Advertisement

Cyber Security Analysis of the Electric Power Information System in Montenegro

Conference paper
  • 486 Downloads
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 128)

Abstract

In most countries, the electricity sector is designated as critical infrastructure. Therefore, nowadays, the field of cyber security is a crucial component in the functioning of all factors in the electricity sector of a country. A similar situation is observed in Montenegro, where the energy sector is designated as critical and highly ranked on the priority list for ensuring high-quality cyber security. Analyzing existing models at the global level, and taking into account the standards and recommendations provided by the relevant institutions, the authors of this paper have made an effort to illustrate the current state of cyber security of the electricity system in Montenegro, using the Feature model. Based on the established model, an analysis of the cybersecurity situation of this sector was done and some conclusions were drawn.

Keywords

Power system Cyber security Critical infrastructure Feature model ES-C2M2 

References

  1. 1.
    Ministry of Public Administration: Cyber Security Strategy of Montenegro 2018–2021. Government of Montenegro, Podgorica (2018)Google Scholar
  2. 2.
    Government of Montenegro: Proposal for a Law on Determination and Protection of Critical Infrastructure, Podgorica (2019)Google Scholar
  3. 3.
    US Department of Energy, US Department of Homeland Security: Electricity Subsector Cybersecurity Capability Maturity Model v1.1 (2014)Google Scholar
  4. 4.
    European Union Agency for Cybersecurity (ENISA): Analysis of ICS-SCADA Cyber Security Maturity Levels in Critical Sectors, 11 December 2015. https://www.enisa.europa.eu/publications/maturity-levels/at_download/fullReport
  5. 5.
    Knapp, E., Samani, R.: Applied Cyber Security and the Smart Grid - Implementing Security Controls into the Modern Power Infrastructure. Syngress - Elsevier (2013)Google Scholar
  6. 6.
    Knapp, E.: A New Cyber Security Model for SCADA, 1 May 2012. https://www.securityweek.com/new-cyber-security-model-scada. Accessed 25 Dec 2019
  7. 7.
    Red Tiger Security: SCADA Security Maturity Model. Red Tiger Security. http://redtigersecurity.com/services/scadaics-security-consulting/scada-security-maturity-model/. Accessed 25 Dec 2019
  8. 8.
    US Department of Energy: Electricity Subsector Cybersecurity Risk Management Process (2012)Google Scholar
  9. 9.
    Šendelj, R., Ognjanović, I.: Multi-criteria decision making for optimal configuration of business process model families. Inf. Technol. Control 47(3), 532–563 (2018)Google Scholar
  10. 10.
    Šendelj, R., Ognjanović, I.: Framework for optimal selection using meta-heuristic approach and AHP algorithm. In: Applications and Theory for Analytic Hierarchy Process - Decision making for strategic decisions, Rijeka, Croatia, pp. 193–217. InTech (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Ministry of Public Administration, Directorate of Electronic Governance and Information SecurityPodgoricaMontenegro
  2. 2.University of Donja GoricaPodgoricaMontenegro
  3. 3.University of Donja GoricaPodgoricaMontenegro

Personalised recommendations