ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Building an Effective Security Program for Distributed Energy Resources and Systems

دانلود کتاب ایجاد یک برنامه امنیتی موثر برای منابع و سیستم های انرژی توزیع شده

Building an Effective Security Program for Distributed Energy Resources and Systems

مشخصات کتاب

Building an Effective Security Program for Distributed Energy Resources and Systems

ویرایش: [1 ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 1118949048, 9781118949047 
ناشر: Wiley 
سال نشر: 2021 
تعداد صفحات: 608
[605] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 63 Mb 

قیمت کتاب (تومان) : 52,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Building an Effective Security Program for Distributed Energy Resources and Systems به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب ایجاد یک برنامه امنیتی موثر برای منابع و سیستم های انرژی توزیع شده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب ایجاد یک برنامه امنیتی موثر برای منابع و سیستم های انرژی توزیع شده

ساخت یک برنامه امنیتی موثر برای منابع انرژی و سیستم های توزیع شده

ایجاد یک برنامه امنیتی مهم و موثر برای DER

ساخت یک برنامه موثر برنامه امنیتی برای منابع انرژی و سیستم های توزیع شدهبه یک رویکرد واحد برای ایجاد یک برنامه امنیتی حیاتی برای سیستم های DER و برنامه های شبکه هوشمند نیاز دارد. روش ارائه شده، اصول، تکنیک‌ها، استانداردها و بهترین شیوه‌های مهندسی امنیت سیستم‌ها را ادغام می‌کند.

این نشریه مهندسان را در مورد طراحی، اجرا و نگهداری یک برنامه امنیتی برای منابع انرژی توزیع‌شده (DER)، شبکه هوشمند معرفی می‌کند. و سیستم های کنترل صنعتی این به متخصصان امنیتی درک الزامات خاص سیستم‌های کنترل صنعتی و برنامه‌های کاربردی محدود در زمان واقعی برای سیستم‌های قدرت را ارائه می‌دهد. این کتاب:

  • نیازهای امنیت سایبری برای DERها و شبکه برق را به عنوان زیرساخت حیاتی توصیف می کند
  • اصول امنیت اطلاعات را برای ارزیابی و مدیریت خطرات امنیتی و حریم خصوصی هوشمند در حال ظهور معرفی می کند. فناوری‌های شبکه
  • کارکردهای برنامه امنیتی و همچنین دامنه و تفاوت‌های بین الزامات امنیتی سیستم IT سنتی و موارد مورد نیاز برای سیستم‌های کنترل صنعتی مانند سیستم‌های SCADA را تشریح می‌کند
  • یک کامل ارائه می‌دهد. مجموعه ای از منابع—مفاهیم، ​​چارچوب ها و روندهای نوظهور امنیت سایبری

متخصصان و مهندسان امنیت می توانند از ایجاد یک برنامه امنیتی موثر برای منابع انرژی و سیستم های توزیع شده به عنوان یک ابزار قابل اعتماد استفاده کنند. منبعی که به موضوع ضروری امنیت برای منابع انرژی پراکنده و شبکه های برق اختصاص داده شده است. آنها استانداردها، دستورالعمل‌ها و توصیه‌های سازمان‌های استاندارد، مانند ISO، IEC، NIST، IEEE، ENISA، ISA، ISACA و ISF را پیدا می‌کنند که به راحتی برای مرجع در فصل‌ها گنجانده شده است.


توضیحاتی درمورد کتاب به خارجی

Building an Effective Security Program for Distributed Energy Resources and Systems

Build a critical and effective security program for DERs

Building an Effective Security Program for Distributed Energy Resources and Systems requires a unified approach to establishing a critical security program for DER systems and Smart Grid applications. The methodology provided integrates systems security engineering principles, techniques, standards, and best practices.

This publication introduces engineers on the design, implementation, and maintenance of a security program for distributed energy resources (DERs), smart grid, and industrial control systems. It provides security professionals with understanding the specific requirements of industrial control systems and real-time constrained applications for power systems. This book:

  • Describes the cybersecurity needs for DERs and power grid as critical infrastructure
  • Introduces the information security principles to assess and manage the security and privacy risks of the emerging Smart Grid technologies
  • Outlines the functions of the security program as well as the scope and differences between traditional IT system security requirements and those required for industrial control systems such as SCADA systems
  • Offers a full array of resources— cybersecurity concepts, frameworks, and emerging trends

Security Professionals and Engineers can use Building an Effective Security Program for Distributed Energy Resources and Systems as a reliable resource that is dedicated to the essential topic of security for distributed energy resources and power grids. They will find standards, guidelines, and recommendations from standards organizations, such as ISO, IEC, NIST, IEEE, ENISA, ISA, ISACA, and ISF, conveniently included for reference within chapters.



فهرست مطالب

Cover
Title Page
Copyright Page
Contents
Foreword
Preface
Acknowledgments
Part I Understanding Security and Privacy Problem
	Chapter 1 Security
		1.1 Introduction
		1.2 Smart Grid
			1.2.1 Traditional Power Grid Architecture
			1.2.2 Smart Grid Definitions
			1.2.3 Drivers for Change
			1.2.4 Smart Grid Communication Infrastructure
		1.3 Distributed Energy Resources
			1.3.1 DER Characteristics
			1.3.2 DER Uses
			1.3.3 DER Systems
			1.3.4 Microgrid
			1.3.5 Virtual Power Plant
		1.4 Scope of Security and Privacy
			1.4.1 Security for the Smart Grid
			1.4.2 Privacy
			1.4.3 The Need for Security and Privacy
		1.5 Computing and Information Systems for Business and Industrial Applications
			1.5.1 Information System Classification
			1.5.2 Information Systems in Power Grids
			1.5.3 DER Information Systems
		1.6 Integrated Systems in a Smart Grid
			1.6.1 Trends
			1.6.2 Characteristics
		1.7 Critical Smart Grid Systems
			1.7.1 Industrial Control Systems
			1.7.2 SCADA Systems
			1.7.3 Energy Management Systems
			1.7.4 Advanced Meter Systems
		1.8 Standards, Guidelines, and Recommendations
			1.8.1 Overview of Various Standards
			1.8.2 Key Standard Attributes and Conformance
			1.8.3 Smart Grid Standards
			1.8.4 Cybersecurity Standards
	Chapter 2 Advancing Security
		2.1 Emerging Technologies
			2.1.1 Internet of Things
			2.1.2 Internet of Everything (IoE)
			2.1.3 Cyber–Physical Systems
			2.1.4 Cyber–Physical Systems Applications
		2.2 Cybersecurity
			2.2.1 Cybersecurity Definitions
			2.2.2 Understanding Cybersecurity Terms
			2.2.3 Cybersecurity Evolution
		2.3 Advancing Cybersecurity
			2.3.1 Contributing Factors to Cybersecurity Success
			2.3.2 Advancing Cybersecurity and Privacy Design
		2.4 Smart Grid Cybersecurity: A Perspective on Comprehensive Characterization
			2.4.1 Forces Shaping Cybersecurity
			2.4.2 Smart Grid Trends
		2.5 Security as a Personal, Organizational, National, and Global Priority
			2.5.1 Security as Personal Priority
			2.5.2 Protection of Private Information
			2.5.3 Protecting Cyberspace as a National Asset
		2.6 Cybersecurity for Electrical Sector as a National Priority
			2.6.1 Need for Cybersecurity Solutions
			2.6.2 The US Plans
		2.7 The Need for Security and Privacy Programs
			2.7.1 Security Program
			2.7.2 Privacy Program
		2.8 Standards, Guidelines, and Recommendations
			2.8.1 Electricity Sector Guidance
			2.8.2 International Collaboration
	References Part 1
Part II Applying Security Principles to Smart Grid
	Chapter 3 Principles of Cybersecurity
		3.1 Introduction
		3.2 Information Security
			3.2.1 Terminology
			3.2.2 Information Security Components
			3.2.3 Security Principles
		3.3 Security-Related Concepts
			3.3.1 Basic Security Concepts
			3.3.2 The Basis for Security
		3.4 Characteristics of Information
			3.4.1 Data Transformation
			3.4.2 Data Characteristics
			3.4.3 Data Quality
			3.4.4 Information Quality
			3.4.5 System Quality
			3.4.6 Data Quality Characteristics Assigned to Systems
		3.5 Information System Characteristics
			3.5.1 Software Quality
			3.5.2 System Quality Attributes
		3.6 Critical Information Systems
			3.6.1 Critical System Characteristics
			3.6.2 Information Life Cycle
			3.6.3 Information Assurance
			3.6.4 Critical Security Characteristics of Information
		3.7 Information Security Models
			3.7.1 Evolving Models
			3.7.2 RMIAS Model
			3.7.3 Information Security Goals
		3.8 Standards, Guidelines, and Recommendations
			3.8.1 SGIP Catalog of Standards
			3.8.2 Cybersecurity Standards for Smart Grid
	Chapter 4 Applying Security Principles to Smart Grid
		4.1 Smart Grid Security Goals
