Cyber Security and Power System Communication Essential Parts of a Smart Grid Infrastructure
|
|
|
- Thomas Nicholson
- 10 years ago
- Views:
Transcription
1 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 25, NO. 3, JULY Cyber Security and Power System Communication Essential Parts of a Smart Grid Infrastructure Göran N. Ericsson, Senior Member, IEEE Abstract The introduction of smart grid solutions imposes that cyber security and power system communication systems must be dealt with extensively. These parts together are essential for proper electricity transmission, where the information infrastructure is critical. The development of communication capabilities, moving power control systems from islands of automation to totally integrated computer environments, have opened up new possibilities and vulnerabilities. Since several power control systems have been procured with openness requirements, cyber security threats become evident. For refurbishment of a SCADA/EMS system, a separation of the operational and administrative computer systems must be obtained. The paper treats cyber security issues, and it highlights access points in a substation. Also, information security domain modeling is treated. Cyber security issues are important for smart grid solutions. Broadband communications open up for smart meters, and the increasing use of wind power requires a smart grid system. Index Terms Communication systems, control systems, cyber security, information security, IT security, power system communication, power system control, power systems, SCADA, security, smart grid, wide-area networks. I. INTRODUCTION T HE concept of smart grid [1] [7] has become a hype. It has received considerable momentum during the recent years, and this is expected to develop even more. Critical parts here are the cyber security issues and the power system communication (PSC) systems, which are stressed in this paper. The use of electricity is of paramount importance to our society, and the need for power supply is increasing. Here, the concerns on physical security are quite mature and easy to grasp, whereas now the digital threats are increasing. By means of the PSC capabilities, supervisory control and data acquisition (SCADA) systems and substations are now interconnected with other systems. These communications take place both over dedicated line and over the Internet. Also in the earlier projects, information and Information Technology (IT) security issues were not considered to a great extent, or not at all. Manuscript received December 01, First published April 22, 2010; current version published June 23, Paper no. TPWRD The author is with Svenska Kraftnät (Swedish National Grid), Sundbyberg 17224, Sweden ( [email protected]). Color versions of one or more of the figures in this paper are available online at Digital Object Identifier /TPWRD Generally, the trends are that vendors are using commercial off the shelf (COTS) products as part of their SCADA/energy management system (EMS) systems, instead of using proprietary solutions. Here, the increasing use of standard products, such as personal computers (PCs), operating systems, and, networking elements, now opens up new possibilities and threats. The knowledge of security can now be more easily known and divided on more people; the security-by-obscurity principle does not apply to the same extent as before. Instead, the digital threats arise and must be handled in a structured way. Here, the awareness of the new possibilities and risks is important. All people involved must strive to take active decisions on the choice of adequate technical solutions when deploying a new SCADA system, or protecting an existing one. A. Purpose The purpose of the paper is to emphasize the role of cyber security and PSC systems in conjunction with each other, in a smart grid infrastructure, where the information infrastructure is as critical as the physical. Also, a historical development perspective is given, explaining some of the facts of the PSC systems of today, possessing partly vulnerable structure. The work described herein is developed and based on several years of CIGRÉ working group efforts within the field of power systems communications [8] [18], where the author has been actively involved (part of the work as a convener). The most recent results have been presented in [8] and [12]. Also, the works of [19] [21] should be considered. B. Outline In Section II, the development phases of power system communication systems are described, together with a classification of different communication capabilities and requirements. Thereafter in Section III, the development of power system control systems are given, from islands of automation to fully integrated systems. Here also, a discussion on open systems is given. In Section IV, the cyber security issues are treated. In Section V, cyber security highlights with respect to smart grids are given. The paper ends with concluding remarks in Section VI. II. DEVELOPMENT AND CLASSIFICATION OF POWER SYSTEM COMMUNICATION SYSTEMS Communication capabilities have developed from narrowband, low speed communications to high speed broadband highways for all sorts of communications. From being a /$ IEEE
2 1502 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 25, NO. 3, JULY 2010 very delimiting factor, new possibilities have opened up, which have supported the development of PSC systems described in Section III. A. Classifications of Communications Communication requirements should be classified, since this facilitates the handling of requirements and the order of requirements. One way is to classify requirements into three categories, namely: real-time operational communication requirements; administrative operational communication requirements; administrative communication requirements. These three classes were first introduced in 2001/2002 [22], based on works at the Swedish National Grid. Experiences have now shown that this classification approach is very suitable [23]. It is now widely used both within and outside Swedish National Grid. 1) Real-Time Operational Communication Requirements: Real-time operational communication encompasses communication in real time that is required to maintain operation of the power system. The class is in turn divided into real-time operational data communication and real-time operational speech communication. Real-time operational data communication encompasses: teleprotection; power system control. The communication is characterized by the fact that interaction must take place in real time, with hard time requirements. The communication requirements define the design of the technical solutions. For teleprotection purposes, messages should be transmitted within a very short time frame. Maximum allowed time is in the range of ms, depending on the type of protection scheme. The requirement has its origin in the fact that fault current disconnection shall function within approximately 100 ms. Power System Control mainly includes supervisory control of the power process on secondary or higher levels. These systems are of the kind SCADA/EMS. Measured values must not be older than 15 s, when arriving at the control center. Breaker information shall arrive no later than 2 s after the event has occurred. Real-time operational voice communication encompasses traditional telephony; where voice communication has an operational purpose, e.g., trouble shooting in a disturbed power operational case, power system island operations. The actual possibility of having voice communication is, by the control center staff, considered as one of the most important tools, both in normal and abnormal operation cases. Real-time operational voice communication also includes facsimile for switching sequence orders. Also, the means of using electronic mail ( ) for transfer of switching sequence orders is considered. 