p>I have written for years here that control systems are not
designed for security, and that one needs to create a security architecture as
part of connecting building systems to networks. Recently, I had to design a
security architecture to allow remote access to several systems with no
security built in. An example of such an architecture is below.
Read MoreSecurity
Cybersecurity of Power—Resources
As we work to define the cybersecurity of things, power demands its own security models, outside of SCADA security and distributed controls. Power is both a resource and a vector, and each of these offers vulnerabilities to cyberattack. This article describes cybersecurity of the resource.
Read MoreESIF and Security at the Edge of Smart Grids
I attended the NREL ESIF Cybersecurity Workshop last month.
ESIF names the Energy Systems Integration Facility. The workshop demonstrated
both what should be done to secure future energy systems, and how difficult,
labor intensive, and non-scalable this is using standard practice.
Read MoreThe first morning showed off the ESIF’s model of how to secure the un-securable.
Cryptocurrencies and Cybersecurity and Clouds
This post is part of the continuing Paths to Transactive Energy series. You can find them all listed by clicking on the matching metatag at the bottom of each post.
Many of the hottest startups in the Internet Of Things (IOT) are cloud based. This is driven by: are cloud based. Motivations driving this include:
- Using powerful shared computing to reduce the cost of simple things in the house.
- Pushing inter-Thing compatibility into the clouds
- Providing a locus for high end user interfaces, on phone and tablet, over the web.
Of course a more powerful incentive is: