Main Article Content
SCADA (Supervisory Control and Data Acquisition) systems as the control unit of the smart grid has been used in almost various industries around the world in terms of automation systems. Smart grid technology combines the energy infrastructure and telecommunications and Internet networks. The system provides the operational ease and efficiency in the industry. However, the system has a lot of vulnerabilities in information security aspects that can have a major impact for the industry and even the economy. This study tried to design in building a smart grid cyber security, it includes the strategies that must be done and the information security system architecture to be built. The study was conducted qualitative in-depth interviews, focus group discussions and direct observation. Results of this research is the design strategy recommendations ddalam development of smart grid cyber security. Recommendation results of this study also intended as a suggestion-making framework for smart grid cyber security as a reference implementation of the smart grid in Indonesia.
JPPI provides immediate open access to its content on the principle that making research freely available to the public to supports a greater global exchange of knowledge.
JPPI by MCIT/Kemenkominfo is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Permissions beyond the scope of this license may be available at https://kominfo.go.id/.
M. Ko., C. Dorantes, “The Impact of Information Security Breaches on Financial Performance of The Breached Firms: an Empirical Investigation”, Journal of Information Technology Management, vol. XVII, pp. 13-22, 2006.
M. Hendrson, “Protecting Critical Infrastructure from Cyber Attacks”, Department of Homeland Security-USA, 2007
Federal Energy Regulatory Commission, "Critical Infrastructure Protection Reliability Standards," Federal Energy Regulatory Commission-USA, 2013.
J. S. Sauver, "SCADA Security," niversity of Oregon Computing Center, 2004.
M. Rydell, "SCADA Security," University of Texas at San Antonio, 2009.
P. A. Metin Ozturk, "SCADA Security: Challenges and Solutions," Schneider Electric, 2011.
National Institute of Standard and Technology, “NIST Framework and Roadmap for Smart Grid Interoperability Standard, Rel. 1.0”, NIST – U.S. Department of Commerce, 2010
National Institute of Standard and Technology, “NISTIR 7628 Guidelines for Smart Grid Cyber Security”, Smart Grid Interoperable Panel (SGIP) Cyber Security Working Group, NIST – U.S. Department of Commerce, 2007
J. F. K. S. Keith Stouffer, NIST Special Publication 800-82 Guide to Industrial Control Systems (ICS) Security, 2011: NIST.
C. T. Wibowo, Modul Pelatihan PLC - SCADA, Universitas Gadjah Mada, 2013.
E. H. Gary J. Finco, "Introduction SCADA Security for Managers and Operators," SANS SCADA Security Summit II, 2006.
M. Winanda, Keamanan Pengiriman Data Pada Smart Grid Untuk Grid Tegangan Tinggi Antar Gardu Induk, STEI ITB, 2014.
J. W. Cresswell, Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, Third Edition, SAGE Publications, Inc, 2008.
A. A. S. S. M. G. Adam Hahn, "Cyber-Physical Security Test beds:Architecture, Application,and Evaluation for Smart Grid," IEEE, 2013.
J. Z. Christian Paulino, "SCADA Security Example," Florida Gulf Coast University, 2012.
K. Zedda, "New generation of Secure SCADA allowing for intelligent threat monitoring," ARTEMIS Industry Association, 2010.
E. Nickolov, “Critical Information Infrastructure Protection: Analysis, Evaluation and Expectations”, INFORMATION & SECURITY. AAN International Journal, vol. 17, pp. 105-119, 2005.
Cyberoam, "Protecting Critical Infrastructure with Cyberoam’s Holistic Security," Cyberoam, 2013.
K. M. L. S. L. B. P. H. Y. Yang, "Multiattribute SCADA-Specific Intrusion Detection System for Power Networks," IEEE, 2014.
K. G. X. Z. T. Z. Xiao Liang, "A Study on Cyber Security of Smart Grid on Public Networks," IEEE, 2013.
P. J. H. S. P. V. R. P. K. G. B. W. Pitt Turner IV, "Tier Classications Dene Site Infrastructure Performance," Uptime Institute, 2008.
S. G. A. D. W. P. S. Jonathan Kirsch, "Survivable SCADA Via Intrusion-Tolerant Replication," IEEE, 2014.
C. M. R. B. B. W. H. Saman Zonouz, "SOCCA:A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures," IEEE, 2014.