Cover Image
市場調查報告書

美國的電力產業上的網路安全

Cybersecurity in the US Power Industry

出版商 Frost & Sullivan 商品編碼 324210
出版日期 內容資訊 英文 61 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
美國的電力產業上的網路安全 Cybersecurity in the US Power Industry
出版日期: 2015年02月05日 內容資訊: 英文 61 Pages
簡介

重要基礎設施產業深化擴張到數位&智慧領域,對先進執拗的電腦網路攻擊脆弱性增加。在美國的電力產業中,符合法規成為投資網路安全的推動因素。

本報告提供美國的電力產業上網路安全趨勢的相關調查、電力產業現狀和漏洞高的領域、產業的痛點、網路安全技術、發電及輸配電部門的網路安全狀況、解決方案、最佳業務實踐、未滿足需求、課題、法律制度等相關彙整。

摘要整理

  • 主要調查結果
  • 主要調查結果、未來展望

第2章 調查範圍、目的、背景、手法

第3章 定義和市場區隔

第4章 市場概要

  • 電力產業現狀
  • 漏洞高的區域
  • 產業的痛點
  • 電力產業的威脅的載體

第5章 大趨勢與產業的融合的影響

  • 主要的電力產業的大趨勢對網路安全市場的影響
  • 智慧電網及網路安全的影響
  • 智慧電網發展情況
  • 雲端的影響
  • 智慧電網的遠隔能力
  • 未來的解決方案

第6章 技術分析

  • 技術分析
  • 投資網路安全的推進因素
  • 客戶方面的展望
  • 技術方面的展望
  • 新興技術
  • 安全情報
  • 自動需量反應(ADR)的影響與最佳業務實踐
  • 多層安全

第7章 發電部門分析

  • 發電部門的網路安全
  • 發電解決方案
  • 發電的數位行蹤
  • 優先事項

第8章 輸配電部門分析

  • 輸配電部門的網路安全
  • 輸配電解決方案
  • 輸配電的數位行蹤
  • 優先事項

第9章 美國

  • 美國市場:主要調查結果
  • 電力產業上網路安全相關的法律規章的發展
  • 有益的法律規章與有益的解決方案
  • NERC CIP V5
  • 課題

第10章 總論、未來展望

  • 總論、未來展望
  • 彙整:三大預測
  • 免除責任

第11章 附錄

目錄
Product Code: NF0A-01-00-00-00

Regulatory Compliance is the Main Investment Driver

Critical infrastructure industries are increasingly expanding into the digital and smart frontier, become more vulnerable to advanced and persistent cyberattacks. This research service examines emerging trends and business models in the US power industry - from generation to transmission and distribution - that will affect the cybersecurity market. It was developed based on a series of Frost & Sullivan-moderated online discussion boards with participants in the power, chemicals and petrochemicals, and oil and gas industries. The study examines the current state of cybersecurity preparedness, as well as best practices, unmet needs, and industry challenges.

Key Questions this Study will Answer

  • What are the current states of awareness and concern regarding cybersecurity in the US power industry?
  • What are some of the critical challenges facing the industry regarding awareness and adoption, and how are those challenges being addressed?
  • How can vendors optimize their support role in executing a cybersecurity strategy?
  • What new business models are emerging from the evolution of smart grids?
  • What are the best practices related to cybersecurity in the power industry?

Table of Contents

1. EXECUTIVE SUMMARY

  • 1. Key Findings
  • 2. Key Findings and Future Outlook

2. RESEARCH SCOPE, OBJECTIVES, BACKGROUND, AND METHODOLOGY

  • 1. Research Scope
  • 2. Research Aim and Objectives
  • 3. Key Questions this Study will Answer
  • 4. Research Background
  • 5. Research Methodology
  • 6. Study Participants

3. DEFINITIONS AND SEGMENTATION

  • 1. Segmentation
  • 2. Definitions
  • 3. Power Industry Segmentation

4. MARKET OVERVIEW

  • 1. Current State of the Power Industry
  • 2. Current State of the Power Industry (continued)
  • 3. Areas of Vulnerability
  • 4. Industry Pain Points
  • 5. Threat Vectors in the Power Industry

5. MEGA TRENDS AND INDUSTRY CONVERGENCE IMPLICATIONS

  • 1. Impact of Top Power Industry Mega Trends on the Cybersecurity Market
  • 2. Impact of Top Power Industry Mega Trends on the Cybersecurity Market (continued)
  • 3. Smart Grids and Cybersecurity Implications
  • 4. Evolution of Smart Grids
  • 5. Influence of the Cloud
  • 6. Remote Capabilities in the Smart Grid
  • 7. Future Solutions

6. TECHNOLOGY ANALYSIS

  • Technology Analysis
  • 1. Factors Driving Cybersecurity Investments
  • 2. Customer Perspective
  • 3. Technology Perspective
  • 4. Emerging Technologies
  • 5. Security Intelligence
  • 6. Automated Demand Response Implications and Best Practices
  • 7. Multilayered Security

7. POWER GENERATION SEGMENT ANALYSIS

  • 1. Cybersecurity in the Generation Segment
  • 2. Generation Solutions
  • 3. Power Generation Digital Footprint
  • 4. Priorities

8. POWER TRANSMISSION AND DISTRIBUTION SEGMENT ANALYSIS

  • 1. Cybersecurity in the Transmission and Distribution Segment
  • 2. Transmission and Distribution Solutions
  • 3. Transmission and Distribution Digital Footprint
  • 4. Priorities

9. US ANALYSIS

  • 1. US Key Findings
  • 2. Evolving Cybersecurity Regulations in the Power Industry
  • 3. Good Regulations vs. Good Solutions
  • 4. NERC CIP V5
  • 5. NERC CIP V5 (continued)
  • 6. Challenges

10. CONCLUSIONS AND FUTURE OUTLOOK

  • 1. Key Conclusions and Future Outlook
  • 2. The Last Word-3 Big Predictions
  • 3. Legal Disclaimer

11. APPENDIX

  • 1. Abbreviations Used
Back to Top