Cybersecurity Risk Assessment in Advanced Metering Infrastructure

One of the current Internet of Things (IoT) systems emerging nowadays is the advanced metering infrastructure (AMI) system. The AMI system was intended to gather the electricity consumption customer's data on electricity use before transmitting it to the electricity service providers (ESP) for...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Abd El Salam, Mostafa Shokry, Awad, Ali Ismail, Abd-Ellah, Mahmoud Khaled, Khalaf, Ashraf A. M.
Format: Buchkapitel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 23
container_issue
container_start_page 1
container_title
container_volume
creator Abd El Salam, Mostafa Shokry
Awad, Ali Ismail
Abd-Ellah, Mahmoud Khaled
Khalaf, Ashraf A. M.
description One of the current Internet of Things (IoT) systems emerging nowadays is the advanced metering infrastructure (AMI) system. The AMI system was intended to gather the electricity consumption customer's data on electricity use before transmitting it to the electricity service providers (ESP) for processing, storage, and analysis. The AMI system faces new security challenges because of the integration of information and communication technology (ICT) with the conventional electric power grid. One precaution that can be utilized to raise the AMI system's security level is the risk assessment process. The risk assessment procedure is one measure that may be used to increase the security level of the AMI system. Our main contribution to this chapter is an evaluation of the present cybersecurity risks to the AMI system. By evaluating security risks, it is possible to identify the crucial assets that need to be protected and any potential vulnerabilities, threat probabilities, and ramifications. The risk matrix for the potential dangers is also set up to evaluate them and select the best risk management strategy. Nine risk scenarios have been discovered in this study concerning each AMI layer and component. The likelihood, impact, and risk degree for each scenario are also determined. A sample of a mitigation approach is put out to bring the risk level down to manageable. This chapter covers the two pillars of work, which are the AMI system and information security risk assessment. It illustrates the essential elements, the objective, and the AMI system's tiers. Furthermore, it demonstrates the information security risk assessment objective, including the required steps for performing the risk assessment process and the different risk analysis approaches. The chapter shows the results of assessing the potential cybersecurity risks of the AMI system. It determines the existing critical assets, vulnerabilities, the probability in which the attack will occur, the impact of these attacks on the AMI system, and the risk levels associated with samples of attack scenarios. The AMI system provides advanced features than the traditional electricity grid as energy monitoring, recording, data collection, load management, and advanced control capabilities. One of the existing examples of an IoT system is the AMI system, which uses IT to digitize the conventional electricity grid.
doi_str_mv 10.1201/9781003199410-1
format Book Chapter
fullrecord <record><control><sourceid>proquest_infor</sourceid><recordid>TN_cdi_proquest_ebookcentralchapters_30828926_9_22</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC30828926_9_22</sourcerecordid><originalsourceid>FETCH-LOGICAL-i177t-e02ba1b2001908c0971a50dc5974fbb63ca8e2150edd604b5fb512169cd0c4093</originalsourceid><addsrcrecordid>eNpVkMFOwzAQRI0QCCg9c80PBHbtJI6PUQWlUhESgrNlOw6Ypk6x3aL-PanaC5dd7UpvNDOE3CHcIwV8ELxGAIZCFAg5npHp6TMOyutzcoPAKJQ1A345HgVwhmVJ6RWZxvgNB5ZTUYhr0sz22oZozTa4tM_eXFxlTYw2xrX1KXM-a9qd8sa22YtNNjj_mS18F1RMYWvSNthbctGpPtrpaU_Ix9Pj--w5X77OF7NmmTvkPOUWqFaoKQAKqA0IjqqE1pSCF53WFTOqthRLsG1bQaHLTpdIsRKmBVOAYBNCj7qbMPxsbUzS6mFYmdFmUL35UpvRXpQMaloLWkkhKR2h-RFyvhvCWv0OoW9lUvt-CGMIb1w8iESJIA_Vyn_VSpS7UdMNnrI_cPptRg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC30828926_9_22</pqid></control><display><type>book_chapter</type><title>Cybersecurity Risk Assessment in Advanced Metering Infrastructure</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Abd El Salam, Mostafa Shokry ; Awad, Ali Ismail ; Abd-Ellah, Mahmoud Khaled ; Khalaf, Ashraf A. M.