2) Administrative Operational Communication Requirements: In addition to real-time operational communication, information is needed that, in more detail and afterwards, support description of what has happened in minor and major power system disturbances. This class is referred to as administrative operational communication. Examples are interactions Fig. 1. Islands of Automation. Fig. 2. Interconnected system structure. with local event recorders, disturbance recorders, and power swing recorders. The communication is characterized by that interaction does not need to take place in real time. Time requirements are moderate. Also, the following functions are included in this class. Asset management. Fault location. Metering and transfer of settlement information. Security system. Substation camera supervision. 3) Administrative Communication Requirements: Administrative communication includes voice communication and facsimile within the company (also between the offices that are at different geographical locations), as well as to/from the company, where the communication has an administrative purpose. III. DEVELOPMENT OF POWER SYSTEM CONTROL SYSTEMS The PSC system has been and will increasingly be the life nerve of the power system. It is the necessity and prerequisite for adequate operation and control of a power system. Also with respect to new requirements based on information and IT security, the focus will increase on the communication system. Data communication systems have been developed from proprietary solutions to standardized off-the-shelf solutions, where the vendors more become system integrators, rather than power control system designers. Therefore, power system control systems that used to be formed as Islands of Automation [21], now have developed to interconnected, and even integrated see Figs In fact, it is the technical evolution of communications systems and their capabilities that have opened up for this interactivity. Furthermore based on these possibilities, there were major forces in the 1990s striving for open systems [24], [25] when procuring power control system. The utilities required the SCADA/EMS to be more open, and the vendors all claimed that their system products were open.
3 ERICSSON: CYBER SECURITY AND PSC ESSENTIAL PARTS OF A SMART GRID INFRASTRUCTURE 1503 Fig. 3. Partially integrated system structure. Fig. 5. De-coupling between operational SCADA/EMS and administrative IT environments. Fig. 4. Today full integration system structure. If the projects of procurement of such systems in the 1990s and early 2000s are studied, it can be noticed that several of the systems were procured with the requirement of obtaining openness in the PCS system environment. For data communication systems, the truth is that some PSC systems parts have opened up [26], whereas other parts are still based on proprietary solutions. Nevertheless, a customer typically gets what he asks for from the vendor. So if one asks for openness one may get it. And if one does not ask for IT security, one does not get that. Hence, there are several power utilities around the globe that now have installed SCADA/EMS and industrial control systems, which were opened up from the design phase, but had very limited security incorporated in the system solutions. It was of course tempting to require the openness, since new possibilities then arose. But these utilities now have information and IT security problem to tackle. This fact is serious, it is a growing concern, and it must be taken into account for system daily operation and control by each utility. IV. CYBER SECURITY ISSUES Based on the described evolution of PSC systems and limited concern of cyber security in the 1990s, new issues have arisen, which are described here. A. De-Coupling Between Operational SCADA/EMS and Admin IT, to Secure Operational When existing SCADA/EMS systems now are being refurbished or replaced, the information and IT security issues must be taken into account. If an SCADA/EMS system is to be refurbished, the operational SCADA/EMS system part must be shielded from the Administrative part, such that the Operational part is protected from digital threats that are possible over the Internet connection. If an SCADA/EMS system is to be replaced, it is then a very good occasion to reconsider an overall system structure, and then incorporate IT security on all SCADA/EMS levels. A way towards this more secure state is to, if possible, de-couple the Operational SCADA/EMS system and the Administrative IT system. Also, an alternative may be to secure the firewall configuration in between operational and administrative parts see Fig. 5. B. Threat and Possibilities The fact that SCADA/EMS systems now are being interconnected and integrated with external systems creates new possibilities and threats. These new issues have been emphasized in the CIGRÉ working groups JWG D2/B3/C2.01 Security for Information Systems and Intranets in Electric Power Systems [11] and D2.22 Treatment of Information Security for Electric Power Systems [12], wherein the author has been an active member. As part of the JWG efforts, the various interconnections of a substation were investigated [27]; see Fig. 6. All the numbered access points (1 10) elucidates the possible points whereto the substation can be accessed. As the reader may see, there is great number of points. And of course, this number creates an operational environment that implies possible digital entrances and hence digital vulnerabilities. C. SCADA Systems and SCADA Security The fact that SCADA systems now are, to a great extent, based on standardized off-the-shelf products, and increasingly being connected over Internet for different purposes (remote access, remote maintenance), implies that SCADA systems are being exposed to the same kind of vulnerabilities as ordinary office PC solutions based on Microsoft products. This is a delicate question, on what to do and how to handle this new unsecure situation, since SCADA systems are vital for several critical infrastructures, where a power control system is one such system and public transportation is another. The use of SCADA systems is cross-sectional and it has an impact on different parts of a society. Here, the protection of the digital structure of an infrastructure typically refers to critical information infrastructure protection (CIIP).
