D2-02 B11. Cyber Security requirements and related standards for Substation Automation Systems
|
|
|
- Erika Lester
- 10 years ago
- Views:
Transcription
1 CONSEIL INTERNATIONAL DES GRANDS RESEAUX ELECTRIQUES INTERNATIONAL COUNCIL ON LARGE ELECTRIC SYSTEMS http: // STUDY COMMITTEE D2 INFORMATION SYSTEMS AND TELECOMMUNICATION 2011 Colloquium October 19-20, 2011 Buenos Aires - Argentina D2-02 B11 Cyber Security requirements and related standards for Substation Automation Systems by F. Hohlbaum, P. Schwyter, F. Alvarez ABB Switzerland Ltd. Switzerland [email protected] D2-02 B11 1/11
2 EXECUTIVE SUMMARY Cyber security for automation and control systems in the electric sector has gained considerable attention and importance over the last couple of years. While in the past, cyber security was not considered an issue or only a nice-to-have, it has become a must-have. In addition cyber security got special attention after several attacks were well covered in the media e.g. the Stuxnet attack. Several standards such as NERC-CIP, IEEE 1686 and IEC are addressing cyber security for control systems. Each of them covering and focusing on different areas and parts of the overall system leaving some gaps in between. TC57 WG15 has started to address security for IEC TC57 communication protocols, particularly the IEC , the IEC and the IEC Some parts of this technical specification have been finalized while work on other parts has just started. Performance evaluations of the official released IEC Part 6, performed by ABB, showed that both software as well as hardware implementations can today not satisfy the real-time requirements defined in IEC for GOOSE and SV data. TC57 WG15 has accepted these findings and is now looking at a new approach, in which authentication will be done using symmetric cryptography. TC57 WG15 is currently also starting to address certificate handling, which in the authors views is the basis for all other IEC parts. These TC57 WG15 efforts, addressing cyber security issues, must be driven further so that security can become an integrated part of IEC After all said, one should not forget that there are many other security mechanisms that can and must be used to improve the overall security architecture of modern substation automation systems. The fact that IEC61850 uses mainstream communication technology, i.e. Ethernet and TCP/IP, makes a wide variety of solutions available. Firewalls for examples can protect the security perimeter and VPN technology can build up secure channels to remote centers. Access to systems and devices have to be further protected by using user authentication and authorization coupled with detailed logging of all user activity. As most substations and control centers are interconnected by a wide-area communication network, performance and security of such interconnections play a key-role in running the utilities core business in a highly reliable and efficient way. Even though the majority of these backbone networks are today SDH/PDH dominated, the usage of packet switched technology is increasing and along with it the security threats that need to be addressed carefully. KEYWORDS Cyber Security for Substation Automation Systems, IEC 62351, IEC 61850, Secure Communication, Certificate Handling, Authentication, User Activity Logging, SDH, Ethernet, Patch Management, Intrusion detection and protection systems D2-02 B11 2/11
3 1 Introduction Substation automation, protection and control systems have changed significantly in the past decade. Systems have become more interconnected and provide end users with much more information to allow for higher reliability and increased levels of control. Interoperability between different vendor products and systems has been achieved by developing products and solutions based on open standards (e.g. IEC or IEC ) and by leveraging hardened Ethernet technology. This change in technology has brought huge benefits from an operational point of view, but it has also exposed utilities to similar cyber security threats that traditional enterprise systems have been confronted with since years. The fact that some utility applications have very stringent requirements for instance regarding timing (e.g. for IEC61850 GOOSE / SV messages), availability and environmental conditions (e.g. EMC) makes applying off the shelf technology for substation automation and communication equipment a challenging task and demands tailored solutions. 2 Main cyber security requirements for substation automation Cyber security for automation and control systems in the electric sector has constantly gained attention and importance over the last couple of years. While in the past, cyber security was not considered an issue or a nice-to-have, it has become a must-have and continues to do so. There are different drivers and trends that affect the industry as a whole, e.g. how vendors must continue to address cyber security in their products, systems, processes, procedures, and services, or how end users must address security in procurement, installation and operation through both technical and non-technical means. For substation automation the cyber security requirements can be grouped in three main categories of Group 1 Basic Security Requirements: Secure system architecture such as different security zones Protect the electronic security perimeter Improve the robustness and hardening Authentication and authorization (User Account Management) Auditability and logging (User Activity Logging) Antivirus Protection Group 2 Enhanced Security Requirements: Patch Management Application White Listing Secure communication from outside the system using https, VPN, Intrusion detection and protection systems D2-02 B11 3/11