		4.2 DER Information Security Characteristics
			4.2.1 Information Classification
			4.2.2 Information Classification Levels
			4.2.3 Information Evaluation Criteria
		4.3 Infrastructure
			4.3.1 Information Infrastructure
			4.3.2 Information Assurance Infrastructure
			4.3.3 Information Management Infrastructure
			4.3.4 Outsourced Services
			4.3.5 Information Security Management Infrastructure
			4.3.6 Cloud Infrastructure
		4.4 Smart Grid Infrastructure
			4.4.1 Hierarchical Structures
			4.4.2 Smart Grid Needs
			4.4.3 Cyber Infrastructure
			4.4.4 Smart Grid Technologies
		4.5 Building an Information Infrastructure for Smart Grid
			4.5.1 Various Perspectives
			4.5.2 Challenges and Relevant Approaches
			4.5.3 Common Employed Infrastructures
		4.6 IT Systems Versus Industrial Control System Infrastructure
			4.6.1 Industrial Control Systems General Concepts
			4.6.2 Supervisory Control and Data Acquisition Systems (SCADA)
			4.6.3 Differences and Similarities
		4.7 Convergence Trends
		4.8 Standards, Guidelines, and Recommendations
	Chapter 5 Planning Security Protection
		5.1 Threats and Vulnerabilities
			5.1.1 Threats Characterization
			5.1.2 Vulnerabilities Characteristics
		5.2 Attacks
			5.2.1 Attack Categories
			5.2.2 Reasons for Attack
		5.3 Energy Sector: Threats, Vulnerabilities, and Attacks Overview
			5.3.1 Threats
			5.3.2 Vulnerabilities
			5.3.3 Energy Sector Attacks
			5.3.4 Smart Grid Cybersecurity Challenges
		5.4 Security Controls
			5.4.1 Security Controls Categories
			5.4.2 Common Security Controls
			5.4.3 Applying Security Controls to Smart Grid
		5.5 Security Training and Skills
			5.5.1 Education, Training, and Awareness
			5.5.2 Security Awareness Program
		5.6 Planning for Security and Privacy
			5.6.1 Plan Structure
			5.6.2 Security Team
		5.7 Legal and Ethical Issues
		5.8 Standards, Guidelines, and Recommendations
	References Part 2
Part III Security of Critical Infrastructure
	Chapter 6 Critical Infrastructure
		6.1 Introduction
			6.1.1 Critical Infrastructure
			6.1.2 Critical Information Infrastructure
		6.2 Associated Industries with Critical Infrastructure
			6.2.1 US Critical Sectors
			6.2.2 Other Countries
		6.3 Critical Infrastructure Components
		6.4 Energy Sector
			6.4.1 Electrical Subsector
			6.4.2 Smart Grid Infrastructure
		6.5 Critical Infrastructure Interdependencies
			6.5.1 Interdependency Dimensions
			6.5.2 Dependencies
		6.6 Electrical Power System
			6.6.1 Electrical Power System Components
			6.6.2 Electrical Power System Evolution and Challenges
			6.6.3 Needs
		6.7 Recent Threats and Vulnerabilities
			6.7.1 Reported Cyber Attacks
			6.7.2 ICS/SCADA Incidents and Challenges
			6.7.3 Equipment Failure
		6.8 Standards, Guidelines, and Recommendations
	Chapter 7 Critical Infrastructure Protection
		7.1 Critical Infrastructure Attacks and Challenges
			7.1.1 Power Grid
			7.1.2 Attacks on Information Technology and Telecommunications
			7.1.3 Attacks in Manufacturing
			7.1.4 Defense
		7.2 The Internet as a Critical Infrastructure
		7.3 Critical Infrastructure Protection
			7.3.1 Policies, Laws, and Regulations
			7.3.2 Protection Issues
		7.4 Information Security Frameworks
			7.4.1 NIST Cybersecurity Framework
			7.4.2 NIST Updated Cybersecurity Framework
			7.4.3 Generic Framework
		7.5 NIST Privacy Framework
		7.6 Addressing Security of Control Systems
			7.6.1 Challenges
			7.6.2 Terrorism Challenges
		7.7 Emerging Technologies and Impacts
			7.7.1 Control Systems Open to Internet
			7.7.2 Wireless and Mobile
			7.7.3 Internet of Things and Internet of Everything
			7.7.4 Web Technologies
			7.7.5 Embedded Systems
			7.7.6 Cloud Computing