</creator><contributor>Ahmad, Atif ; Awad, Ali Ismail ; Raymond Choo, Kim-Kwang ; Hakak, Saqib</contributor><creatorcontrib>Abd El Salam, Mostafa Shokry ; Awad, Ali Ismail ; Abd-Ellah, Mahmoud Khaled ; Khalaf, Ashraf A. M. ; Ahmad, Atif ; Awad, Ali Ismail ; Raymond Choo, Kim-Kwang ; Hakak, Saqib</creatorcontrib><description>One of the current Internet of Things (IoT) systems emerging nowadays is the advanced metering infrastructure (AMI) system. The AMI system was intended to gather the electricity consumption customer's data on electricity use before transmitting it to the electricity service providers (ESP) for processing, storage, and analysis. The AMI system faces new security challenges because of the integration of information and communication technology (ICT) with the conventional electric power grid. One precaution that can be utilized to raise the AMI system's security level is the risk assessment process. The risk assessment procedure is one measure that may be used to increase the security level of the AMI system. Our main contribution to this chapter is an evaluation of the present cybersecurity risks to the AMI system. By evaluating security risks, it is possible to identify the crucial assets that need to be protected and any potential vulnerabilities, threat probabilities, and ramifications. The risk matrix for the potential dangers is also set up to evaluate them and select the best risk management strategy. Nine risk scenarios have been discovered in this study concerning each AMI layer and component. The likelihood, impact, and risk degree for each scenario are also determined. A sample of a mitigation approach is put out to bring the risk level down to manageable. This chapter covers the two pillars of work, which are the AMI system and information security risk assessment. It illustrates the essential elements, the objective, and the AMI system's tiers. Furthermore, it demonstrates the information security risk assessment objective, including the required steps for performing the risk assessment process and the different risk analysis approaches. The chapter shows the results of assessing the potential cybersecurity risks of the AMI system. It determines the existing critical assets, vulnerabilities, the probability in which the attack will occur, the impact of these attacks on the AMI system, and the risk levels associated with samples of attack scenarios. The AMI system provides advanced features than the traditional electricity grid as energy monitoring, recording, data collection, load management, and advanced control capabilities. One of the existing examples of an IoT system is the AMI system, which uses IT to digitize the conventional electricity grid.</description><edition>1</edition><identifier>ISBN: 1032058307</identifier><identifier>ISBN: 9781032057712</identifier><identifier>ISBN: 9781032058306</identifier><identifier>ISBN: 1032057718</identifier><identifier>EISBN: 9781003810278</identifier><identifier>EISBN: 1003199410</identifier><identifier>EISBN: 1003810187</identifier><identifier>EISBN: 9781003810186</identifier><identifier>EISBN: 9781003199410</identifier><identifier>EISBN: 1003810276</identifier><identifier>DOI: 10.1201/9781003199410-1</identifier><identifier>OCLC: 1407315522</identifier><identifier>LCCallNum: TA145 .I584 2024</identifier><language>eng</language><publisher>United Kingdom: CRC Press</publisher><ispartof>Internet of Things Security and Privacy, 2024, p.1-23</ispartof><rights>2024 selection and editorial matter, [Ali Ismail Awad, Atif Ahmad, Kim-Kwang Raymond Choo, Saqib Hakak]; individual chapters, the contributors</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0002-6840-2503 ; 0000-0002-5718-3499 ; 0000-0002-3800-0757 ; 0000-0003-3344-5420</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/30828926-l.jpg</thumbnail><link.rule.ids>775,776,780,789,24760,27902</link.rule.ids></links><search><contributor>Ahmad, Atif</contributor><contributor>Awad, Ali Ismail</contributor><contributor>Raymond Choo, Kim-Kwang</contributor><contributor>Hakak, Saqib</contributor><creatorcontrib>Abd El Salam, Mostafa Shokry</creatorcontrib><creatorcontrib>Awad, Ali Ismail</creatorcontrib><creatorcontrib>Abd-Ellah, Mahmoud Khaled</creatorcontrib><creatorcontrib>Khalaf, Ashraf A. M.