4 Group 3 Security in protocols / comply with upcoming standards e.g. IEC62351: DNP 3.0 / IEC Secure authentication based on IEC Central user Account Management Certificate Handling The security requirement Group 1 needs to be addressed at first to increase the overall security of the substation automation system. Requirement Group 2 can provide additional security measures for those devices which are connected to a network outside the substation e.g. via a TDM or packet based WAN to the control- or maintenance centre. While the requirements Group 1 and Group 2 can be implemented already today, the requirement Group 3 needs further clarification of the IEC62351 standard. This standard is still in a changing process affecting all parts and needs at least two to three years until it is finalized. In the meantime intermediate security measures shall be considered as described in the following chapters. 3 Overview of available and upcoming standards Several standards such as NERC-CIP, IEC and IEEE 1686 are addressing cyber security for control systems. Each of them covering and focusing on different areas and parts of the overall system leaving many gaps in between. The following picture shows an overview about the standards around substation automation: Figure 1: Cyber Security standards for substation automation D2-02 B11 4/11
5 The standards in this field are in different phases. Some have been finalized, some are still under development. For instance, the IEC standard, which secures all TC 57 protocols, is still under development. Some parts are being revised because the implementations based on the first versions have turned out to be difficult. The completed IEC Part 6 has been proven not to be feasible for practical implementation and a second edition is under way. Several important areas like Role Based Access Control or key handling have just been started and need some time until they are finalized (see also Table 1). Table 1: Ongoing changes in IEC62351 will affect the final version Other parts like Parts 3 to 6 are changing in a way that they are not interoperable anymore to the former version. This makes an implementation of this standard today impossible. 4 The long way to go for the standard IEC Today the major hurdle to implement IEC parts is the lack of cryptography key material such as private keys and certificates. To get there, the organizations will need to implement IEC Part 9 which has just started. TC57 WG15 is currently working on Part 9 first draft which will specify the features, methods and algorithms that vendors will have to implement. IEC Part 5 offers a work around by allowing the use of pre-shared-keys, unfortunately pre-shared-keys do not scale well and are less secure than working with certificates. The idea and goals of TC57 WG15 to secure TC57 protocols look at a first glance logical and simple. But a deeper look into the challenges shows that it is not so trivial to achieve. Here a few reasons why it is taking so long and some of the major challenges to finalize the related standard: Real-Time constrains Cryptography has to be used to secure today s protocols. Unfortunately cryptography means mathematics and a lot of calculations which are time consuming. Many TC57 protocols are used in real-time applications in which reaction times cannot be longer D2-02 B11 5/11
6 than 1 or 2 milliseconds. Unfortunately the more secure the protocols become, the slower the reaction times will be. Methods lifetime Security methods and algorithms have to be updated regularly, methods and algorithms picked a few years ago are today broken, as an example we have the hash algorithms case: MD5 was replaced with SHA-1 and now SHA-1 is being replaced by SHA-256, which itself will have to be replaced a few years from now. So by the time a security standard reaches the maturity to be released, its algorithms and methods will probably be obsolete or unsecure. Consensus As with all standards, common consensus has to be reached among all members working and reviewing the standards (vendors, countries, etc.). There are a lot of players with different security cultures and it takes time for all to agree on all issues. So agreement in all details of a standard takes long. Still even when we overcome all these hurdles listed above and the standards are signed off, there will be the need for huge investments to replace existing devices (so the devices can handle cryptography and they provide minimal security features, such as secured non-volatile memory to store device cryptography keys). While the main focus of this paper is about security for Substations and related control systems, one should not forget security aspects of today s and future communication-services outside substations. This topic shall be addressed in the following section, while today available and affordable security measures are presented in chapter 6. 5 Security challenges for communication outside the substations 5.1 Communication trends Most utilities maintain today an extended communication infrastructure. Depending on their business model, it is used exclusively or in combinations for: Mission critical, operational communication services (e.g. Teleprotection, SCADA) Corporate network services (e.g. Office / admin applications) Selling telecom services to 3 rd parties (e.g. public telecom) The majority of these wide-area-networks are still TDM (legacy, PDH/SDH) based and provide additional Ethernet over SDH (EoS) functionalities. There is a trend to use packet-based interconnections (e.g. Ethernet) also for wide-area communication. A Cigré-Poll in 2010 however shows that nearly 50% of utilities don t expect to change their operational WANservices from TDM to pure Ethernet & IP within the next 10 years. Historically, Ethernet/IP was purely seen as a best effort technology, which excluded it largely from being applied for mission-critical real-time applications. Ongoing developments gradually D2-02 B11 6/11