		7.8 Standards, Guidelines, and Recommendations
			7.8.1 Department of Homeland Security (DHS)
			7.8.2 Federal Communications Commission (FCC)
			7.8.3 National Institute of Standards and Technology (NIST)
			7.8.4 North American Electric Reliability Corporation (NERC)
			7.8.5 Federal Energy Regulatory Commission
			7.8.6 DOE Critical Infrastructure Guidance
			7.8.7 US-CERT
	References Part 3
Part IV The Characteristics of Smart Grid and DER Systems
	Chapter 8 Smart Power Grid
		8.1 Electric Power Grid
			8.1.1 Power System Services
			8.1.2 Power System Operations
			8.1.3 Energy Management System Overview
			8.1.4 Electrical Utilities Evolution
		8.2 Smart Grid: What Is It?
			8.2.1 Definitions
			8.2.2 Vision of the Future Smart Grid
			8.2.3 Tomorrow’s Utility
			8.2.4 EMS Upgrades
			8.2.5 Electricity Trade
			8.2.6 Trading Capabilities
		8.3 Smart Grid Characteristics
			8.3.1 Relevant Characteristics
			8.3.2 Electrical Infrastructure Evolution
		8.4 Smart Grid Conceptual Models
			8.4.1 NIST Conceptual Model
			8.4.2 IEEE Model
			8.4.3 European Conceptual Model
		8.5 Power and Smart Devices
			8.5.1 Smart Meters
			8.5.2 Intelligent Electronic Devices
			8.5.3 Phasor Measurement Units
			8.5.4 Intelligent Universal Transformers
		8.6 Examples of Key Technologies and Solutions
			8.6.1 Communication Networks
			8.6.2 Integrated Communications
			8.6.3 Sensor Networks
			8.6.4 Infrastructure for Transmission and Substations
			8.6.5 Wireless Technologies
			8.6.6 Advanced Metering Infrastructure
		8.7 Networking Challenges
			8.7.1 Architecture
			8.7.2 Protocols
			8.7.3 Constraints
		8.8 Standards, Guidelines, and Recommendations
			8.8.1 Smart Grid Interoperability
			8.8.2 Representative Standards
	Chapter 9 Power System Characteristics
		9.1 Analysis of Power Systems
			9.1.1 Analysis of Basic Characteristics
			9.1.2 Stability
			9.1.3 Partial Stability
		9.2 Analysis of Impacts
			9.2.1 DER Impacts
			9.2.2 Interconnectivity
		9.3 Reliability
			9.3.1 Reliable System Characteristics
			9.3.2 Addressing Reliability
			9.3.3 Evaluating Reliability
			9.3.4 ICT Reliability Issues
			9.3.5 DER Impacts
		9.4 Resiliency
			9.4.1 Increasing Resiliency
			9.4.2 DER Opportunities
		9.5 Addressing Various Issues
			9.5.1 Addressing Cybersecurity
			9.5.2 Cyber–Physical System
			9.5.3 Cyber–Physical Resilience
			9.5.4 Related Characteristics, Relationships, Differences, and Similarities
		9.6 Power System Interoperability
			9.6.1 Interoperability Dimensions
			9.6.2 Smart Grid Interoperability
			9.6.3 Interoperability Framework
			9.6.4 Addressing Crosscutting Issues
		9.7 Smart Grid Interoperability Challenges
		9.8 Standards, Guidelines, and Recommendations
			9.8.1 ISO/IEC Standards
			9.8.2 IEEE Standards
	Chapter 10 Distributed Energy Systems
		10.1 Introduction
			10.1.1 Distributed Energy
			10.1.2 Distributed Energy Systems
		10.2 Integrating Distributed Energy Resources
			10.2.1 Energy Storage Technologies
			10.2.2 Electric Vehicles
			10.2.3 Distributed Energy Resource Systems
			10.2.4 Electrical Energy Storage Systems
			10.2.5 Virtual Power Plant
		10.3 DER Applications and Security
			10.3.1 Energy Storage Applications
			10.3.2 Microgrid
		10.4 Smart Grid Security Goals
			10.4.1 Cybersecurity
			10.4.2 Reliability and Security
			10.4.3 DER Security Challenges
		10.5 Security Governance in Energy Industry
			10.5.1 Security Governance Overview
			10.5.2 Information Governance
			10.5.3 EAC Recommendations
			10.5.4 Establishing Information Security Governance
			10.5.5 Governance for Building Security In
		10.6 What Kind of Threats and Vulnerabilities?
			10.6.1 Threats
