Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Solutions to Prevent Security Attacks of Optimizing Security in Smart Grid

Category: Engineering Paper Type: Report Writing Reference: HARVARD Words: 400

        CipherCloud is an effective cloud security solution to optimize the security. It operates across 3 separate models—SaaS IaaS and PaaS. The CipherCloud software provides a platform that obtains complex information of the customer across manifold public and private cloud applications with no compromising on functionality or performance. Following are some of the major features of the CipherCloud that can be utilized for optimizing security in a smart grid:

Authentication mechanism: It is significant Cloud platform for the authentication mechanism to be strong, and this is one of the most common types of approaches which is used for improving the security in a smart grid.

Malware protection: Malware protection refers to the application of systems of the Cloud platform which are capable of preventing the malware attacks. It must be implemented in a smart grid for making sure that all possible threats are either blocked or mitigated.

Intrusion detection and prevention systems: Network IPS or Intrusion Prevention System and IDS or Intrusion Detection System technologies of Cloud platform must be exploited for preventing internal and external threats. These technologies are capable of protecting the smart grid, and it supports cloud infrastructure.

Weakness calculation and manage the risk: Weakness calculation comprises of figuring out which elements of the grid that are considered to be weak and also easily getting attack by which kinds of threats. By using the previous data, the operator of the smart grid in Cloud platform is able to identify on which elements that have been targeted by which attacks previously. Then, the result will be used to manage the risk and combine them with an appraisal of the potential impact from that weakness on the smart grid (Aloul, Al-Ali, Al-Dalky, Al-Mardini, & El-Hajj, 2012).

Security strengthening: When the threats along with their relative impacts are categorized, then the procedures for strengthening the smart grid should be constructed.

References of Solutions to Prevent Security Attacks of Optimizing Security in Smart Grid

Aloul, F., Al-Ali, A. R., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1-6.

Ekanayake, J. B., Jenkins, N., Liyanage, K., Wu, J., & Yokoyama, A. (2012). Smart Grid: Technology and Applications. John Wiley & Sons.

Mo, Y., Kim, T. H.-J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., & Sinopoli, B. (2012). Cyber–physical security of a smart grid infrastructure. Proceedings of the IEEE, 100(1), 195-209.

 

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Unique Academic Solutions

ONLINE

Unique Academic Solutions

6510 Orders Completed

Academic Master

ONLINE

Academic Master

2877 Orders Completed

Engineering Guru

ONLINE

Engineering Guru

8001 Orders Completed