Cyber Security of the Smart Grid
|
|
- Terence Harris
- 8 years ago
- Views:
Transcription
1 Cyber Security of the Smart Grid Design Document May /4/11 Group Members John Majzner Daniel Kosac Kyle Slinger Jeremy Deberg Team Advisor Manimaran Govindarasu Graduate Students Adam Hahnad Siddharth Sridhar Aditya Ashok
2 Project Overview Problem Statement: As the world becomes more interconnected and communication is more necessary, a dire problem arises when a third party tries to disrupt this communication. There is a great deal of communication taken place between power companies and the power grid. Power companies use a SCADA system (Supervisory Control And Data Acquisition) to monitor and manage their infrastructure program. This SCADA system has become more prone to attacks in the last decade due to the advancement of technology. The project we were given consists of building a realistic SCADA system, emulating real world attacks on the system, and observing the results due to these attacks. Past Accomplishments: This project has been in progress for many previous semesters with different groups taking steps towards reaching the main goal. These groups that have come before have gotten the system up to a 9 bus system. This however, only includes 2 actual RTUs, and have the other 7 emulated through a virtual machine. There have been multiple security exercises run on the system that stress the basic functionality of the embedded security. By this it implies that the security located on the VPN and built in security to the different PC s is up to par. It also implies that the networking and routes are all setup correctly. Objectives: The first objective that we face is familiarizing ourselves with the system. This was a lot more complicated than anticipated. The conceptual outline of the system is very straightforward; however you must also take into account the embedded software, and the software that is used with the Siemens devices. The group needs to learn each piece of this software and how it communicates with each other. This also needs to be taken to a deeper level if the option of exploiting a software bug is to be used. The amount of options each piece of software has is more than what the project calls for, but in view of keeping the outcome as realistic as possible, the experiment must utilize the software that will be used in the field even if most of the options will never be used. The second objective will be to scale up the SCADA system. The projected size the experiment is to reach is a 30 bus system. However, already in the project this may be a stretch due to the equipment that is available to the group. The group would need to virtualize most of the buses that would be added and the computer hardware isn t there. A more precise objective would be to scale the system at a realistic ratio of buses and implement them successfully before trying to add anymore. The third objective will be to assault the SCADA system with different security exploits. This is an objective that will be extremely vague until the end of the experiment. As the attacks progress the group will adjust the different parameters to account for things they think are a weak spot in the SCADA system. However, different ideas of things to try are already in
3 progress. One such idea is to exploit the common electric company s worker s password. It has been documented that the pattern of passwords used by this class of worker are usually very insecure. Another approach that is being considered is the deep analysis of the packets that are used in the communication between the different system pieces. The group will look to see if there are patterns that exist when different activities are triggered, such as turning off a breaker. This packet will then be emulated and passed back at the system to try to exploit security weaknesses.
4 System Overview Overall: The system is a simulation of data being transmitted over hundreds of miles and seeing how power flow of a power grid will be affected as disruptions occur. Simulation of data and distance is ISEAGE. The power flow is monitored and simulated by the Power Factory and the substations. The Control Center is to make the system more realistic to an actual power system. The Attack box is how we will disrupt the system. ISEAGE: The Internet-Scale Event and Attack Generation Environment or ISEAGE is a network simulation for the real world. This system can emulate large scale events and attacks. ISEAGE is what hooks all of our systems together to simulate them being apart by miles while allowing each terminal to sit next to each other. Control Center: The Control Center uses the software from Siemens. This software is used in actual power grid control centers to monitor the status of the lines. From this terminal we can see if breakers are open or closed and be able to trip them. Power Factory: Power factory is the program that is used for creating the power grid simulation and collecting data. The power factory has the program that collects all the data received from OPC server and can be able to see if the system will not be stable. The dynamic power anayisis from Power Factory will also show how each generator and each load will receive power if something in the system changes. OPC: The OPC is the program that connects the Power Factory to the substations on the network. The OPC run in ISEAGE to allow communication of data from Power Factory to the substation. Then from the substation it can send and receive information from the control center. Relay Substations: The Relays are connected to a substation to allow the simulation to use real physical data to make the system more realistic. These Relays cost more money then the virtuals and take up more space, this is why we only have 2. The final goal is for every substation to have a relay to create a highly realistic system.