</creatorcontrib><title>Cybersecurity Risk Assessment in Advanced Metering Infrastructure</title><title>Internet of Things Security and Privacy</title><description>One of the current Internet of Things (IoT) systems emerging nowadays is the advanced metering infrastructure (AMI) system. The AMI system was intended to gather the electricity consumption customer's data on electricity use before transmitting it to the electricity service providers (ESP) for processing, storage, and analysis. The AMI system faces new security challenges because of the integration of information and communication technology (ICT) with the conventional electric power grid. One precaution that can be utilized to raise the AMI system's security level is the risk assessment process. The risk assessment procedure is one measure that may be used to increase the security level of the AMI system. Our main contribution to this chapter is an evaluation of the present cybersecurity risks to the AMI system. By evaluating security risks, it is possible to identify the crucial assets that need to be protected and any potential vulnerabilities, threat probabilities, and ramifications. The risk matrix for the potential dangers is also set up to evaluate them and select the best risk management strategy. Nine risk scenarios have been discovered in this study concerning each AMI layer and component. The likelihood, impact, and risk degree for each scenario are also determined. A sample of a mitigation approach is put out to bring the risk level down to manageable. This chapter covers the two pillars of work, which are the AMI system and information security risk assessment. It illustrates the essential elements, the objective, and the AMI system's tiers. Furthermore, it demonstrates the information security risk assessment objective, including the required steps for performing the risk assessment process and the different risk analysis approaches. The chapter shows the results of assessing the potential cybersecurity risks of the AMI system. It determines the existing critical assets, vulnerabilities, the probability in which the attack will occur, the impact of these attacks on the AMI system, and the risk levels associated with samples of attack scenarios. The AMI system provides advanced features than the traditional electricity grid as energy monitoring, recording, data collection, load management, and advanced control capabilities. One of the existing examples of an IoT system is the AMI system, which uses IT to digitize the conventional electricity grid.</description><isbn>1032058307</isbn><isbn>9781032057712</isbn><isbn>9781032058306</isbn><isbn>1032057718</isbn><isbn>9781003810278</isbn><isbn>1003199410</isbn><isbn>1003810187</isbn><isbn>9781003810186</isbn><isbn>9781003199410</isbn><isbn>1003810276</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2024</creationdate><recordtype>book_chapter</recordtype><recordid>eNpVkMFOwzAQRI0QCCg9c80PBHbtJI6PUQWlUhESgrNlOw6Ypk6x3aL-PanaC5dd7UpvNDOE3CHcIwV8ELxGAIZCFAg5npHp6TMOyutzcoPAKJQ1A345HgVwhmVJ6RWZxvgNB5ZTUYhr0sz22oZozTa4tM_eXFxlTYw2xrX1KXM-a9qd8sa22YtNNjj_mS18F1RMYWvSNthbctGpPtrpaU_Ix9Pj--w5X77OF7NmmTvkPOUWqFaoKQAKqA0IjqqE1pSCF53WFTOqthRLsG1bQaHLTpdIsRKmBVOAYBNCj7qbMPxsbUzS6mFYmdFmUL35UpvRXpQMaloLWkkhKR2h-RFyvhvCWv0OoW9lUvt-CGMIb1w8iESJIA_Vyn_VSpS7UdMNnrI_cPptRg</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Abd El Salam, Mostafa Shokry</creator><creator>Awad, Ali Ismail</creator><creator>Abd-Ellah, Mahmoud Khaled</creator><creator>Khalaf, Ashraf A. M.</creator><general>CRC Press</general><general>Taylor &amp; Francis Group</general><scope>FFUUA</scope><orcidid>https://orcid.org/0000-0002-6840-2503</orcidid><orcidid>https://orcid.org/0000-0002-5718-3499</orcidid><orcidid>https://orcid.org/0000-0002-3800-0757</orcidid><orcidid>https://orcid.org/0000-0003-3344-5420</orcidid></search><sort><creationdate>2024</creationdate><title>Cybersecurity Risk Assessment in Advanced Metering Infrastructure</title><author>Abd El Salam, Mostafa Shokry ; Awad, Ali Ismail ; Abd-Ellah, Mahmoud Khaled ; Khalaf, Ashraf A. M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i177t-e02ba1b2001908c0971a50dc5974fbb63ca8e2150edd604b5fb512169cd0c4093</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2024</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Abd El Salam, Mostafa Shokry</creatorcontrib><creatorcontrib>Awad, Ali Ismail</creatorcontrib><creatorcontrib>Abd-Ellah, Mahmoud Khaled</creatorcontrib><creatorcontrib>Khalaf, Ashraf A. M.</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Abd El Salam, Mostafa Shokry</au><au>Awad, Ali Ismail</au><au>Abd-Ellah, Mahmoud Khaled</au><au>Khalaf, Ashraf A. M.