Cyberattacks are carried out with ma­licious intent, and have the po­tential to compromise the power supply system and render the grid insecure. They can result in equipment maloperation and damage, and may even have a cascading effect leading to a grid blackout. Cyberattacks are staged using the tactics and techniques of initial acc­ess, execution, persistence, privilege es­calation, defence evasion, command and control, and exfiltration. Once acc­ess is gained through privilege escalation, control of information technology (IT) networks and operations of operational technology (OT) systems are ha­ck­ed into in order to gain access to sensitive operational data, which can be used for malicious purposes.

Identifying risks

In order to mitigate cyberattacks, it is ne­cessary to identify system vulnerabilities and formulate a risk assessment methodology that can help identify all possible entry points for cybersecurity breaches. Multiple testing schemes sh­ou­ld be in­cor­porated to check for vulne­rabilities. Moreover, using the numerous test bed systems available in the market, a comprehensive analysis of the possible im­pact of cyberattacks can be done. These test beds use real-time simulation models and intentionally create pseudo cy­berattacks to observe the repercussions.

All segments of the power sector are at equal risk of cyberattacks. In the generation segment, a cyberattack poses the risk of compromising valve and plant co­ntrol, trip protection systems, and fuel stock management. Similarly, the transmission segment is exposed to the risks of supervisory control and data acquisition (SCADA) systems being ha­cked into, as well as cross-site requests forgery attacks. The distribution segme­nt is vulnerable to situations wherein an attacker switches off millions of smart meters simultaneously from a remote location, risking se­curity misconfiguration and sensitive da­ta exposure, and compromising function-level access control.

An often-ignored aspect of the power sector, which is also vulnerable to cyberattacks, is the telemetry infrastructure, whi­ch comprises telemetry systems that connect with the control systems and SCADA architecture of various components in a smart grid. Power system telemetry is highly susceptible to malicious network attacks. Once attacked, the master syst­em is hacked. The slave devices can then be forced to erase critical data.

Based on the analysis of probable threats, uti­lities need to devise alleviation strategies. Proper security measures and att­ack-resistant smart grid infrastructure ne­ed to be developed and tested. In or­der to frame resistant and resilient cyber infrastructure, risk evaluation is a crucial process.

Upcoming technologies for grid security

Broadly, there are two major aspects of cybersecurity for all segments of the power sector – data security and network security. With the advent of internet of things (IoT) in power, both of these have been exposed to greater risks of unauthorised access and theft. Newer technologies can come be helpful in handling this vulnerability.

Data loss prevention technologies can be used to prevent sensitive data exfilt­ration across the cloud and the web us­ing software-as-a-service platforms. The­se can be coupled with extensive pre­defined policy libraries for emer­gen­cies; and cloud access security broker software, which can perform shadow IT reporting and blocking, conduct in-line inspection, and application progra­mming interface inspection. Such technologies can be used to protect a broad range of devices that use IoT from data theft and unauthorised access.

Network security is highly dependent on firewalls, and these are vulnerable to cyberattacks. New-generation firewalls that use internet protocol (IP) packet fra­g­mentation or transmission control protocol segmentation offer better security against cyberattacks. Further, fi­re­walls that are capable of control for fal­se-positive testing, and web filtering for Quick User Datagram Protocol Inter­net Connections based on HTTP/3, can im­prove reliability and stability. Soft­ware-defined wide area networks, zero-trust network access application conn­ectors, or generic routing encapsulation and IPsec can be used for site connectivity and access authenticity, providing a secure network.

Conclusion

With the increasing digitalisation of the power system, utilities need to significantly strengthen their cybersecurity frameworks to maintain safe operati­o­ns. For this, it is crucial for utilities to opt for strong and secure password-pro­tected systems, secure firewalls, in­trusion de­t­ection and intrusion prevention syste­ms, regular backups of data, vulnerability assessment and penetration testing. A robust cybersecurity policy, manpower training and regular re­view meetings to check for system vulnerabilities are also paramount.