NISTIR 7628 CYBER SECURITY VISUALIZATION...NISTIR 7628 CYBER SECURITY VISUALIZATION KARL REINHARD,...
Transcript of NISTIR 7628 CYBER SECURITY VISUALIZATION...NISTIR 7628 CYBER SECURITY VISUALIZATION KARL REINHARD,...
TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG
UNIVERSITY OF ILLINOIS | ARIZONA STATE UNIVERSITY | DARTMOUTH COLLEGE | WASHINGTON STATE UNIVERSITYFUNDING SUPPORT PROVIDED BY DOE-OE AND DHS S&T 1
NISTIR 7628 CYBER SECURITY VISUALIZATION
KARL REINHARD, DAN LONG, BRIANNA
DRENNAN, AND JOHN LEE
UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN
JUNE 18, 2015
2
TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG
PURPOSE: “NISTIR 7628 presents an analytical framework to aid developing
effective cyber security strategies tailored to organizationally unique
combinations of Smart Grid-related characteristics, risks, and vulnerabilities.”
NISTIR 7628 LOGICAL REFERENCE MODEL
3
TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG
NISTIR LOGICAL REFERENCE MODEL (CONT)
4
TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG
NISTIR LOGICAL INTERFACE CATEGORIES (CONT)
5
TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG
3D HTML – USER CONTROLLED PERSPECTIVE
6
TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG
USER CONTROLLED PLAYER & INTERFACE SELECTION