			10.6.2 Reported Cyber Incidents
			10.6.3 Vulnerabilities
			10.6.4 ICS Reported Vulnerabilities
			10.6.5 Addressing Privacy Issues
		10.7 Examples of Smart Grid Applications
			10.7.1 Smart Grid Expectations
			10.7.2 Demand Response Management Systems (DRMS)
			10.7.3 Distribution Automation
			10.7.4 Advanced Distribution Management System
			10.7.5 Smart Home
			10.7.6 Smart Microgrid
		10.8 Standards, Guidelines, and Recommendations
			10.8.1 NIST Roadmap, Standards, and Guidelines
			10.8.2 NERC CIP Standards
			10.8.3 Security Standards Governance
	References Part 4
Part V Security Program Management
	Chapter 11 Security Management
		11.1 Security Managements Overview
			11.1.1 Information Security
			11.1.2 Security Management Components
			11.1.3 Management Tasks
		11.2 Security Program
			11.2.1 Security Program Functions
			11.2.2 Building a Security Program: Which Approach?
			11.2.3 Security Management Process
		11.3 Asset Management
			11.3.1 Asset Management for Power System
			11.3.2 Asset Management Perspectives
			11.3.3 Benefits of Asset Management
		11.4 Physical Security and Safety
			11.4.1 Physical Security Measures
			11.4.2 Physical Security Evolution
			11.4.3 Human Resources and Public Safety
		11.5 Human and Technology Relationship
			11.5.1 Use Impacts
			11.5.2 DER Systems Challenges
			11.5.3 Security vs. Safety
		11.6 Information Security Management
			11.6.1 Information Security Management Infrastructure
			11.6.2 Enterprise Security Model
			11.6.3 Cycle of the Continuous Information Security Process
			11.6.4 Information Security Process for Smart Grid
			11.6.5 Systems Engineering and Processes
		11.7 Models and Frameworks for Information Security Management
			11.7.1 ISMS Models
			11.7.2 Information Security Management Maturity Model (ISM3) Model
			11.7.3 BMIS Model
			11.7.4 Systems Security Engineering Capability Maturity Model (SSE-CMM)
			11.7.5 Standard of Good Practice (SoGP)
			11.7.6 Examples of Other Frameworks
			11.7.7 Combining Models, Frameworks, Standards, and Best Practices
		11.8 Standards, Guidelines, and Recommendations
	Chapter 12 Security Management for Smart Grid Systems
		12.1 Strategic, Tactical, and Operational Security Management
			12.1.1 Unified View of Smart Grid Systems
			12.1.2 Organizational Security Model
		12.2 Security as Business Issue
			12.2.1 Strategic Management
			12.2.2 Tactical Management
			12.2.3 Operational Management
		12.3 Systemic Security Management
			12.3.1 Comparison and Discussion of Models
			12.3.2 Efficient and Effective Management Solutions
			12.3.3 Means for Improvement
		12.4 Security Model for Electrical Sector
			12.4.1 Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)
			12.4.2 Which Guidance and Recommendations Apply in Electrical Sector?
			12.4.3 Implementing ISMS
			12.4.4 NIST Framework
			12.4.5 Blueprints
			12.4.6 Control Systems
		12.5 Achieving Security Governance
			12.5.1 Security Strategy Principles
			12.5.2 Governance Definitions and Developments
			12.5.3 Information Security Governance
			12.5.4 Implementation Challenges
			12.5.5 Responsibilities and Roles
			12.5.6 Governance Model
		12.6 Ensuring Information Assurance
			12.6.1 NIST SP800-55
			12.6.2 ISO/IEC 27004
		12.7 Certification and Accreditation
			12.7.1 Common Criteria
			12.7.2 ISO/IEC 27001
			12.7.3 ISMS Accreditation
		12.8 Standards, Guidelines, and Recommendations
			12.8.1 ISO/IEC Standards
			12.8.2 ISA Standards
			12.8.3 National Institute of Standards and Technology (NIST)
			12.8.4 Internet Engineering Task Force (IETF)
			12.8.5 ISF Standards
			12.8.6 European Union Agency for Network and Information Security Guidelines