7 pave the way to using Ethernet-based applications for services that put certain requirements on real-time performance. Various new mechanisms attempting to add deterministic behaviour, fast traffic protection schemes and improved security to Ethernet were proposed in the past. Meanwhile rather well accepted in the field of public telecommunications is MPLS. Its aim is to provide virtual networks for a big number of individual customers & services while maintaining TDM-like protection schemes. MPLS however turns out to be too complex for most utilities, why new approaches were followed up, among them PBB-TE and MPLS-TP. The later seems to be most promising as it fits at least to a certain extent the requirements for transport-services for utility wide-area communication networks. If and how critical applications like differential protection can cope with such upcoming solutions is subject of further investigations though. Having Ethernet for IEC61850 in mind, one can clearly see a two-step approach: In a first phase IEC61850 clearly focused communication-wise on applications within substations. The technical report IEC and the not yet published IEC are however next steps for the definition of IEC61850 based applications between substations or between substations and control centers. It does however not specify security specific aspects of such interconnections at the transport layer. The following clauses just touch some application-independent, transport-layer oriented security aspects of wide area networks. 5.2 Security relevant infrastructure access & tools Substations and control centers provide at least some level of physical security, reducing the risk of undesired physical access to the communication infrastructure. This is however not the case for wide-area communication links. Independent of the selected media (cable, fibre, wireless or even PLC) communication channels cross public space. Eavesdropping or data manipulation however needs for most cases a specialized, costly and powerful infrastructure (e.g. coupling devices, analyzers) which is definitely not the domain of normal hackers. Most at risk are still traditional Ethernet/ IP connections via dedicated cable or non-wdm fibre optic systems. A port mirroring device plus PC-based free from the shelf LAN-analyzer Software combined with related know-how obtainable from the Internet may be the entry point for a security breach. For traditional attacks from outside, official (e.g. Gateways) or unofficial (e.g. private/computer modems) IP-connections from the utility infrastructure to public networks (provider / internet) remain the main-risk. A clear WAN / LAN demarcation concept and strict implementation control ( human factor!) are key to defend against those outsider threats. 5.3 Security aspects in SDH based WAN-networks The SDH transport protocol is currently the dominant technology for fibre optic transport networks of utilities. SDH networks operate at layer 1 of the ISO/OSI model carrying different traffic types and higher layer applications between destinations. SDH uses time-division multiplexing to divide the available bandwidth into so-called virtual containers. Each of the incoming networks is mapped to a set of virtual containers, which are used to transmit the user- D2-02 B11 7/11
8 traffic. The data of each virtual container is transmitted in an exactly specified time slot of the communication. Through these mechanisms it is possible to keep the different applications / users clearly and reliably separated even though they use the same physical media. This adds a first puzzle part of security aspects to SDH-transport networks. Another native SDH mechanism is called Link Capacity Adjustment Scheme (LCAS) and reduces security risks significantly. LCAS allows without interrupting the network connection to pseudo-dynamically adjust the bandwidth to the actual demand. The protocol employs multiple / alternative paths to transmit payload in separated streams to the destination. Therefore, eavesdropping a single fibre /path is not sufficient to receive all data that has been sent to a recipient. This lack of information makes a data analysis and semantic interpretation extremely difficult or even impossible. Not only TDM-connections but also Ethernet over SDH connections benefit from this protection mechanism. 5.4 Security aspects in Ethernet based WAN s Intercepting and analyzing a pure point to point Ethernet-connection on a WAN-segment is a rather easy task. Even in physical ring or meshed topologies of switched networks, packets of a certain connection will typically follow the same working path based on Spanning Tree rules and possibly defined path costs. The concept of MPLS or MPLS-TP is even built upon predefined working and backup paths. Separation of different services as a security aspect may be based on VLANs ( (IEEE 802.1Q), VPNs and in the future combinations thereof with MPLS / MPLS-TP functionalities allocated in Layer 2/3 of the ISO/OSI-model. Except some Port Based Network Access Control restrictions ( IEEE802.1x) most security measures are implemented above Layer 2. Many more details can be found in [2], [3] and for SCADA / IEC61850 applications specifically in IEC Technical considerations Many of the WAN-applications running between substations / control centers are not timecritical or only to a certain extent. This applies to delays / propagation times, jitter and service restoration time after a failure. This is completely different for mission critical services like Teleprotection that limits the usage of standard Ethernet / IP security measures and redundancy schemes for high availability significantly. Just a few aspects to be considered: Routing / L3 functionalities are often part of security implementations. IEC61850 GOOSE / SV-mechanisms are however currently L2-dependent. A L3-extension is under elaboration but L3-delays remain critical. Possible encryption/decryption of WAN-data adds additional critical delays to a system Due to the need for highest availability and reliability, utility communication systems require sophisticated redundancy concepts. Such topologies often contain path-diversity over different media including narrow band channels like Power Line Carrier (PLC). Especially when following the Gateway approach, this poses additional challenges in terms of implementing VLANs, VPNs and other security measures. D2-02 B11 8/11
