Generation, distribution and transmission use different systems and technologies and are all high value targets for cyber attackers. Distributed systems make protection more complex as all remote sites need to be secured.