7.2 Limitations
Our study of A1-A3 comprised a documentation
study and interviews, but we still do not know de-
tails about the discussions and the priorities made. We
might do the assessments injustice by making state-
ments about whether or not the important risks have
been identified and assessed.
Participant observation poses the risk of bias due
to the researcher’s active role in the process. As au-
thors of the guideline that was used as support, we
might use it differently than an independent process
leader, and we might be too supportive of our own
suggestions.
8 CONCLUDING REMARKS AND
FUTURE WORK
This case study shows that the DSOs need support for
their information security risk assessments, as they
experience challenges related to competence and un-
derstanding of information security issues. Check-
lists and a focus on assets may help in this respect.
However, more studies are needed in order to iden-
tify what type of support will significantly ease the
performing of risk assessments by DSOs. We do not
have a sufficient base for claiming that the use of our
guideline will increase the quality of risk assessments.
Feedback from the participants indicated that they ap-
preciated the process of identifying assets before con-
sidering threats and vulnerabilities, and they felt that
our checklists added value to the process as well. We
would like to stress that our guideline does not present
a new method, but the Norwegian energy industry
does not have traditions for including asset identifica-
tion as part of their risk assessments, and this may be a
valuable approach when information security and pri-
vacy constitute the main focus for these assessments.
Irrespective of availability of guidelines or other
types of support material, it is still important that each
organisation perform their own assessments based on
their specific systems and priorities. Thus the compe-
tence of the participants in an assessment is likely to
be more important than any guideline support.
ACKNOWLEDGEMENT
The authors would like to thank the DSOs that partic-
ipated in our study.
REFERENCES
Caralli, R. A., Stevens, J. F., Young, L. R., and Wilson,
W. R. (2007). The OCTAVE Allegro Guidebook v1.0.
Software Engineering Institute.
Cybenko, G. (2006). Why Johnny Can’t Evaluate Security
Risk. IEEE Security & Privacy, 4(1):5.
EnergiNorgeAS (2012). Overordnet risiko-og
s
˚
arbarhetsanalyse for innføring av AMS. PT-
1070549-RE-01.
Fenz, S. and Ekelhart, A. (2011). Verification, Validation,
and Evaluation in Information Security Risk Manage-
ment. IEEE Security & Privacy, 9(2):58–65.
GAO (1999). Information Security Risk Assessment: Prac-
tices of Leading Organizations. United States General
Accounting Office (GAO).
Gerber, M. and von Solms, R. (2005). Management of
risk in the information age. Computers & Security,
24(1):16 – 30.
Group, T. S. G. I. P. C. S. W. (2010). Guidelines for smart
grid cyber security.
ISO/IEC (2005). ISO/IEC 27001:2005 Information security
management systems - Requirements.
ISO/IEC (2011a). ISO/IEC 27005:2011 Information tech-
nology - Security techniques - Information security
risk management.
ISO/IEC (2011b). ISO/IEC 27035:2011 Information tech-
nology - Security techniques - Information security in-
cident management.
Jourdan, Z., Rainer, K., Marshall, T. E., and Ford, N.
(2010). An Investigation of Organizational Informa-
tion Security Risk Analysis. Journal of Service Sci-
ence, 3(2):33–42.
Line, M. B., Tøndel, I. A., Johansen, G. I., and Sæle, H.
(2013). Informasjonssikkerhet og personvern: Støtte
til risikoanalyse av AMS og tilgrensende systemer
(Norw.). Technical Report A24258, SINTEF. ISBN
978-8-214-053203.
NVE (2010). Veiledning i risiko- og s
˚
arbarhetsanalyser for
kraftforsyningen (in Norwegian). Norwegian Water
Resources and Energy Directorate.
NVE (2013). FOR 1999-03-11 nr 301: Forskrift om m
˚
aling,
avregning og samordnet opptreden ved kraftomset-
ning og fakturering av nettjenester.
Rhee, H.-S., Ryu, Y. U., and Kim, C.-T. (2012). Unreal-
istic optimism on information security management.
Computers & Security, 31(2):221 – 232.
Shedden, P., Ruighaver, A. B., and Ahmad, A. (2010). Risk
Management Standards - The Perception of Ease of
Use. Journal of Information System Security, 6(3):23–
41.
Skapalen, F. and Jonassen, B. (2013). Veileder til sikkerhet
i AMS (in Norw.). NVE.
Sulaman, S. M., Weyns, K., and H
¨
ost, M. (2013). A review
of research on risk analysis methods for IT systems. In
Proceedings of the 17th International Conference on
Evaluation and Assessment in Software Engineering,
EASE ’13, pages 86–96, New York, NY, USA. ACM.
Yin, R. K. (2009). Case Study Research - Design and Meth-
ods, 4th ed., volume 5 of Applied Social Research
Methods. SAGE Publications.
AssessingInformationSecurityRisksofAMI-WhatMakesitsoDifficult?
63