4 1504 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 25, NO. 3, JULY 2010 Fig. 6. Access points to SCADA system. Like in many other countries, the issues of securing CIIP systems have been emphasized in Sweden. A governmental coordination action between different authorities and agencies were started in [28], focusing on SCADA security. The action is based on that existing organizations participate, such as power utilities, water companies, and railway, which have SCADA systems as critical part of operations. Also, the security police are represented. Here, the expertise is gathered and experiences are shared, including both domestic and international knowledge; everything with the purpose of securing the SCADA systems being part of the critical information infrastructures of Sweden. As a natural step, the SCADA Security Guideline has been developed [29]. Also, technical guidelines and administrative recommendations are developed which are available for free downloading, that support the securing actions of the SCADA systems in the different areas of operation: power, water, and transportation. Fig. 7. Information security domains. D. Governmental Coordination in Sweden on SCADA Security E. Information Security Domains CIGRÉ Developments Since the SCADA/EMS systems have become increasingly integrated, it becomes more difficult to treat the system structure in terms of parts or subsystems. The physical realization of various functions is less evident from a user perspective. Instead, it becomes more natural to study a SCADA/EMS system in terms of domains. This concept in application to power systems was introduced in [11]. A domain is a specific area, wherein specific activities/business operations are going on and they can be grouped together. Here, the following security domains are introduced (see Fig. 7). Public, Supplier, Maintainer Domain. Power Plant Domain. Substation Domain. Telecommunication Domain. Real-Time Operation Domain. Corporate IT Domain. The purpose of the domain concept is to emphasize for everyone involved within a specific area the importance and handling of information security issues. Also, one domain X may be using hardware equipment and/or communications that are also used by domain Y. Therefore, the domains are typically in-
5 ERICSSON: CYBER SECURITY AND PSC ESSENTIAL PARTS OF A SMART GRID INFRASTRUCTURE 1505 terrelated. The domains described above may be different from one electric utility to another, depending on the utility s operation and tasks. The proposed domains in this paper are found to be chosen in a natural way. It is of course up to each utility to choose and implement its domains. The ideas presented here are general and applicable to another set of security domains and their interdependencies. The security is treated within each domain, and there always only one authority responsible for security within the domain. Different interests and compliance with legislative and contractual requirements could make it necessary to define a security policy structure using different security domains inside the power utility. Within one security domain, we shall rely on only one security policy and only one authority responsible for the security policy inside the domain. The authority should guarantee a minimum security level for the systems in the domain. The security level of the individual systems must be classified and may actually vary. When communicating across power utilities, organizations, and other companies, using communication networks, the security domains should be recognized. For example, a power utility could define a security domain and related policies and procedures for its telecontrol activity to assure compliance with legislative or regulatory requirements. If similar definitions, procedures, policies, etc. were developed by other power utilities, it would be easier to discuss and define common rules for the information exchange or the usage of common resources in a communication network. However today, there are no common definitions including the terms security, and critical asset. Also, there are no common control system security policies or procedures, although groups such as IEC TC57 [50], ISA [53], and NIST [57], are working on generic policies and procedures. The reader is also recommended to refer to other valuable sources for information and cyber security [30] [61]. A power utility should also discuss and define the policy structure depending on the topology and the importance of resources in the telecontrol network itself. A power utility on a regional level for example, must decide if all substations, all local control centers, and the regional control centre should belong to the same security domain or be split into several domains. This is particularly true when the utility provides electric as well as gas, or water products and services. This becomes more of an issue when utilities share equipments, such as remote terminal units (RTUs). Furthermore in WG D2.22 [12], the information security domain model has been adopted and further used, in the context of an information security framework. An Electric Power Utility (EPU) representing one security authority could define each domain according to the level of protection required by the organization. The domain model should be defined based on the results of a risk assessment process [14], [15]. Fig. 8 shows a model for different types of EPUs including examples of interconnections that are elaborated [13]. Appropriate security controls must be assigned to the domains and inter/intra connections. The EPU systems and data networks supported by IT components, such as servers, client devices, data communication infrastructure, access and network management devices, operating systems, and databases, must be Fig. 8. Information security domain model. mapped to the domain model, as well. This model is suited for a defense in depth strategy against cyber risk. Furthermore, an EPU needs to define its own selection of security controls for SCADA control systems, based on normative sources, such as ISO [47], NIST SP [57], NERC CIP [56], or ISA [53]. The controls must be appropriate for the EPU s regulatory regime and assessment of business risks. The security controls need to be defined within each domain and the information flows between the domains, based on the agreed risk assessments. For example, the Corporate domain and Business critical domain controls will depend on an intrabusiness risk assessment, whereas the Operational critical