{"id":189581,"date":"2024-06-26T11:04:33","date_gmt":"2024-06-26T09:04:33","guid":{"rendered":"https:\/\/www.rse-web.it\/pubblicazioni\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/"},"modified":"2024-11-21T10:30:00","modified_gmt":"2024-11-21T09:30:00","slug":"the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users","status":"publish","type":"pubblicazioni","link":"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/","title":{"rendered":"The implementation of cybersecurity for data exchange with active MT users"},"content":{"rendered":"<p class=\"last-updated-date\">Recently updated on November 21st, 2024 at 10:30 am<\/p>","protected":false},"excerpt":{"rendered":"<p>The article presents the cybersecurity technologies introduced by Italian legislation for the protection of information exchange related to generation plants connected to the medium-voltage distribution network.<\/p>\n","protected":false},"author":93,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"tags":[652,1344,1333,1300,1341,1330],"targets":[1313,1304,1314,1317],"pubblicazioni_tipologie":[772],"class_list":["post-189581","pubblicazioni","type-pubblicazioni","status-publish","hentry","tag-active-networks","tag-cybersecurity-en","tag-energy-security","tag-industrial-sector","tag-infrastructure","tag-security-en","targets-decision-makers","targets-industrial-world","targets-press-media-en","targets-research","pubblicazioni_tipologie-article-en"],"acf":{"dont_show_hompage":true,"projects":{"ID":188406,"post_author":"93","post_date":"2024-06-13 15:10:14","post_date_gmt":"2024-06-13 13:10:14","post_content":"","post_title":"Integrated Project for Energy System Cybersecurity","post_excerpt":"The project has the threefold goal of developing studies, tools and methodologies aimed at: \n- ensuring the security of communication technologies in energy systems; \n- preserving the resilience of the electricity system in case of cyber attacks; \n- leveraging artificial intelligence for the detection of cyber anomalies in energy infrastructure.\n","post_status":"publish","comment_status":"open","ping_status":"closed","post_password":"","post_name":"integrated-project-for-energy-system-cybersecurity","to_ping":"","pinged":"","post_modified":"2024-07-02 10:30:09","post_modified_gmt":"2024-07-02 08:30:09","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.rse-web.it\/progetti\/integrated-project-for-energy-system-cybersecurity\/","menu_order":0,"post_type":"progetti","post_mime_type":"","comment_count":"0","filter":"raw"},"order_posts":"","dont_show_search":false,"related_posts":false,"show_on_slider":false,"single_post_data":{"titolo_spot":"","post_content":"<p>The cybersecurity risks related to control infrastructures of energy systems are recognized as a priority by sector regulations. The article presents the cybersecurity technologies introduced by Italian regulations for protecting information exchange concerning generation plants connected to the medium-voltage distribution network.<\/p>\n","scarica_file":[{"download_option":"download","file_name":"Download Publication","download":{"ID":184931,"id":184931,"title":"22009611","filename":"22009611.pdf","filesize":1391082,"url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2023\/12\/22009611.pdf","link":"https:\/\/www.rse-web.it\/en\/pubblicazioni\/limplementazione-della-cybersecurity-per-lo-scambio-dati-con-utenti-attivi-mt\/attachment\/22009611\/","alt":"","author":"93","description":"","caption":"","name":"22009611","status":"inherit","uploaded_to":184930,"date":"2023-12-13 14:14:45","modified":"2023-12-13 14:14:45","menu_order":0,"mime_type":"application\/pdf","type":"application","subtype":"pdf","icon":"https:\/\/www.rse-web.it\/wp-includes\/images\/media\/document.png"}},{"download_option":"download","file_name":"Cover Table of Contents Journal","download":{"ID":184933,"id":184933,"title":"Copertina_Indice_ENERGIA ELETTRICA 2 2022","filename":"Copertina_Indice_ENERGIA-ELETTRICA-2-2022.pdf","filesize":312069,"url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2023\/12\/Copertina_Indice_ENERGIA-ELETTRICA-2-2022.pdf","link":"https:\/\/www.rse-web.it\/en\/pubblicazioni\/limplementazione-della-cybersecurity-per-lo-scambio-dati-con-utenti-attivi-mt\/copertina_indice_energia-elettrica-2-2022\/","alt":"","author":"93","description":"","caption":"","name":"copertina_indice_energia-elettrica-2-2022","status":"inherit","uploaded_to":184930,"date":"2023-12-13 14:18:39","modified":"2023-12-13 14:18:39","menu_order":0,"mime_type":"application\/pdf","type":"application","subtype":"pdf","icon":"https:\/\/www.rse-web.it\/wp-includes\/images\/media\/document.png"}}],"link_estreno":false,"button":{"text":"","link":""},"referente_group":false,"data_emissione":"2022-04-30","autori":"G. Dondossola, R. Terruggia, M.G. Todeschini (RSE S.p.A.)","destinazione":"Electrical Energy, No. 2 