]

reading(EPRI report)



Midterm exam


Key management for power system equipments

Guide to ICS securit





Interim reports


Extension of power grid services and networks and its impact of cyber security





cyber security for AMI and AV infrastructure





cyber security for microgrid


Final reports and evaluation



Final reports and evaluation      


Basic knowledge of network security and power systems is recommended.

lecture notes

I will prepare and post lecture notes on the home page. In addition I will post relevant documents and papers which students should refer to as a reading list.


5. What are you expected to do at the end of semester?

Each student is required to write his own report on the subject discussed in the course. The topic is open and its approach and solution is on his own. The final report will be evaluated on the following factors.

  • It should be comprehensive which means it should define the problem and fully survey the current state and suggest the possible enhanced solutions.
  • The domain which you are dealing with should be clearly understood and defined.
  • The current state should be correctly examined, so not barking on the wrong tree.
  • The suggestion is expected to be novel. Yes, novel. How can you have fresh perspectives on this issue?