Share this post on:

Ly present what will be the security needs that have to be
Ly present what are the safety requirements that have to become fulfilled [33,34]. The first part of the first stage was a systematic literature review and evaluation followed by the choice of the relevant security publications for vital infrastructure protection. The aim was to discover the publications that can support inside the extraction of safety handle classes and construction of the model for security needs which will assist with cross-publication compliance checks and suitable security assessments. As with any literature assessment, the limitations of our overview method have to be noted. The evaluation was performed based only on our interpretation on the papers. Furthermore, we can not absolutely rule out the existence of other relevant requirements which can be applied in some geographic regions but that were not integrated inside the evaluation. Some proposals might have not found their place in the evaluation as a result of various motives such as terminology applied by authors which didn’t bring a paper for the attention of our analysis, a paper not becoming listed on the databases examined, or not consulting the gray literature. Nonetheless, the literature search process Ethyl Vanillate site adopted helped to make sure an acceptable degree of completeness of our literature review. Hence, we think that the set of papers analyzed is representative and the results in the evaluation may be generalized for the intelligent grid domain. The literature review was carried out following the methodological method proposed by authors in [35]. The aggregative databases Google Scholar and Semantic Scholar that include papers of a lot of publishers also as recognized publishers which include IEEE and Springer were used in the search. Search search phrases were “cybersecurity”, “security”, “standard”, and “requirements”, but as the results had been as well broad, more key phrases “smart grid”, “power grid”, and “electrical grid” have been distinctively added in mixture with all the initially four. Nonetheless, distinctive search engines like google inside the majority looked at every of the search phrases individually; as a result, the initial outcomes had to become refined additional by looking at the titles, keyword phrases, D-Fructose-6-phosphate disodium salt Metabolic Enzyme/Protease abstracts, and eliminating duplicate and irrelevant studies, too as employing backward and forward reference “snowballing” approach. By employing that method, the initial records count was substantially decreased and 34 papers that were relevant for the study had been additional analyzed. Following a evaluation on the chosen papers, the greatest quantity of them only talked about relevant publications in other contexts, and only a handful of of them presented the study more comprehensively. The occurrence with the most talked about publications in relevant context is presented in Table 1.Energies 2021, 14,9 ofTable 1. Publication occurrences within the study. Publication NERC CIP IEC 62351 ISO/IEC 27001/27002 NISTIR 7628 NIST SP 800-53 IEC 62443 (ISA 99) NIST SP 800-82 IEC 61850 GB/T 22239 DHS Catalog Variety of Publication Regulation Normal Normal Typical Guideline Common Guideline Normal Common Guideline Occurrence 16 14 11 11 9 8 6 four 3After the evaluation, the selection of the relevant publications was performed. You can find different qualitative [368] approaches that evaluate requirements by their domain, structure, and maturity as well as quantitative [21] approaches that base their evaluation on the variety of occurrences of certain search phrases within the text. Within this analysis, the initial choice was depending on the quantitative strategy followed by additional qualitative needs for mo.

Share this post on:

Author: PDGFR inhibitor

Leave a Comment