Vol. 99, March\/April 2022, pp. 11-19","rif_rse":"22009611"},"satellite_post_url":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The implementation of cybersecurity for data exchange with active MT users - RSE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The implementation of cybersecurity for data exchange with active MT users - RSE\" \/>\n<meta property=\"og:description\" content=\"The article presents the cybersecurity technologies introduced by Italian legislation for the protection of information exchange related to generation plants connected to the medium-voltage distribution network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/\" \/>\n<meta property=\"og:site_name\" content=\"RSE\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-21T09:30:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/\",\"url\":\"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/\",\"name\":\"The implementation of cybersecurity for data exchange with active MT users - RSE\",\"isPartOf\":{\"@id\":\"https:\/\/www.rse-web.it\/#website\"},\"datePublished\":\"2024-06-26T09:04:33+00:00\",\"dateModified\":\"2024-11-21T09:30:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rse-web.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The implementation of cybersecurity for data exchange with active MT users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rse-web.it\/#website\",\"url\":\"https:\/\/www.rse-web.it\/\",\"name\":\"RSE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.rse-web.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rse-web.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rse-web.it\/#organization\",\"name\":\"RSE\",\"url\":\"https:\/\/www.rse-web.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"contentUrl\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"width\":734,\"height\":164,\"caption\":\"RSE\"},\"image\":{\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The implementation of cybersecurity for data exchange with active MT users - RSE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/","og_locale":"en_US","og_type":"article","og_title":"The implementation of cybersecurity for data exchange with active MT users - RSE","og_description":"The article presents the cybersecurity technologies introduced by Italian legislation for the protection of information exchange related to generation plants connected to the medium-voltage distribution network.","og_url":"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/","og_site_name":"RSE","article_modified_time":"2024-11-21T09:30:00+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/","url":"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/","name":"The implementation of cybersecurity for data exchange with active MT users - RSE","isPartOf":{"@id":"https:\/\/www.rse-web.it\/#website"},"datePublished":"2024-06-26T09:04:33+00:00","dateModified":"2024-11-21T09:30:00+00:00","breadcrumb":{"@id":"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rse-web.it\/en\/publications\/the-implementation-of-cybersecurity-for-data-exchange-with-active-mt-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rse-web.it\/en\/"},{"@type":"ListItem","position":2,"name":"The implementation of cybersecurity for data exchange with active MT users"}]},{"@type":"WebSite","@id":"https:\/\/www.rse-web.it\/#website","url":"https:\/\/www.rse-web.it\/","name":"RSE","description":"","publisher":{"@id":"https:\/\/www.rse-web.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rse-web.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rse-web.it\/#organization","name":"RSE","url":"https:\/\/www.rse-web.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","contentUrl":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","width":734,"height":164,"caption":"RSE"},"image":{"@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/"}}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/pubblicazioni\/189581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/pubblicazioni"}],"about":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/types\/pubblicazioni"}],"author":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/comments?post=189581"}],"version-history":[{"count":2,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/pubblicazioni\/189581\/revisions"}],"predecessor-version":[{"id":199199,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/pubblicazioni\/189581\/revisions\/199199"}],"wp:attachment":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/media?parent=189581"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/tags?post=189581"},{"taxonomy":"targets","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/targets?post=189581"},{"taxonomy":"pubblicazioni_tipologie","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/pubblicazioni_tipologie?post=189581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}