5 The Relay s Virtual Substations We can create substations without relays by making them virtual. These virtual substations run on a virtual machine making them very low cost and not take up much space. The conversion from virtual to relay should be a simple setup process and not require digital coding to work. We use the virtual stations so when we get the relays the setup will be fast and have the system fully operational to test. Attack Box: The mu attack box is a system that can generate common types of digital attacks. DDoS attacks and corrupted information is our primary focus. Activating this device while it is hooked up to a power grid will crash the system. Our ultimate goal is to have the box trying to crash the system and the grid working as if nothing was wrong.
6 System Concept
7 Design One of the primary goals of this project is to increase the complexity of the current power system simulation. The current system contains 9 buses, along with 3 generators, 3 simulated loads, 2 real substations, and 2 real loads. Our goal is to increase the number of buses to 30, along with many new generators and loads. The simulation software used is called Power Factory, and this software ties into the control center and the virtual machines using a server called OPC. Building a New Bus: There are several things that must be done in order to create a new bus. First, the bus along with any generators, loads, transformers, and transmission lines must be created in Power Factory. This allows all aspects of the system to be simulated in a wide variety of conditions. After the bus is created in Power Factory, a virtual machine must be created to facilitate the communication with the control center. The virtual machine is used to simulate the real-world communication environment with many nodes, data delay, and possible security holes. After the virtual machine is created, all of the breakers need to be mapped in the control center. This allows the breakers to be controlled remotely. Finally, the OPC server must be setup to allow communication between Power Factory, the virtual machines, and the control center. Steps to Adding a Bus Power Factory: Power Factory is a software environment that allows all forms of power system to be built, tested, and simulated. Many types of faults can be tested, and contingency analysis can be carried out to ensure a stable and healthy system. Power factory is also designed to be able to communicate with several other programs for a simulation closer to that of reality. Bus: A bus in the simulation in Power Factory corresponds to a real world substation. There are several breakers connected to each bus, and each breaker is connected to either a generator, load, transformer, or transmission line. The data associated with a bus includes voltage, current, and power flow. A bus is created by selecting either a single bar bus or a double bar bus. Most times, a single bar bus is used for the distribution system and double bar buses are used for a transmission system. The current simulation consists of a distribution system, so single bar buses will be created. After a bus is added, the desired machines, loads, transmission lines, and transformers must be connected. Generator: Generators are an essential component of any power system. A generator can be any
8 number of machines, solar systems, or storage systems such as batteries. In our system only synchronous machines are used as generators, so these will be added to some of the additional buses. After a generator is added a plant model must be created which contains all kinds of information about how the machine operates under a variety of conditions. This model contains a file with all of this information and must be updated with each additional generator. Lines: Transmission lines are used to transport power from the generator locations to the load locations. Each bus is connected to other bus(es) through transmission lines. These lines must be included in the model because they contain resistance, inductance, and capacitance. These values vary depending on which type of cable is used, and the physical distance between buses. Transmission lines of varying lengths will be used in our model because in a real world system, substations are spaced out at different distances. Load: Loads correspond to anything connected to a bus which consumes electrical energy. In the current system there are 2 real loads and several simulated loads. We will be adding additional simulated loads. These loads contain information about real and reactive power consumed, and many times are connected to a bus through a transmission line. Transformers: Transformers are devices that are used to change the voltage level between two buses. This is necessary because generators produce power at relatively low voltage, but a higher voltage is desired for transmission. Higher voltage transmission results in lower line losses. Any time there is a voltage difference between two buses, a transformer must be used to make the connection. OPC: The server that is used to communicate between the virtual machines, Power Factory, and the control center is called OPC. There are two components that must be added: server entries for the additional breakers and explorer entries for the same information. The OPC explorer contains information about the status of the breakers and the commands that have been sent from the control center. Virtual Machine: Virtual machines are created for each bus, and are an intermediate between the control center and the Power Factory simulated bus. The virtual machines define how the information is exchanged and contain address information for the OPC server. Control Center: The control center is used as an interface between the power system and the humans that are keeping it running correctly. Information about the status of the system is available at the control center, and alarms will go off if any problems are detected in the system. Breakers can also be controlled from the control center for fault clearance and other uses. Information for each new bus must be added to the control center for the system to remain functional.
