Framework for threat modelling for a power utility: case of Zimbabwe Power Utility Company
The purpose of this study was analyse threats that are inherent in the prepaid electricity meter system and to propose a framework for threat modelling. This framework can be effectively used by power utilities power utilities in particular and other prepaid meter system organisations to achieve end...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | http://www.ijcsbi.org/index.php/ijcsbi/article/view/650 http://hdl.handle.net/11408/1755 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1779905192627535872 |
---|---|
author | Musungwini, Samuel Mahlangu, Gilbert Mugoniwa, Beauty Furusa, Samuel S. |
author_facet | Musungwini, Samuel Mahlangu, Gilbert Mugoniwa, Beauty Furusa, Samuel S. |
author_sort | Musungwini, Samuel |
collection | DSpace |
description | The purpose of this study was analyse threats that are inherent in the prepaid electricity meter system and to propose a framework for threat modelling. This framework can be effectively used by power utilities power utilities in particular and other prepaid meter system organisations to achieve end-to-end actionable insights on prepaid electricity metering infrastructure. The study used a qualitative case research methodology with a single unit of analysis. A purposive sampling technique was used to select suitable participants. Data was collected from power utility engineers and security experts using semi-structured interviews and focus group in order to triangulate the research findings. The findings of the study indicated that at the present moment there are very few frameworks that can be explicitly used to model threat to prepaid electricity infrastructure. This has exposed the infrastructure to various attacks such as physical bypass, cyber-attack and mechanically induced attack. We therefore recommend the adoption of an explicit framework for modelling threat in prepaid metering infrastructure. |
format | Article |
id | ir-11408-1755 |
institution | My University |
language | English |
publishDate | 2016 |
record_format | dspace |
spelling | ir-11408-17552022-06-27T13:49:06Z Framework for threat modelling for a power utility: case of Zimbabwe Power Utility Company Musungwini, Samuel Mahlangu, Gilbert Mugoniwa, Beauty Furusa, Samuel S. Threat modelling, cyber attack, electricity theft, framework, ICTs, Mobile technologies. The purpose of this study was analyse threats that are inherent in the prepaid electricity meter system and to propose a framework for threat modelling. This framework can be effectively used by power utilities power utilities in particular and other prepaid meter system organisations to achieve end-to-end actionable insights on prepaid electricity metering infrastructure. The study used a qualitative case research methodology with a single unit of analysis. A purposive sampling technique was used to select suitable participants. Data was collected from power utility engineers and security experts using semi-structured interviews and focus group in order to triangulate the research findings. The findings of the study indicated that at the present moment there are very few frameworks that can be explicitly used to model threat to prepaid electricity infrastructure. This has exposed the infrastructure to various attacks such as physical bypass, cyber-attack and mechanically induced attack. We therefore recommend the adoption of an explicit framework for modelling threat in prepaid metering infrastructure. 2016-08-12T10:15:38Z 2016-08-12T10:15:38Z 2016 Article 1694-2507 http://www.ijcsbi.org/index.php/ijcsbi/article/view/650 http://hdl.handle.net/11408/1755 en International Journal of Computer Science and Business Informatics;Vol. 16, No. 1; p. open |
spellingShingle | Threat modelling, cyber attack, electricity theft, framework, ICTs, Mobile technologies. Musungwini, Samuel Mahlangu, Gilbert Mugoniwa, Beauty Furusa, Samuel S. Framework for threat modelling for a power utility: case of Zimbabwe Power Utility Company |
title | Framework for threat modelling for a power utility: case of Zimbabwe Power Utility Company |
title_full | Framework for threat modelling for a power utility: case of Zimbabwe Power Utility Company |
title_fullStr | Framework for threat modelling for a power utility: case of Zimbabwe Power Utility Company |
title_full_unstemmed | Framework for threat modelling for a power utility: case of Zimbabwe Power Utility Company |
title_short | Framework for threat modelling for a power utility: case of Zimbabwe Power Utility Company |
title_sort | framework for threat modelling for a power utility: case of zimbabwe power utility company |
topic | Threat modelling, cyber attack, electricity theft, framework, ICTs, Mobile technologies. |
url | http://www.ijcsbi.org/index.php/ijcsbi/article/view/650 http://hdl.handle.net/11408/1755 |
work_keys_str_mv | AT musungwinisamuel frameworkforthreatmodellingforapowerutilitycaseofzimbabwepowerutilitycompany AT mahlangugilbert frameworkforthreatmodellingforapowerutilitycaseofzimbabwepowerutilitycompany AT mugoniwabeauty frameworkforthreatmodellingforapowerutilitycaseofzimbabwepowerutilitycompany AT furusasamuels frameworkforthreatmodellingforapowerutilitycaseofzimbabwepowerutilitycompany |