</au><au>Ahmad, Atif</au><au>Awad, Ali Ismail</au><au>Raymond Choo, Kim-Kwang</au><au>Hakak, Saqib</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Cybersecurity Risk Assessment in Advanced Metering Infrastructure</atitle><btitle>Internet of Things Security and Privacy</btitle><date>2024</date><risdate>2024</risdate><spage>1</spage><epage>23</epage><pages>1-23</pages><isbn>1032058307</isbn><isbn>9781032057712</isbn><isbn>9781032058306</isbn><isbn>1032057718</isbn><eisbn>9781003810278</eisbn><eisbn>1003199410</eisbn><eisbn>1003810187</eisbn><eisbn>9781003810186</eisbn><eisbn>9781003199410</eisbn><eisbn>1003810276</eisbn><abstract>One of the current Internet of Things (IoT) systems emerging nowadays is the advanced metering infrastructure (AMI) system. The AMI system was intended to gather the electricity consumption customer's data on electricity use before transmitting it to the electricity service providers (ESP) for processing, storage, and analysis. The AMI system faces new security challenges because of the integration of information and communication technology (ICT) with the conventional electric power grid. One precaution that can be utilized to raise the AMI system's security level is the risk assessment process. The risk assessment procedure is one measure that may be used to increase the security level of the AMI system. Our main contribution to this chapter is an evaluation of the present cybersecurity risks to the AMI system. By evaluating security risks, it is possible to identify the crucial assets that need to be protected and any potential vulnerabilities, threat probabilities, and ramifications. The risk matrix for the potential dangers is also set up to evaluate them and select the best risk management strategy. Nine risk scenarios have been discovered in this study concerning each AMI layer and component. The likelihood, impact, and risk degree for each scenario are also determined. A sample of a mitigation approach is put out to bring the risk level down to manageable. This chapter covers the two pillars of work, which are the AMI system and information security risk assessment. It illustrates the essential elements, the objective, and the AMI system's tiers. Furthermore, it demonstrates the information security risk assessment objective, including the required steps for performing the risk assessment process and the different risk analysis approaches. The chapter shows the results of assessing the potential cybersecurity risks of the AMI system. It determines the existing critical assets, vulnerabilities, the probability in which the attack will occur, the impact of these attacks on the AMI system, and the risk levels associated with samples of attack scenarios. The AMI system provides advanced features than the traditional electricity grid as energy monitoring, recording, data collection, load management, and advanced control capabilities. One of the existing examples of an IoT system is the AMI system, which uses IT to digitize the conventional electricity grid.</abstract><cop>United Kingdom</cop><pub>CRC Press</pub><doi>10.1201/9781003199410-1</doi><oclcid>1407315522</oclcid><tpages>23</tpages><edition>1</edition><orcidid>https://orcid.org/0000-0002-6840-2503</orcidid><orcidid>https://orcid.org/0000-0002-5718-3499</orcidid><orcidid>https://orcid.org/0000-0002-3800-0757</orcidid><orcidid>https://orcid.org/0000-0003-3344-5420</orcidid></addata></record>
fulltext fulltext
identifier ISBN: 1032058307
ispartof Internet of Things Security and Privacy, 2024, p.1-23
issn
language eng
recordid cdi_proquest_ebookcentralchapters_30828926_9_22
source O'Reilly Online Learning: Academic/Public Library Edition
title Cybersecurity Risk Assessment in Advanced Metering Infrastructure
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T03%3A46%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_infor&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Cybersecurity%20Risk%20Assessment%20in%20Advanced%20Metering%20Infrastructure&rft.btitle=Internet%20of%20Things%20Security%20and%20Privacy&rft.au=Abd%20El%20Salam,%20Mostafa%20Shokry&rft.date=2024&rft.spage=1&rft.epage=23&rft.pages=1-23&rft.isbn=1032058307&rft.isbn_list=9781032057712&rft.isbn_list=9781032058306&rft.isbn_list=1032057718&rft_id=info:doi/10.1201/9781003199410-1&rft_dat=%3Cproquest_infor%3EEBC30828926_9_22%3C/proquest_infor%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781003810278&rft.eisbn_list=1003199410&rft.eisbn_list=1003810187&rft.eisbn_list=9781003810186&rft.eisbn_list=9781003199410&rft.eisbn_list=1003810276&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC30828926_9_22&rft_id=info:pmid/&rfr_iscdi=true