9
10 Testing System
11 Documenting Results
Design Document. Team Members: Tony Gedwillo James Parrott David Ryan. Faculty Advisor: Dr. Manimaran Govindarasu
12/6/2010 SDMAY11-11 CYBER SECURITY OF SCADA SYSTEMS TEST BED Design Document Team Members: Tony Gedwillo James Parrott David Ryan Faculty Advisor: Dr. Manimaran Govindarasu Design Document Tony Gedwillo
More informationSEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
More informationMonitoring & Control of Small-scale Renewable Energy Sources
Small Scale Renewable Energy Sources and Energy Saving: 6-17 th July 2009 Monitoring & Control of Small-scale Renewable Energy Sources Dr G A Taylor Brunel Institute of Power Systems Brunel University,
More informationPower products and systems. Intelligent solutions for power distribution Zone concept
Power products and systems Intelligent solutions for power distribution Zone concept Securing continuous power supply ABB is one of the world's leading power and automation technology companies whose products,
More informationTesting Intelligent Device Communications in a Distributed System
Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) dgoughnour@trianglemicroworks.com United States Smart Grid systems
More informationIEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847
IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847 Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid Adam Hahn, Student Member, IEEE, Aditya Ashok, Student
More informationSCADA System Overview
Introduction SCADA systems are critical to the control and monitoring of complex cyber-physical systems. Now with advanced computer and communications technologies, SCADA systems are connected to networks
More informationManage Utility IEDs Remotely while Complying with NERC CIP
Manage Utility IEDs Remotely while Complying with NERC CIP Disclaimer and Copyright The information regarding the products and solutions in this document are subject to change without notice. All statements,
More informationOPERATIONS CAPITAL. The Operations Capital program for the test years is divided into two categories:
Filed: September 0, 00 EB-00-0 Tab Schedule Page of OPERATIONS CAPITAL.0 INTRODUCTION Operations Capital funds enhancements and replacements to the facilities required to operate the Hydro One Transmission
More informationNetwork Security Infrastructure Testing
Network Security Infrastructure Testing Version 1.2 October 12, 2005 Prepared by: Sandia National Laboratories Center for SCADA Security Project Lead Ray Parks Technical Lead Jason Hills Technical Support
More informationTrusting the Data: Analytics and Visualization. Copyr i ght 2014 O SIs oft, LLC.
Trusting the Data: Analytics and Visualization Presented by John Juna About us Electric Delivery Company Providing service to approximately 3.8 million customers across Northern Illinois Manages 90,000
More informationApplication-oriented testing of line differential protection end to end in the field using the corresponding RelaySimTest template
Application Note Application-oriented testing of line differential protection end to end in the field using the corresponding RelaySimTest template Author Jens Baumeister jens.baumeister@omicron.at Date
More informationELECTRICAL ENGINEERING DESIGN CRITERIA APPENDIX F
ELECTRICAL ENGINEERING DESIGN CRITERIA APPENDIX F TABLE OF CONTENTS Appendix F - Electrical Engineering Design Criteria F.1 Introduction...F-1 F.2 Codes and Standards...F-1 F.3 Switchyard and Transformers...F-1
More informationSCADA Systems Automate Electrical Distribution
SCADA Systems Automate Electrical Distribution PC-based supervisory control and data acquisition systems increase uptime, cut costs and improve utilization. A White Paper from InduSoft Fabio Terezinho
More informationABB North America. Substation Automation Systems Innovative solutions for reliable and optimized power delivery
ABB North America Substation Automation Systems Innovative solutions for reliable and optimized power delivery Substation Automation Systems Advanced substation automation, protection and control solutions
More informationFederal Wage System Job Grading Standards for Electric Power Controlling, 5407. Table of Contents
Federal Wage System Job Grading Standards for Electric Power Controlling, 5407 Table of Contents WORK COVERED... 2 WORK NOT COVERED...2 TITLES... 2 GRADE LEVELS... 2 SPECIAL ADDITIONAL RESPONSIBILITIES...
More informationHow To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System
Network Security in Power Systems Maja Knezev and Zarko Djekic Introduction Protection control Outline EMS, SCADA, RTU, PLC Attacks using power system Vulnerabilities Solution Conclusion Introduction Generator
More informationWhy Can t We Be Friends?