domain controls are likely to require interdependent risk assessments between other operators and possibly Government agencies in addition to an intra-business risk assessment. Many types of IT components are required to support EPU control systems and lists of controls should be elaborated such as [13]: system architecture security controls; IT support user security control; user access security controls. V. SMART GRIDS During the last few years, the term smart grid [1] [7] has become a buzzword. It is not the author s ambition to define this here, rather he would like to stress that the development of power communication systems is a key factor for actually having a power grid that is smart. Due to the capabilities of having broadband connections, smart meters at the household premises, and RTUs with digital intelligence, together form a perquisite for a having a grid that could be considered smart. We will in the near future encounter similar information and IT security considerations as described earlier in this paper. A. Smart Meters The broadband connections make it possible to transfer data faster and of more bulky kind if needed. The utilities now use
6 1506 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 25, NO. 3, JULY 2010 the possibility of remotely reading the consumers consumptions at each household, without the need to actually go to the premises and without notifying the customers. This saves time and money. But the broadband capabilities also open up new ways of introducing new functionality, both at the meters and in the central system collecting metering data. Furthermore, the utilities are interested in transferring data to the households. Such data could include price information (USD/kWh) and special offers. But data could also be controls, which then open up new cyber security considerations that need to be treated. One such example, which is a delicate issue, is to deal with Which party will be responsible when, by mistake or by intentional digital tampering, a household is disconnected for two weeks, and that the owner of the house gets damages by destroyed food or water leakage, when he is away on two weeks of vacation? The owner? The utility? Who? These issues are clearly related to cyber security and they must be raised within the electric power arena. B. Smart Grid Systems A Way Towards the Use of Wind Power Another rising issue is the introduction of wind power in many countries. Some people may claim that is marginal, but in fact, this is clearly evident. For example, in Sweden, TWh out of the total yearly consumption of 150 TWh may be based on wind power within ten years. This is certainly not marginal for the transmission system operator (TSO) Swedish National Grid. The intermittent production of power by a wind mill, in combination with maintaining the electrical balance, for example by means of increased use of hydro power, is very delicate. These facts together constitute a challenge, and we here must work with smarter solutions, forming a smart grid system. VI. CONCLUDING REMARKS PSC and cyber security issues are vital parts of the critical information infrastructure, such as a smart grid system. Here a historic perspective has been given, tying up PSC and cyber security. Also, the development of isolated islands of automation to fully integrated computer environments has been described. The openness required in the 1990s has opened up new possible vulnerabilities, which creates cyber security issues to be addressed and solved, e.g., integrated SCADA/EMS systems and administrative office IT environments must now be separated. Also, the author s experiences from his involvement in CIGRÉ developments have been given. Furthermore, cyber security issues become increasingly important, when the term of smart grid has been introduced, and these developments will accelerate. This is evident for the use of smart meters and introduction of wind power, forming a smart grid system. REFERENCES [1] DOE, What the Smart Grid Means to You and the People You Serve U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability, [2] DOE, Grid 2030 A National Vision for Electricity s Second 100 Years U.S. Department of Energy, Office of Electric Transmission and Distribution, [3] European Commission, European Technology Platform SmartGrids, Strategic Research Agenda for Europe s Electricity Networks of the Future EUR 22580, Luxembourg, [4] G. N. S. Prasanna, A. Lakshmi, S. Sumanth, V. Simha, J. Bapat, and G. Koomullil, Data communication over the smart grid, in Proc. IEEE Int. Symp. Power Line Communications and Its Applications (ISPLC), Mar. 29 Apr , pp [5] M. Pipattanasomporn, H. Feroze, and S. Rahman, Multi-agent systems in a distributed smart grid: Design and implementation, in Proc IEEE Power Systems Conf. and Expo., Mar , 2009, pp [6] P. McDaniel and S. McLaughlin, Security and privacy challenges in the smart grid, IEEE J. Security & Privacy, vol. 7, no. 3, pp , May Jun [7] A. Ipakchi and F. Albuyeh, Grid of the future, IEEE Power Energy Mag., vol. 7, no. 2, pp , Mar. Apr [8] G. N. Ericsson, Information security for Electric Power Utilities (EPUs) CIGRÉ developments on frameworks, risk assessment and technology, IEEE Trans. Power Del., vol. 24, no. 3, pp , Jul [9] G. Ericsson, Towards a framework for managing information security for an electric power utility CIGRÉ experiences, IEEE Trans. Power Del., vol. 22, no. 3, pp , Jul [10] G. Ericsson and Å. Torkilseng, Management of information security for an electric power utility On security domains and use of ISO/IEC standard, IEEE Trans. Power Del., vol. 20, pt. 1, pp , Apr [11] G. Ericsson, Å. Torkilseng, G. Dondossola, T. Jansen, J. Smith, D. Holstein, A. Vidrascu, and J. Weiss, Security for Information Systems and Intranets in Electric Power Systems Tech. Brochure (TB) 317 CIGRÉ, [12] G. Ericsson, Å. Torkilseng, G. Dondossola, L. Piètre-Cambacédès, S. Duckworth, A. Bartels, M. Tritschler, T. Kropp, J. Weiss, and R. Pellizzonni, Treatment of Information Security for Electric Power Utilities (EPUs) Tech. Brochure (TB), CIGRÉ, to appear [13] Å. Torkilseng and S. Duckworth, Security frameworks for electric power utilities Some practical guidelines when developing frameworks including SCADA/control system security domains, CIGRÉ Electra, Dec [14] G. Dondossola, Risk assessment of information and communication systems Analysis of some practices and methods in the electric power industry, CIGRÉ Electra, Aug [15] M. Tritschler and G. Dondossola, Information security risk assessment of