• cybersecurity deployed, configured, and maintained con- sistent with NERC CIP requirements [17] and other evolving requirements [18], [19] in a built-in rather than bolted-on implementation.
• enhanced computing capabilities, e.g., cloud computing
for fail-proof and secure systems to support operator decisions and autonomous intelligent agents;
• Internet technology and protocols to facilitate data exchange and process control using standards-based distributed service oriented architecture with open interfaces with plug-and-play hardware and software components;