Why Can t We Be Friends? Monitoring the Server Room by Introducing Modbus to SNMP Stanley Liu Product Manager, Data Acquisition & Control Division Overview IA devices are very useful for monitoring server
More informationRedundant Serial-to-Ethernet Data Connections for Mission-critical Devices
Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Daniel Lai, Moxa Product Manager daniel.lai@moxa.com The popularity of serial-to-ethernet technology has increased steadily since
More informationIEC 61850: Communication Networks and Systems in Substations
IEC 61850: Communication Networks and Systems in Substations Sistemi e strumenti per l'automazione, A. Flammini, AA2011-2012 Background I: Power Grid Sistemi e strumenti per l'automazione A. Flammini,
More informationWhite Paper. Convergence of Information and Operation Technologies (IT & OT) to Build a Successful Smart Grid
White Paper Convergence of Information and Operation Technologies (IT & OT) to Build a Successful Smart Grid Contents Executive Summary... 3 Integration of IT and OT... 4 Smarter Grid using Integrated
More informationArchitecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart Grid
Architecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart Grid Shahir Majed Advance Informatics School, Shahir.majed@mimos.my Suhaimi Ibrahim Advance Informatics School,
More informationThreat Modeling Framework for Electrical Distribution Scada Networks
Middle-East Journal of Scientific Research 23 (9): 2318-2325, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.09.22715 Threat Modeling Framework for Electrical Distribution
More informationSimple and secure monitoring
Simple and secure monitoring SMA Solar Monitoring Systems SMA Solar Monitoring Systems Monitoring, informing, presenting Easily securing yield for small, large and very large solar power systems Sunday
More informationADMS(Advanced Distribution Management System ) in Smart Grid
ADMS(Advanced Distribution Management System ) in Smart Grid 柯 佾 寬 博 士 Yi-Kuan Ke, Ph.D. 2014/03/28 Smart Grid Solution Smart Grid Solution Overview Smart Grid Solutions Smart Network Operation - Distribution
More informationSICAM PAS - the Key to Success Power Automation compliant with IEC 61850 - and your existing system
SICAM PAS - the Key to Success Power Automation compliant with IEC 61850 - and your existing system Power Transmission & Distribution SICAM PAS - Power Automation Up-To-Date Siemens Power Transmission
More informationDesign and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System)
Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System) Aye Min Zaw 1, Hla Myo Tun 2 Department of Electronic Engineering, Mandalay Technological
More informationHybrid Simulation von Kommunikationsnetzen für das Smart Grid
für das Smart rid Hanno eorg 15.11.2013 Faculty of Electrical Engineering & Information Technology Communication Networks Institute Prof. Dr.-Ing. Christian Wietfeld für das Smart rid Overview Motivation
More informationSCADA Controlled Multi-Step Automatic Controlled Capacitor Banks & Filter Banks
SCADA Controlled Multi-Step Automatic Controlled Capacitor Banks & Filter Banks Introduction SCADA (Supervisory Controlled and Data Acquisition) controlled multi-step metalenclosed automatic capacitor
More informationATTACHMENT G. Network Operating Agreement
ATTACHMENT G Network Operating Agreement 1. PURPOSE OF NETWORK OPERATING AGREEMENT The purpose of this Agreement is to identify contractual requirements related to Network Integration Transmission Service
More informationVendor System Vulnerability Testing Test Plan
INEEL/EXT-05-02613 Vendor System Vulnerability Testing Test Plan James R. Davidson January 2005 Idaho National Engineering and Environmental Laboratory Bechtel BWXT Idaho, LLC INEEL/EXT-05-02613 Vendor
More informationVulnerabilities in SCADA and Critical Infrastructure Systems
International Journal of Future Generation Communication and Networking 99 Vulnerabilities in SCADA and Critical Infrastructure Systems Rosslin John Robles 1, Min-kyu Choi 1, Eun-suk Cho 1, Seok-soo Kim
More informationMonitoring Underground Power Networks
Monitoring Underground Power Networks By Mark Stiles Merve Cankaya ABSTRACT Underground electric distribution systems are common in large cities throughout the United States. Power usage for the entire
More informationRetailman POS Multi-location Setup
Retailman POS Multi-location Setup The new version of Retail Man of 1.90 and above has a new way of setting up the multilocation version. There are new components that have to be taken in to account and
More informationA Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems
, pp. 49-56 http://dx.doi.org/10.14257/ijsh.2013.7.5.05 A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems Minkyu Choi 1 and Ronnie D. Caytiles 2 1 Security Engineering Research
More informationThe PI System revolutionizes one utility s electric transmission & distribution power system data
OSIsoft, Inc. PI System Case Study Overview Country or Region: United States Industry: Transmission and Distribution Business Situation Operators, engineers, managers, and executives needed an easy way
More informationPower Generator Switching for Power Engineers Inc. with. Distrix Software Defined Infrastructure. A Distrix Networks Case Study.