operational IT systems at electric power utilities, presented at the CIGRÉ D2 Colloq., Fukuoka, Japan, Oct , 2009, Paper D2-01 D03. [16] A. Bartels, L. Piètre-Cambacédès, and S. Duckworth, Security technologies guideline Practical guidance for deploying security technology within electric utility data networks, CIGRÉ Electra, Jun [17] L. Piètre-Cambacédès, T. Kropp, J. Weiss, and R. Pellizzonni, Cybersecurity standards for the electric power industry A survival kit, presented at the CIGRÉ Session 2008, Paris, France, Paper D [18] G. Ericsson, A. Bartels, D. Dondossola, and Å. Torkilseng, Treatment of information security for electric power utilities Progress report from CIGRÉ WG D2.22, presented at the CIGRÉ 2008 Session, Paris, France, Paper D [19] L. Nordström, Assessment of information security levels in power communication systems using evidential reasoning, IEEE Trans. Power Del., vol. 23, no. 3, pp , Jun [20] M. Ekstedt and T. Sommestad, Enterprise architecture models for cyber security analysis, in Proc. IEEE PCSE, Mar [21] T. Cegrell, Power System Control Technology. Englewood Cliffs, NJ: Prentice-Hall, [22] G. Ericsson, Classification of power systems communications needs and requirements: Experiences from case studies at swedish national grid, IEEE Trans. Power Del., vol. 17, no. 2, pp , Apr [23] G. Ericsson, On requirements specifications for a power system communications system, IEEE Trans. Power Del., vol. 20, no. 2, pp , Apr [24] T. Rahkonen, User Strategies for Open Industrial IT Systems, Ph.D. dissertation, Royal Inst. Technol., Stockholm, Sweden, 1996, ISRN KTH/ICS/R-96/1-SE. [25] A. M. Sasson, Open systems procurement: A migration strategy, IEEE Trans. Power Syst., vol. 8, no. 2, pp , May [26] G. Ericsson and T. Rahkonen, Openness in communication for power system control, a state-of-the-practice study, in Proc. IEEE Power Tech, Stockholm, Sweden, Jun
7 ERICSSON: CYBER SECURITY AND PSC ESSENTIAL PARTS OF A SMART GRID INFRASTRUCTURE 1507 [27] P. Roche, Cyber security considerations in power system operations, CIGRÉ Electra No. 218, Feb [28] Swedish Civil Contingencies Agency, SCADA Security Coordination [Online]. Available: [29] Swedish Civil Contingencies Agency, Guide to Increased Security in Process Control Systems for Critical Societal Functions [Online]. Available: [30] COSO ERM (The Committee of Sponsoring Organizations of the Treadway Commission Enterprise Risk Management), 2004 [Online]. Available: [31] COBIT (Control Objectives for Information and related Technology) [Online]. Available: [32] ISO/IEC :2005 Information Technology Service Management Part 1: Specification,. [33] ISO/IEC :2005 Information Technology Service Management Part 2: Code of Practice,. [34] ITIL (IT Infrastructure Library) [Online]. Available: [35] Risk Management Vocabulary, ISO/IEC CD 2 Guide 73, Concept,, Apr [36] Risk Management Principles and Guidelines on Implementation, ISO/DIS 31000, Concept,, April [37] Generic SCADA Risk Management Framework for the IT Security Expert Advisory Group (ITSEAG), Trusted Information Sharing Network for Critical Infrastructure Protection Dec [38] AS/NZS 4360:2004 Risk Management Standards Australia. [39] IRRIIS Project [Online]. Available: [40] CRUTIAL Project [Online]. Available: [41] Risk Assessment of Information and Communication Systems Analysis of Some Practices and Methods in the Electric Power Industry Giovanna Dondossola CESI RICERCA SpA, Electra, Aug [42] G. Dondossola and O. Lamquet, Cyber risk assessment in the electric power industry, Electra No 224 pp , Feb [Online]. Available: [43] G. Dondossola, O. Lamquet, and A. Torkilseng, Key issues and related methodologies in the security risk analysis and evaluation of electric power control systems, in CIGRÉ Session 2006, Paris 27, Aug. 1 Sep. 2. [44] Common Vulnerabilities and Exposures List [Online]. Available: [45] Standards and Projects Under the Direct Responsibility of JTC 1/SC 27 Secretariat, [Online]. Available: catalogue_tc/catalogue_tc_browse.htm?commid=45306 [46] Information Technology Security Techniques Information Security Management Systems Requirements, ISO/IEC 27001:2005 [Online]. Available: [47] Information Technology Security Techniques Information Security Management Systems Code of Practice for Information Security Management, ISO/IEC 27002:2005 [Online]. Available: [48] Information Technology Security Techniques Information Security Risk Management, ISO/IEC 27005:2008 [Online]. Available: [49] L. Piètre-Cambacédès, C. Chalhoub, and F. Cleveland, IEC TC57 WG15 Cyber security standards for the power system, in Proc. CIGRÉ D2 Colloq., Luzern, Switzerland, [50] IEC, Power System Control & Associated Communications Data & communication Security part 1-8, TS. [51] Cryptographic Protection of SCADA Communications AGA Report 12 [Online]. Available: [52] IEEE, Trial Use Standard for a Cryptographic Protocol for Cyber Security of Substation Serial Links Draft 3, [Online]. Available: [53] ISA99 [Online]. Available: [54] Security Technologies for Industrial Automation and Control Systems Technical Report ANSI/ISA-TR [Online]. Available: [55] The ISA99 Standards Vision, A Roadmap for Developing Secure Industrial Automation and Control Systems, in ISA EXPO 2008, Oct [56] NERC CIP Standards as Approved by the NERC Board of Trustees May 2006 [Online]. Available: ftp:// sys/all_updl/standards/sar/cyber_security_standards_board_approval_02may06.pdf [57] NIST, Computer Security Division, Computer Security Resource Centre [Online]. Available: [58] NIST ICS Security Project [Online]. Available: [59] CPNI Guidelines [Online]. Available: [60] J. Weiss, Control Systems Cyber Security-The Current Status of Cyber Security of Critical Infrastructures Testimony before the Committee on Commerce, Science, and Transportation, US Senate, March 19, [61] A. Jaquith, Security Metrics Replacing Fear, Uncertainty, and Doubt. Reading, MA: Addison-Wesley, Göran N. Ericsson (S 90 M 96 SM 06) was born in Huddinge, Sweden, in He received the Ph.D. degree from the Royal Institute of Technology (KTH), Stockholm, Sweden, in In 1997, he joined Svenska Kraftnät (Swedish National Grid), Sundbyberg, Sweden. During , he held expert and managerial positions within the fields of data and telecommunications. During , he was the Chief Information and IT Security Officer. From 2006 to 2009, he was the Convener of the CIGRÉ Working Group D2.22 on information security. As of June 2009, he has been a R&D Manager. Dr. Ericsson is active in the IEEE Power and Energy Society PSCC and CIGRÉ SCD2.
