Countermeasure methods | Advantages | Disadvantages |
Secure protocols and standards | Flexibility. Simple to manage and maintenance. | No high secure protocols in smart grid. Limited frequency of communication. |
Cryptographic and authentication | Cryptographic algorithms benefits. Confidentiality is recommended. | Implementation complexity. Not always efficient. |
Intrusion prevention | Privacy protection. Prevent abnormal network activities. | Needs to implement with other countermeasure techniques to be able to prevent attacks. |
Spread spectrum techniques | High level of protection. | Complicated implementations. Inefficient bandwidth. |
Game theory-based | Optimal solution. High rates of data. | Mobile users are necessary. |
Education | Simple. Provide enough knowledge to users and employees. | Not enough to protect and prevent the network against attacks. |
Access control and cyber-security policies | High scalability. Simple to understand. | Not ensure protection against attacks. Suitable for small-scale networks. |