Power Generator Switching for Power Engineers Inc. with Distrix Software Defined Infrastructure A Distrix Networks Case Study November, 2015 2015 Distrix Networks Ltd. All Right Reserved 1 The project
More informationPSS SINCAL - Overview -
PSS SINCAL - Overview - PTI Day Buenos Aires, October 19/20, 2010 Dr. Michael Schwan,, Siemens PTI (Germany) www.siemens.com/energy/power-technologies PSS SINCAL Overview Page 3 Network Calculation Software
More informationReactive Power and Importance to Bulk Power System OAK RIDGE NATIONAL LABORATORY ENGINEERING SCIENCE & TECHNOLOGY DIVISION
Reactive Power and Importance to Bulk Power System OAK RIDGE NATIONAL LABORATORY ENGINEERING SCIENCE & TECHNOLOGY DIVISION Outline What is Reactive Power and where does it come from? Why is it important?
More informationMonitor Simply and Securely
Monitor Simply and Securely Solar Monitoring Systems from SMA Solar Monitoring Systems from SMA MONITORING, INFORMING, PRESENTING Securing yield easily for small, large and very large solar power systems
More informationIntroduction To SCADA and Telemetry
Introduction To SCADA and Telemetry Joe Mullaney Senior I&C Engineer MSE Technology Applications, Inc. Tetragenics Division joe.mullaney@mse-ta.com Overview Definitions What is SCADA? What is Telemetry?
More informationNetwork Security Landscape
Cole p01.tex V3-07/28/2009 3:46pm Page 1 Network Security Landscape COPYRIGHTED MATERIAL IN THIS PART Chapter 1 State of Network Security Chapter 2 New Approaches to Cyber Security Chapter 3 Interfacing
More informationSCADA. The Heart of an Energy Management System. Presented by: Doug Van Slyke SCADA Specialist
SCADA The Heart of an Energy Management System Presented by: Doug Van Slyke SCADA Specialist What is SCADA/EMS? SCADA: Supervisory Control and Data Acquisition Retrieves data and alarms from remote sites
More informationNERC s goal with publishing lessons learned is to provide industry with technical and understandable information that assists them with maintaining
NERC s goal with publishing lessons learned is to provide industry with technical and understandable information that assists them with maintaining the reliability of the bulk power system Bulk Power
More informationA MODERN DISTRIBUTION MANAGEMENT SYSTEM FOR REGIONAL ELECTRICITY COMPANIES
A MODERN DISTRIBUTION MANAGEMENT SYSTEM FOR REGIONAL ELECTRICITY COMPANIES A Roberts, T Berry, W D Wilson Schneider Electric Ltd, UK SYNOPSIS This paper describes the features of a modern Distribution
More informationWeb SCADA Employing Application Program Interface as Data Source
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Web SCADA Employing Application Program Interface as Data Source Hoon Ko 1) Abstract An Application programming interface or API is a set
More informationDong-Joo Kang* Dong-Kyun Kang** Balho H. Kim***
Visualization Issues of Mass Data for Efficient HMI Design on Control System in Electric Power Industry Visualization in Computerized Operation & Simulation Tools Dong-Joo Kang* Dong-Kyun Kang** Balho
More informationNAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology
More informationWireless Communications for SCADA Systems Utilizing Mobile Nodes
, pp. 1-8 http://dx.doi.org/10.14257/ijsh.2013.7.5.01 Wireless Communications for SCADA Systems Utilizing Mobile Nodes Minkyu Choi Security Engineering Research Support Center, Daejon, Republic of Korea
More informationEvolution of Control for the Smart Transmission Grid
Evolution of Control for the Smart Transmission Grid Anjan Bose Washington State University Pullman, WA SCE Smart Grid Research Symposium California Institute Of Technology October, 2011 The Past (before
More informationGunnar Björkman, ABB Mannheim. Smart Grids Security SICS Security Seminar in Kista on April 8, 2014
Gunnar Björkman, ABB Mannheim Smart Grids Security SICS Security Seminar in Kista on April 8, 2014 Smart Grids Security Agenda Traditional Supervision and Control Evolution to Smart Grids Grid4EU A large
More informationCyber Security of the Power Grid