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
Help for the Developers of Control System Cyber Security Standards
INL/CON-07-13483 PREPRINT Help for the Developers of Control System Cyber Security Standards 54 th International Instrumentation Symposium Robert P. Evans May 2008 This is a preprint of a paper intended
SCADA System Cyber Security A Comparison of Standards
1 SCADA System Cyber Security A Comparison of Standards Teodor Sommestad, Göran N. Ericsson, Senior Member, IEEE, Jakob Nordlander Abstract Cyber security of Supervisory Control And Data Acquisition (SCADA)
A Concise Model to Evaluate Security of SCADA Systems based on Security Standards
A Concise Model to Evaluate Security of SCADA Systems based on Security Standards Nasser Aghajanzadeh School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran Alireza Keshavarz-Haddad
Process Control System Cyber Security Standards an Overview
INL/CON-06-01317 PREPRINT Process Control System Cyber Security Standards an Overview 52nd International Instrumentation Symposium Robert P. Evans May 2006 This is a preprint of a paper intended for publication
Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division
Cyber Security focus in ABB: a Key issue 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security in ABB Agenda ABB introduction ABB Cyber
Cyber-Physical System Security of the Power Grid
Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation
San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions August 10, 2015. Electric Grid Operations
San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions August 10, 2015 Electric Grid Operations Director Electric Grid Operations: Responsible for overall transmission
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
Secure Machine to Machine Communication on the example of Smart Grids
Corporate Technology Secure Machine to Machine Communication on the example of Smart Grids 10.ITG Fachtagung Zukunft der Netze 2011, Steffen Fries Siemens AG, CT T, GTF IT Security : +49 89 636 53403 :
White Paper. Convergence of Information and Operation Technologies (IT & OT) to Build a Successful Smart Grid
White Paper Convergence of Information and Operation Technologies (IT & OT) to Build a Successful Smart Grid Contents Executive Summary... 3 Integration of IT and OT... 4 Smarter Grid using Integrated
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE COMMITTEE ON ENERGY AND NATURAL RESOURCES UNITED STATES SENATE
Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering
Cyber Controls : A Critical Discipline of Systems 14 th Annual NDIA Systems San Diego, CA October 24-28, 2011 Bharat Shah Lockheed Martin IS&GS [email protected] Purpose Provide an overview on integrating
Cybersecurity for Electric Power Control and Automation Systems
Cybersecurity for Electric Power Control and Automation Systems Chee-Wooi Ten, Student Member, IEEE, Manimaran Govindarasu, Member, IEEE, and Chen-Ching Liu, Fellow, IEEE Abstract Disruption of electric
Development of a Conceptual Reference Model for Micro Energy Grid
Development of a Conceptual Reference Model for Micro Energy Grid 1 Taein Hwang, 2 Shinyuk Kang, 3 Ilwoo Lee 1, First Author, Corresponding author Electronics and Telecommunications Research Institute,
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT
Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
Models for Cyber Security Analysis
Enterprise Architecture t Models for Cyber Security Analysis Teodor Sommestad Royal Institute of Technology KTH Stockholm, Sweden 1 Consequences of Cyber Security Incidents (?) CIA senior analyst Tom Donahue:
What Risk Managers need to know about ICS Cyber Security
What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] ICSs What are they
Network Cyber Security. Presented by: Motty Anavi RFL Electronics
Network Cyber Security Presented by: Motty Anavi RFL Electronics Agenda Cyber Security Threats Defense Strategy & Consequences Next Generation Networking ICS Vulnerabilities Liabilities Next Gen Networking
Open Enterprise Architectures for a Substation Password Management System
CIGRÉ Canada 21, rue d Artois, F-75008 PARIS (154) Conference on Power Systems http : //www.cigre.org Toronto, October 4-6, 2009 Open Enterprise Architectures for a Substation Password Management System
Cyber security measures in protection and control IEDs
Cyber security measures in protection and control IEDs K. Hagman 1, L.Frisk 1, J. Menezes 1 1 ABB AB, Sweden [email protected] Abstract: The electric power grids and power systems are critical
Claes Rytoft, ABB, 2009-10-27 Security in Power Systems. ABB Group October 29, 2009 Slide 1
Claes Rytoft, ABB, 2009-10-27 Security in Power Systems October 29, 2009 Slide 1 A global leader in power and automation technologies Leading market positions in main businesses 120,000 employees in about
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit
Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions June 4, 2015. Electric Grid Operations
San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions June 4, 2015 Electric Grid Operations Director Electric Grid Operations: Responsible for overall transmission
CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
Preparing for the Future: How Asset Management Will Evolve in the Age of the Smart Grid
Preparing for the Future: How Asset Management Will Evolve in the Age of the Smart Grid Executive summary Most utilities struggle to organize information about their distribution network assets. Operations,
WHAT IS SPECIAL ABOUT SCADA SYSTEM CYBER SECURITY?