			12.8.7 Information Assurance for Small Medium Enterprise (IASME)
	References Part 5
A Cybersecurity Concepts
	References
B Cybersecurity Concepts
	B.1  Basic Terms
		B.1.1 Ancillary Services
		B.1.2 Bulk Electric System
		B.1.3 Bulk Power System (BPS)
		B.1.4 Centralized Historian
		B.1.5 Circuit Breakers
		B.1.6 Cooperative
		B.1.7 Control System
		B.1.8 Conservation of Energy
		B.1.9 Critical Characteristic
		B.1.10 Critical Safety Item
		B.1.11 Distributed Information System
		B.1.12 Engineering Station
		B.1.13 Historian Database
		B.1.14 Energy
		B.1.15 Electrical Energy
		B.1.16 Energy Forms
		B.1.17 Electricity Generation
		B.1.18 Electric Generator
		B.1.19 Electric Circuit Components
		B.1.20 Electric Grid
		B.1.21 Electric Power
		B.1.22 Electric Power Network
		B.1.23 Electric Power Versus Electric Energy
		B.1.24 Electric Power System
		B.1.25 Electricity Supply System
		B.1.26 Electric Utility
		B.1.27 Human–Machine Interface
		B.1.28 Industrial Control Network (ICS)
		B.1.29 Industrial Control System
		B.1.30 Instrumentation and Control (I&C) System
		B.1.31 Intelligent Electronic Device (IED)
		B.1.32 Key Characteristic
		B.1.33 Local Historian
		B.1.34 Management Information System
		B.1.35 Measuring Electricity
		B.1.36 Moving Electricity
		B.1.37 Passive Sign Convention
		B.1.38 Power Plant Efficiency
		B.1.39 Power System
		B.1.40 Power System Automation
		B.1.41 Power Delivery System
		B.1.42 Substation Automation
		B.1.43 Reliability
		B.1.44 Reliable Operation
	B.2  US Electric Power Industry Overview
		B.2.1 Traditional Electric Utilities
		B.2.2 Meters
		B.2.3 Consumer Sectors
		B.2.4 Energy Sources
		B.2.5 Electric Power Transactions and the Interconnected Networks
	B.3  Examples of Power Grid Glossaries
	References
C Critical Infrastructures Concepts
	C.1 Critical Infrastructures: Plans, Regulations, Frameworks, Programs
		C.1.1 Critical Infrastructure Protection Framework
		C.1.2 Critical Infrastructure Protection (CIP) Program
		C.1.3 Critical Infrastructure Security and Resilience
		C.1.4 Control Systems Security Program
		C.1.5 National Infrastructure Protection Plan
D Smart Grid Concepts
	D.1 US Smart Grid Policy
	D.2 Smart Grid Definitions and Vision
		D.2.1 DOE Future Smart Grid Vision
	D.3 Examples of Smart Grid Technologies
		D.3.1 Active Distribution Network
		D.3.2 Advanced Metering Infrastructure (AMI)
		D.3.3 Aggregation and Aggregator
		D.3.4 Automatic Meter Reading
		D.3.5 Backhaul Communications
		D.3.6 Balance
		D.3.7 Balancing market
		D.3.8 Building Area Networks (BANs)
		D.3.9 Building Automation
		D.3.10 Content of Information Exchange Between DER and Aggregator
		D.3.11 Distributed Energy Resources (DER)
		D.3.12 Distributed Generation (DG)
		D.3.13 Distribution System Operator (DSO) and Transmission System Operator (TSO)
		D.3.14 Flexible DER
		D.3.15 Home Area Networks (HANs)
		D.3.16 Information and Communication Infrastructure
		D.3.17 LonWorks
		D.3.18 Market
		D.3.19 Metropolitan Area Network (MAN)
		D.3.20 Mesh Network
		D.3.21 Microgrid
		D.3.22 Neighborhood Area Networks
		D.3.23 Personal Area Network
		D.3.24 Power Exchange
		D.3.25 Renewable Energy (Re) Sources (RES)
		D.3.26 Resilience/Resiliency
		D.3.27 Smart Device
		D.3.28 Smart Grid Communications
		D.3.29 Smart Meter
		D.3.30 Smart Metering
		D.3.31 Virtual Power Plant
		D.3.32 Wide Area Network
		D.3.33 Smart Grid Glossaries
	D.4 A Smart Grid Diagram: Past, Present, and Future
	D.5 Smart Grid Conceptual Model
		D.5.1 Bulk Generation
		D.5.2 Distribution
		D.5.3 Customer
		D.5.4 Operations
		D.5.5 Markets
		D.5.6 Service Provider
	References
E Acronyms
Index




نظرات کاربران