Cyber Security of the Power Grid Chen-Ching Ching Liu Professor of Power Systems University College Dublin Research for Ireland s Future Ireland -Country of natural beauty -Quality of life ranked among
More informationDavid Payne, P.E. Associate Director February 18, 2014
David Payne, P.E. Associate Director February 18, 2014 Overview of Texas A&M University State's first public institution of higher education, was opened on Oct. 4, 1876 as the Agricultural and Mechanical
More informationUnderstanding SCADA System Security Vulnerabilities
Understanding SCADA System Security Vulnerabilities Talking Points Executive Summary Common Misconceptions about SCADA System Security Common Vulnerabilities Affecting SCADA Networks Tactics to Strengthen
More informationUsing battery test equipment with asset management software. Megger is a registered trademark
WWW.MEGGER.COM Using battery test equipment with asset management software Megger is a registered trademark Subject Author Andrew Sagl Product Marketing Engineer Date April 2010 Keywords Abstract BITE,
More informationhttp://d-nb.info/1041302002
Contents 1 Introduction 1 1.1 Requirements for Evaluation Techniques 1 1.2 Performance Evaluation Techniques 2 1.2.1 Network Testbeds / Real-World Measurements 2 1.2.2 Network Simulators 3 1.2.3 Analytic
More informationSY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
More informationNetwork Enabled Battery Health Monitoring System
Network Enabled Battery Health Monitoring System Research Team: Fan Yang Zhengyang Liu Supervisor: Advisor: Hanlei Zhang (PhD Student) Wencong Su (PhD Student) Dr. Mo-Yuen Chow Presentation Outline Project
More informationIntrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
More informationAPPLICATION CASE OF THE END-TO-END RELAY TESTING USING GPS-SYNCHRONIZED SECONDARY INJECTION IN COMMUNICATION BASED PROTECTION SCHEMES
APPLICATION CASE OF THE END-TO-END RELAY TESTING USING GPS-SYNCHRONIZED SECONDARY INJECTION IN COMMUNICATION BASED PROTECTION SCHEMES J. Ariza G. Ibarra Megger, USA CFE, Mexico Abstract This paper reviews
More informationOPC Redundancy Power of Prevention
OPC Power of Prevention MatrikonOPC-2006 Executive Summary There are thousands of highly interconnected and dynamic systems, both public and private, that make up North America s electric power grid. These
More informationHigh rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN
Security Issues and Quality of Service in Real Time Wireless PLC/SCADA Process Control Systems Dr. Halit Eren & Dincer Hatipoglu Curtin University of Technology (Perth Australia) 2/27/2008 1 PRESENTATION
More informationElectricity for Free? The Dirty Underbelly of SCADA and Smart Meters
sorry Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters Jonathan Pollet, CISSP, CAP, PCIP July 2010 Table of Contents Introduction...3 Power Generation, Transmission, and Distribution...4
More informationNew Supervisory Control and Data Acquisition (SCADA) Based Fault Isolation System for Low Voltage Distribution Systems
International Conference on Computer and Communication Engineering (ICCCE 2010), 11-13 May 2010, Kuala Lumpur, Malaysia New Supervisory Control and Data Acquisition (SCADA) Based Fault Isolation System
More informationIESO Supply Deliverability Guidelines
PUBLIC IMO_GDL_0021 IESO Supply Deliverability Guidelines Issue 3.0 This document is to be used to evaluate long-term system adequacy and connection assessments Public Disclaimer The posting of documents
More information28 Networks and Communication Protocols
113 28 Networks and ommunication Protocols Trend in computer systems: personal computing. Reasons why: ost: economies of scale. lso, avoids large initial investment in timesharing system. Performance:
More information8/27/2015. Brad Schuette IT Manager City of Punta Gorda bschuette@pgorda.us (941) 575-3354. Don t Wait Another Day
Brad Schuette IT Manager City of Punta Gorda bschuette@pgorda.us (941) 575-3354 2015 FRWA Annual Conference Don t Wait Another Day 1 SCADA Subsystems Management Physical Connectivity Configuration Mgmt.