9 6 Possible solution to address security for substation automation solutions Interactions between the substation automation system, corporate networks and the outside world are usually handled on the station level, which means that ensuring a high level of security on the station level is vital to the security of the SA system itself. Therefore, firewalls, intrusion detection or prevention systems, or VPN technology should protect the substation automation system. All communication from the outside world to a substation should, for instance, be protected by using a firewall and/or VPN-enabled communication. Systems can additionally be divided into multiple security zones as needed to further improve security as shown in Figure 2. Figure 2: Example for a secure system architecture Verified malware prevention software can protect station computers against attacks and viruses. This is however only efficiently possible in an automatic way, if connected to the Internet, bearing the well-known risks. Another possibility to protect the substation computer is the application white listing that can provide a heightened degree of security for substation automation systems. The approach of the application white listing is to maintain a white list of the authorized applications that are installed and make sure it doesn t change. Cyber security can be for instance further improved by limiting the use of removable media in the station computers. Additionally, the system should have integrated security mechanisms such as robust against security attacks, advanced account management and detailed security audit trails. D2-02 B11 9/11
10 7 Conclusions Cyber security for automation and control systems has gained considerable attention and importance lately. The standardization process especially for security related aspects is lagging behind. Within Substations and Control Centers Ethernet/IP technology is fully established, whereas interconnections between sites are still mostly TDM / EoS based. IT-security has to be addressed for both parts of the infrastructure but the Ethernet/IP/ MPLS based applications are definitely the most vulnerable fields. Especially for mission critical services (e.g. teleprotection) processing time intensive processes like encryption and fire-walling are in contradiction to the stringent timing requirements. Here new methods and realistic, implementable standards have to be developed. 8 List of Abbreviations EMC Electro Magnetic Compatibility LCAS MPLS MPLS-TP PDH PKI PLC TDM SDH VLAN VPN Link Capacity Adjustment Scheme Multi Protocol label Switching Multi Protocol label Switching Transport Profile Plesiochronous Digital Hierarchy Public Key Infrastructure Power Line Carrier Time Division Multiplexing Synchronous Digital Hierarchy Virtual Local Area Network Virtual Private Network WAN 9 References Wide Area Network (TDM or Ethernet based) [1] PAC World Conference Practical considerations for implementing IEC [2] The use of Ethernet Technology in the Power Utility Environment Cigré Technical Brochure #460 by WG D2.23 / April 2011 [3] Cigré Technical Brochure #317, Security for information systems and intranets in electric power systems, April 2007 D2-02 B11 10/11
11 10 About the Authors Frank Hohlbaum Global Security Manager Substation Automation, ABB Switzerland Ltd Frank is globally responsible for all aspects of cyber security for ABB s Substation Automation business and is an active member of ABB s Power System Security Council. Frank Hohlbaum joined ABB Inc. in 1996 and has 16 years of experience in substation automation. He graduated from University in Furtwangen (Germany) with Bachelor of Sciences concentrated in software and electrical technologies. Additionally he did post graduated studies in business administration at the University in Zurich (Switzerland). Fernando Alvarez Technical Security Architect, Substation Automation, ABB Switzerland Ltd Fernando is the chief architect for defining security architecture and development strategies for ABB s Substation Automation business. As a Security expert, he leads the technical group related to security for Substation Automation Products. Fernando is an active member of TC57 WG15. A technologist with vast experience in software and system design and implementation, he graduated from California State University, Long Beach with Bachelors in Computer Science Engineering. Paul Schwyter Product Manager Data-Networking, Utility Communication Systems ABB Switzerland Ltd. Paul is part of the Global Product Management team for Utility Communication solutions and today responsible for Data-Networking and high-capacity fibre-optic systems. He has contributed in several CIGRÉ events and Working-Groups. In 2010 he was appointed as SC D2 Member of Switzerland. Paul has graduated at the Federal Institute of Technology in Zürich / Switzerland and obtained his Master in Electrical Engineering in Few years later, he added a Diploma in Marketing at the University of St.Gallen / Switzerland. D2-02 B11 11/11
Cyber security measures in protection and control IEDs
Cyber security measures in protection and control IEDs K. Hagman 1, L.Frisk 1, J. Menezes 1 1 ABB AB, Sweden [email protected] Abstract: The electric power grids and power systems are critical
Cyber Security Practical considerations for implementing IEC 62351
1. Introduction Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB [email protected] Switzerland Two trends are currently changing
Communication Networks. We are securing the past in a fast moving future. FOX605 multiservice platform.
