interruption handling, but will at the same time
introduce new vulnerabilities and threat scenarios,
leading to unwanted incidents. One example of how
adversaries can exploit the new components and
technologies, is the cyber-attack against the
Ukrainian Power Grid in December 2015, where the
outages affected approximately 225 000 customers
that lost power across various areas (Lee et al., 2016).
The new architectures of the ICT dominated power
system will increase the complexity and therefore
calls for approaches to identify the cybersecurity risks
of the complex cyber-physical power system.
Risk modelling is a technique for risk
identification and assessment, and the state-of-the-art
offers several tree-based and graph-based notations.
Fault Tree Analysis (IEC, 1990), Event Tree Analysis
(IEC, 1995) and Attack Trees (Schneier, 1999) are
examples of the former and provide support for
reasoning about the sources and consequences of
unwanted incidents, as well as their likelihoods.
Cause-Consequence Analysis (Nielsen, 1971),
CORAS (Lund et al., 2010), and Bayesian networks
(Ben‐Gal, 2008) are examples of graph-based
notations. CORAS is a tool-supported and model-
driven approach to risk analysis that is based on the
ISO 31000 risk management standard (ISO, 2009). It
uses diagrams as a means for communication,
evaluation and assessment. Markov models (IEC,
2006), CRAMM (Barber and Davey, 1992),
OCTAVE (Alberts et al., 2003), Threat Modelling
(Microsoft, 2018) and a number of others, have also
been applied to support risk analysis. A framework
for studying vulnerabilities and risk in the electricity
supply, based on the bow-tie model, has been
developed and is published for instance in (Kjølle and
Gjerde, 2015, Kjølle and Gjerde, 2012, Hofmann et
al., 2012). As stated in (Tøndel et al., 2017) the
current methods for risk analysis of power systems
seem unable to take into account the full array of
intentional and accidental threats. In addition, they
found few methods and publications on identification
of interdependencies between the ICT and power
system (Tøndel et al., 2017). However, as they stand,
none of the existing approaches provides the support
that meets specific needs for cybersecurity risk
analysis of smart power grids. Power grids are namely
characterized by very high complexity and a
significant degree of interdependencies. As a critical
infrastructure which is undergoing a rapid digital
transformation, these cyber-physical systems are
safety critical and their cybersecurity is becoming
crucial. They include assets such as physical power
network, communication protocols, control systems,
human in the loop, and many emerging types of
hardware and software such as sensors, remote
decision support systems, algorithms for automatic
response to failures, load balancing, etc. These assets
constitute the building blocks for the on-going
digitalization efforts, as a means for enabling the
power grids of meeting the future needs in terms of
capacity, efficiency and reliability. Many of the
solutions are new to the domain and there is a lack of
formerly established experiences with regard to their
strengths and weaknesses. The complexity and the
lack of prior empirical knowledge contribute to the
inherent uncertainty and the overall risk picture.
Moreover, the interdisciplinary nature of such
systems poses requirements on comprehensibility of
the design of smart power grids and the
corresponding risk models. Since the emerging
solutions are at their early stages, there is a lack of
historical data and operational experiences that could
constitute relevant input to the risk models. Even if
such data exists, it is of a limited scope and precision
in the context of smart power grids. A smart grid
setting which includes a complex and critical cyber
physical system, human in the loop, uncertainty due
to lack of knowledge, many dependencies and
interdisciplinary aspects, challenges the state-of-the-
art on cybersecurity management within the power
distribution sector. This indicates a need for an
approach to cybersecurity risk identification which is
customized to meet the following requirements (the
ordering is arbitrary and does not express the relative
the importance of the requirements):
1. The approach is cost-effective and light-weight,
i.e. the benefits of using it are well worth the
effort.
2. The cyber risk model can be developed and easily
understood by the involved actors who represent
varying roles and background.
3. The risk model has sufficient expressive power to
capture relevant aspects of the cybersecurity risk
picture in the context of smart power grids.
4. The risk model facilitates inclusion of the
information that is available, while not requesting
unrealistic degree of precision.
5. The risk model can visualize the cybersecurity
relevant dependencies and sequence of
states/events both for the whole context and for
the detailed parts of the scope of analysis.
This paper proposes a customized four-step approach
to identification of cybersecurity risks in the context
of smart power grids. The aim is that the risk model
can be presented to human in a suitable interface,
thereby serving as a useful support for decision
making during design and operation.