WHAT IS SPECIAL ABOUT SCADA SYSTEM CYBER SECURITY? A COMPARISON BETWEEN EXISTING SCADA SYSTEM SECURITY STANDARDS AND ISO 17799 Jakob Nordlander Master Thesis Stockholm, Sweden 2009 XR-EE-ICS 2009:005 WHAT
Smart Grid Cybersecurity
Smart Grid Cybersecurity Exceeding cybersecurity requirements mandated by customers and regulatory agencies Abstract The world has become much more connected, with over 32 percent of the population of
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY GUIDE 2. IMPLEMENT SECURE ARCHITECTURE This guide is designed to impart good practice for securing industrial control systems such as: process control,
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
Feature. SCADA Cybersecurity Framework
Feature Samir Malaviya, CISA, CGEIT, CSSA, works with the Global Consulting Practice-GRC practice of Tata Consultancy Services and has more than 17 years of experience in telecommunications, IT, and operation
data integration/exchange part 2: future technical and business opportunities
techtorial M. Kezunovic, A. Abur, A. Edris, D. Sobajic data integration/exchange part 2: future technical and business opportunities IIN THE UTILITY INDUSTRY, LIKE in many other major industries, it is
How Much Cyber Security is Enough?
How Much Cyber Security is Enough? Business Drivers of Cyber Security Common Challenges and Vulnerabilities Cyber Security Maturity Model Cyber Security Assessments September 30, 2010 Business in the Right
SAM Standards: A Review of ISO 19770-1 1 and 2
SAM Standards: A Review of ISO 19770-1 1 and 2 David Déry Agenda SAM problems Looking for guidance ISO: the organization ISO: the SAM initiative ISO: The outcome: ISO/IEC 19770-1 and 19770-2 Conclusion
Smart Grid Information Security
CEN-CENELEC-ETSI Smart Grid Coordination Group Date: 2014-12 Secretariat: CCMC CEN-CENELEC-ETSI Smart Grid Coordination Group M490-SGCG-SGIS-Intermediate-Report-V1.pdf 1 Contents Page 2 3 4 5 6 7 8 9 10
Reference report Oil & Gas
Central control system for gas distribution pipelines SIMATIC WinCC Open Architecture real time data managing corporate platform implementation Until 2010, EDP Naturgas Energia had four different SCADA
How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System
Network Security in Power Systems Maja Knezev and Zarko Djekic Introduction Protection control Outline EMS, SCADA, RTU, PLC Attacks using power system Vulnerabilities Solution Conclusion Introduction Generator
NIST Coordination and Acceleration of Smart Grid Standards. Tom Nelson National Institute of Standards and Technology 8 December, 2010
NIST Coordination and Acceleration of Smart Grid Standards Tom Nelson National Institute of Standards and Technology 8 December, 2010 The Electric Grid One of the largest, most complex infrastructures
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
TECHNICAL SPECIFICATION
TECHNICAL SPECIFICATION IEC/TS 62443-1-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 1-1: Terminology, concepts and models INTERNATIONAL ELECTROTECHNICAL
Airports and their SCADA Systems. Dr Leigh Armistead, CISSP. Peregrine Technical Solutions
Airports and their SCADA Systems Dr Leigh Armistead, CISSP Peregrine Technical Solutions What We May Face For an attack to be successful it only has to cause disruption not loss of life to a significant
Transforming industries: energy and utilities. How the Internet of Things will transform the utilities industry
Transforming industries: energy and utilities How the Internet of Things will transform the utilities industry GETTING TO KNOW UTILITIES Utility companies are responsible for managing the infrastructure
How To Manage Risk On A Scada System
Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document
ABB North America. Substation Automation Systems Innovative solutions for reliable and optimized power delivery
ABB North America Substation Automation Systems Innovative solutions for reliable and optimized power delivery Substation Automation Systems Advanced substation automation, protection and control solutions
Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008
Utility Telecom Forum Robert Sill, CEO & President Aegis Technologies February 4, 2008 1 Agenda Asked to describe his job, Mike Selves, director of Emergency Management and Homeland Security in Johnson
Smart Metering Initiative ADWEA Program
Smart Metering Initiative ADWEA Program Saeed Nassouri Technical Advisor Abu Dhabi Water & Electricity Authority (ADWEA) Dec 2010 Company Background SMART GRID Basics AMI Project Strategy Project Scope
A MODERN DISTRIBUTION MANAGEMENT SYSTEM FOR REGIONAL ELECTRICITY COMPANIES
A MODERN DISTRIBUTION MANAGEMENT SYSTEM FOR REGIONAL ELECTRICITY COMPANIES A Roberts, T Berry, W D Wilson Schneider Electric Ltd, UK SYNOPSIS This paper describes the features of a modern Distribution
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
Smart Substation Security
Smart Substation Security SmartSec Europe 2014 Amsterdam 29/01/2014 Agenda Context Elia Introduction to the substation environment in Elia Security design and measures in the substation Near and far future
Title of presentation
Title of presentation Edison Makwarela Senior Consultant, Eskom, Gauteng, South Africa Current Situation - The reserve margin is currently 8 10%, against an aspiration of 15% - Increased probability of
OPERATIONS CAPITAL. The Operations Capital program for the test years is divided into two categories:
Filed: September 0, 00 EB-00-0 Tab Schedule Page of OPERATIONS CAPITAL.0 INTRODUCTION Operations Capital funds enhancements and replacements to the facilities required to operate the Hydro One Transmission
Standards for smart grids with emphasis on their realization in remote and rural areas