More informationSPARKS Cybersecurity Technology and the NESCOR Failure Scenarios
SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios Lucie Langer and Paul Smith firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September,
More informationSMART ENERGY. The only cloud that speeds up your. cloud services. broadband for smart grids. Last Mile Keeper
SMART ENERGY cloud services broadband for smart grids Last Mile Keeper The only cloud that speeds up your Energy Management System Introduction Smart Grids are the result of the merging between power and
More informationMladen Kezunovic Texas A&M University
INTEGRATING DATA AND SHARING INFORMATION FROM VARIOUS IEDs TO IMPROVE MONITORING, CONDITION-BASED DIAGNOSTIC, MAINTENANCE, ASSET MANAGEMENT AND OPERATION TASKS Introduction Mladen Kezunovic Texas A&M University
More informationA Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide
p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing
More informationOIL PRESS 71.8 PSI FUEL. Cloud based, diagnostic, engine monitoring and reporting system. www.faria-instruments.com www.beede.com
OIL PRESS 71.8 PSI Cloud based, diagnostic, engine monitoring and reporting system www.faria-instruments.com www.beede.com Start Updating Send Data The Faria EntelNet service is a multi part system which
More informationTeleprotection Schemes and Equipment. James W. Ebrecht Young Power Equipment Scottsdale, AZ
* Teleprotection Schemes and Equipment James W. Ebrecht Young Power Equipment Scottsdale, AZ Teleprotection Schemes And Equipment ~ ~ Relay Relay Teleprotection Communications channel Teleprotection Protection
More informationDr. György Kálmán gyorgy@mnemonic.no
COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán gyorgy@mnemonic.no Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats
More informationINTELLIGENT BUILDINGS BUS SYSTEMS, MyHOME. Ján Cigánek, Martin Janáček, Stanislav Števo
INTELLIGENT BUILDINGS BUS SYSTEMS, MyHOME Ján Cigánek, Martin Janáček, Stanislav Števo Slovak University of Technology Ilkovičova 3, 812 19 Bratislava, Slovak Republic Tel.: +421 2 60291111 Fax: +421 2
More informationApplication Note AP050001EN June 2013. VPN setup for the XV100
Application Note AP050001EN June 2013 VPN setup for the XV100 Application NoteAP050001 Table of Contents 1) Overview... 3 1.1) Background Information... 3 1.2) Short Definition... 3 1.3) Example... 4 2)
More informationAutoLog ControlMan. Remote Monitoring & Controlling Service
AutoLog 1 AutoLog ControlMan Remote Monitoring & Controlling Service Web browser based HMI / SCADA interface Server is hosted by Internet server hosting company Control units communicate wirelessly via
More informationAPPLICATION NOTE. Increasing PV Hosting Capacity on LV Secondary Circuits with the Gridco System empower TM Solution
APPLICATION NOTE Increasing PV Hosting Capacity on LV Secondary Circuits with the Gridco System empower TM Solution INCREASING PV HOSTING WITH EMPOWER TM SOLUTION Executive Summary Distributed solar photovoltaic
More informationIndustrial Requirements for a Converged Network
Industrial Requirements for a Converged Network IEEE 802.3 SG DMLT Phoenix (AZ) Albert Tretter, Siemens AG Ethernet captures more and more Applications Traditional Markets - Industrial Automation - Factory
More informationEnergy Management System (EMS) 3.0 Implementation Overview for BRP Consultation. July 2015
Energy Management System (EMS) 3.0 Implementation Overview for BRP Consultation July 2015 Background Energy Management System EMS - Used by System Controllers to monitor, control and optimize the performance
More informationMonitor electricity supply power network system
Page 1 of 5 Monitor electricity supply power network system Level 4 Credits 10 Purpose People credited with this unit standard are able to: continuously monitor power supply trends, communication, and
More informationInternet-Accessible Power Monitoring & Control Systems
Internet-Accessible Power Monitoring & Control Systems By GE Specification Engineers Keith B. Brock, P.E. Robert P. Hansen, PhD, P.E. Introduction Accessing electrical system information from any location
