Please use this identifier to cite or link to this item:
https://cris.library.msu.ac.zw//handle/11408/1755
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Musungwini, Samuel | - |
dc.contributor.author | Mahlangu, Gilbert | - |
dc.contributor.author | Mugoniwa, Beauty | - |
dc.contributor.author | Furusa, Samuel S. | - |
dc.date.accessioned | 2016-08-12T10:15:38Z | - |
dc.date.available | 2016-08-12T10:15:38Z | - |
dc.date.issued | 2016 | - |
dc.identifier.issn | 1694-2507 | - |
dc.identifier.uri | http://www.ijcsbi.org/index.php/ijcsbi/article/view/650 | - |
dc.identifier.uri | http://hdl.handle.net/11408/1755 | - |
dc.description.abstract | The purpose of this study was analyse threats that are inherent in the prepaid electricity meter system and to propose a framework for threat modelling. This framework can be effectively used by power utilities power utilities in particular and other prepaid meter system organisations to achieve end-to-end actionable insights on prepaid electricity metering infrastructure. The study used a qualitative case research methodology with a single unit of analysis. A purposive sampling technique was used to select suitable participants. Data was collected from power utility engineers and security experts using semi-structured interviews and focus group in order to triangulate the research findings. The findings of the study indicated that at the present moment there are very few frameworks that can be explicitly used to model threat to prepaid electricity infrastructure. This has exposed the infrastructure to various attacks such as physical bypass, cyber-attack and mechanically induced attack. We therefore recommend the adoption of an explicit framework for modelling threat in prepaid metering infrastructure. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartofseries | International Journal of Computer Science and Business Informatics;Vol. 16, No. 1; p. | - |
dc.subject | Threat modelling, cyber attack, electricity theft, framework, ICTs, Mobile technologies. | en_US |
dc.title | Framework for threat modelling for a power utility: case of Zimbabwe Power Utility Company | en_US |
dc.type | Article | en_US |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.openairetype | Article | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
Appears in Collections: | Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FRAMEWORK FOR THREAT MODELLING FOR A POWER UTILITY.pdf | Abstract | 5.2 kB | Adobe PDF | View/Open |
Page view(s)
52
checked on Nov 22, 2024
Download(s)
24
checked on Nov 22, 2024
Google ScholarTM
Check
Items in MSUIR are protected by copyright, with all rights reserved, unless otherwise indicated.