Standards for smart grids with emphasis on their realization in remote and rural areas Concettina Buccella University of L'Aquila Department of Information Engineering, Computer Science and Mathematics
Cyber Security Health Test
ENERGY Cyber Security Health Test Robin Massink 20-05-2014 1 DNV GL 2013 2014 20-12-2013 SAFER, SMARTER, GREENER Cyber security issues facing the utility industry We are moving from IEC60870-5-101/ DNP3
Demand Response Management System Smart systems for Consumer engagement By Vikram Gandotra Siemens Smart Grid
Demand Response Demand Response Management System Smart systems for Consumer engagement By Vikram Gandotra Siemens Smart Grid siemens.com/answers The Siemens Smart Grid Suite DRMS part of Grid Application
SCADA. The Heart of an Energy Management System. Presented by: Doug Van Slyke SCADA Specialist
SCADA The Heart of an Energy Management System Presented by: Doug Van Slyke SCADA Specialist What is SCADA/EMS? SCADA: Supervisory Control and Data Acquisition Retrieves data and alarms from remote sites
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework Jacques Benoit, Cooper Power Systems Inc., Energy Automations Solutions - Cybectec Robert O Reilly, Cooper
Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System)
Design and Implementation of SCADA System Based Power Distribution for Primary Substation ( Monitoring System) Aye Min Zaw 1, Hla Myo Tun 2 Department of Electronic Engineering, Mandalay Technological
Smart Grid Cyber Security
WHITE PAPER Cyber Security Smart Grid Cyber Security Smart Grid Deployment Requires a New End-to-End Security Approach EXECUTIVE SUMMARY Alstom Grid, Intel, and McAfee have joined their expertise to deliver
IEEE Standards Activities in the Smart Grid Space (ICT Focus)
This document contains supplemental information referenced by the European Rolling Plan for ICT Standardisation IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview IEEE, through the
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids
CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation
Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT
Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT December 3, 2013 slide 1 A global leader in power and
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Where Smart Data meets Data Security Siemens Cloud for Industry powered by SAP HANA. April 2015
Where Smart Data meets Data Security Siemens Cloud for Industry powered by SAP HANA April 2015 Think of a Number! 13642916 Page 2 Prologue: Nineteenth-century Data Overkill Page 3 Prologue: Your Brain
Cyber security. Protecting critical infrastructure in a changing world
Cyber security Protecting critical infrastructure in a changing world Sebastian Obermeier, Sascha Stoeter, Ragnar Schierholz, Markus Braendle Twenty years ago, the cyber security of systems and devices
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB
Smart Grid and Privacy An International View
Smart Grid and Privacy An International View 27 November 2013 By: Nader Farah President ESTA International One US Consumer s Reaction in Texas! 2 Source: SmartGridNews.com July 20, 2012 ESTA International
Designing secure networks for substation automation and control systems
Designing secure networks for substation automation and control systems Niculescu Eliodor Sorin, Rusta Constantin, Mircea Paul Mihai, Ruieneanu Liviu and Daianu Adrian Abstract Development of the energy
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Cost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA
Cost effective methods of test environment management Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA 2013 Agenda Basic complexity Dynamic needs for test environments Traditional
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY GUIDE 5. MANAGE THIRD PARTY RISK This guide is designed to impart good practice for securing industrial control systems such as: process control,
ACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : August 04, 2011 Microsoft Certification ID : 483228 KENT NORDSTROM Asbergsvagen 27 Soderhamn, 82637 SW [email protected] ACTIVE MICROSOFT CERTIFICATIONS: Microsoft Certified Solutions
Integration of Supervisory Control and Data Acquisition Systems Connected to Wide Area Networks
Hitachi Review Vol. 53 (2004), No. 3 169 Integration of Supervisory Control and Data Acquisition Systems Connected to Wide Area Networks Mitsuya Kato Katsufumi Watahiki Tatsuyuki Suzuki OVERVIEW: Continued
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
Grid IQ. Solutions as a Service. GE Energy Digital Energy. Why Solutions as a Service? Subscription based integrated Smart Grid solutions
GE Energy Digital Energy Grid IQ Solutions as a Service Subscription based integrated Smart Grid solutions With any Smart Grid implementation, utilities face extremely large up-front and on-going expenses
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity)
Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity) Abstract Strong identity management enforced with digital authentication mechanisms
Roadmaps to Securing Industrial Control Systems
Roadmaps to Securing Industrial Control Systems Insert Photo Here Mark Heard Eastman Chemical Company Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011 Chicago, IL McCormick
Announcement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
Next Generation Distribution Management Systems (DMS) and Distributed Energy Resource Management Systems (DERMS)
Next Generation Distribution Management Systems (DMS) and Distributed Energy Resource Management Systems (DERMS) S. S. (Mani) Venkata, Principal Scientist Glenn Brice, Director, DMS and DERMS Alstom Grid