More informationElectric utilities may vary in their application of end-to-end testing
An Application Case of End-to-End Relay Testing of Communication-Based Protection Schemes Using GPS-Synchronized Secondary Injection Feature by J. Ariza, Megger USA G. Ibarra, CFE, Mexico Electric utilities
More informationEMTP STUDIES PERFORMED TO INSERT LONG AC CABLES IN THE FRENCH GRID
Tension (kv) Impedance (Ohms) EMTP STUDIES PERFORMED TO INSERT LONG AC CABLES IN THE FRENCH GRID frequency (Hz) Simon DESCHANVRES Yannick VERNAY RTE, CNER, Substations Department t (ms) EMTP-RV Users Group
More informationINTELLIGENT DISTRIBUTION NETWORK ANALYSIS AND INFORMATION ARCHITECTURE DESIGN
INTELLIGENT DISTRIBUTION NETWORK ANALYSIS AND INFORMATION ARCHITECTURE DESIGN Yun CHEN SMEPC,State Grid China daddygirl@126.com ABSTRACT From the background of intelligent distribution network construction,
More informationUsing Tofino to control the spread of Stuxnet Malware
technical datasheet Application Note Using Tofino to control the spread of Stuxnet Malware This application note describes how to use the Tofino Industrial Security Solution to prevent the spread of the
More informationPower network telecommunication
www.siemens.com Power network telecommunication Teleprotection Answers for infrastructure and cities. Binary I/O The best protection against high-voltage grid failures When it comes to managing power networks,
More informationFor the purpose of setting up a home network, all you need to worry about are two major categories of components:
Access Points, Routers, and Hubs In the first lesson, you learned about the world of wireless standards -- what frequencies are used, distances involved, and other general topics. In this lesson, you learn
More informationCyber security measures in protection and control IEDs
Cyber security measures in protection and control IEDs K. Hagman 1, L.Frisk 1, J. Menezes 1 1 ABB AB, Sweden krister.hagman@se.abb.com Abstract: The electric power grids and power systems are critical
More informationNELSON VOLTAGE MONITOR INSTALLATION & PROGRAMMING MANUAL
NELSON VOLTAGE MONITOR INSTALLATION & PROGRAMMING MANUAL CONTENTS GENERAL INFORMATION...3 INSTALLATION...3 FIELD WIRING...4 PROGRAMMING...4 Circuit Monitor Options...5 Power Frequency...5 Alarm Silence
More informationHyperAccess Access Control System
Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000
More informationUsing the AVR microcontroller based web server
1 of 7 http://tuxgraphics.org/electronics Using the AVR microcontroller based web server Abstract: There are two related articles which describe how to build the AVR web server discussed here: 1. 2. An
More informationEfficient remote access to machines and plants with SIMATIC
Efficient remote access to machines and plants with SIMATIC Telecontrol and teleservice solutions modular, flexible and secure SIMATIC NET siemens.com/industrial-remote-access Industrial remote access
More informationThe Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
More informationSCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
More informationInnovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: info@plantdata.com Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
More informationComprehensive Asset Performance Management. Power Transmission and Distribution
Comprehensive Asset Performance Management Power Transmission and Distribution Comprehensive Asset Performance Management Siemens Asset Performance Management System (APMS) enables utilities to get the
More informationCYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
More informationSOLARCARE SERIES PRODUCT AND APPLICATION GUIDE
SOLARCARE SERIES PRODUCT AND APPLICATION GUIDE for solar energy management LEATEC Delivering Solutions for Energy Management SOLAR ENERGY DATA CENTER BUILDING 4 to8 String Monitoring with 0.% Accuracy
More informationJ W Spencer School of Electrical Engineering, Electronics and Computer Science
J W Spencer School of Electrical Engineering, Electronics and Computer Science To consider the electrical energy network and how it might be affected over the next 100 years and beyond to 2500. Coastal
More information