Communication Networks We are securing the past in a fast moving future. FOX605 multiservice platform. FOX605 Overview Operational networks of utilities demand real-time communication across the complete
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Building Secure Networks for the Industrial World
Building Secure Networks for the Industrial World Anders Felling Vice President, International Sales Westermo Group Managing Director Westermo Data Communication AB 1 Westermo What do we do? Robust data
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
SCADA over IP-based LAN-WAN connections Application
SCADA over IP-based LAN-WAN connections Application IP-based SCADA applications are increasing rapidly. This brochure gives you an idea of market trends and introduces you into the basics of SCADA over
Cyber Security for Substation Automation, Protection and Control Systems
Cyber Security for Substation Automation, Protection and Control Systems Steven Kunsman, Markus Braendle ABB Inc. [email protected] USA 1. Introduction Substation automation, protection and control
High Performance, Secure VPN Servers for Remote Utility, Industrial Automation Systems:
High Performance, Secure VPN Servers for Remote Utility, Industrial Automation Systems: Water Pumping Station Security Case Study Industrial Network Security: New Threats The convergence of IT and industrial
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
IT Security and OT Security. Understanding the Challenges
IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
SGTech Europe 2015 September 22 th Amsterdam. Pedro Gama, Head of SCADA & Telecom Department at EDP Distribuição, SA
Time-Critical Applications - applying the latest tools and techniques to guarantee QoS for time-critical applications and services over IP/Ethernet/MPLS telecom networks Pedro Gama, Head of SCADA & Telecom
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
Virtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
THE FUTURE OF SMART GRID COMMUNICATIONS
THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND
WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
White paper. Reliable and Scalable TETRA networks
Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA
Operational Core Network
Service Assured Networking for Power Utilities Application Brochure Operational Core Network Using Carrier-Grade Ethernet Typical users: Transmission & Distribution Power Utilities For more than 30 years,
Introduction. Technology background
White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course
Network/Cyber Security
Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
ICTNPL5071A Develop planning strategies for core network design
ICTNPL5071A Develop planning strategies for core network design Release: 1 ICTNPL5071A Develop planning strategies for core network design Modification History Not Applicable Approved Page 2 of 15 Unit
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Quality of Service in Industrial Ethernet Networks
György Kálmán, ABB Corporate Research Norway, [email protected] Quality of Service in Industrial Ethernet Networks February 10, 2013 Slide 1 Can we provide appropriate Quality of Service for industrial
Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning
Converged TDM and IP- Based Broadband Solutions White Paper OnSite -10 Multi-Service over SDH Provisioning Copyright Copyright 2009, Patton Electronics Company. All rights reserved. Printed in the USA.
Secure Substation Automation for Operations & Maintenance
Secure Substation Automation for Operations & Maintenance Byron Flynn GE Energy 1. Abstract Today s Cyber Security requirements have created a need to redesign the Station Automation Architectures to provide
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
Session 14: Functional Security in a Process Environment
Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Network Cyber Security. Presented by: Motty Anavi RFL Electronics
Network Cyber Security Presented by: Motty Anavi RFL Electronics Agenda Cyber Security Threats Defense Strategy & Consequences Next Generation Networking ICS Vulnerabilities Liabilities Next Gen Networking
DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices
DNP SCADA to SCADA Over : Standards, Regulations Security and Best Practices Earl Emerson, Director Systems Engineering RAD Data Communications 2014 Utilities Telecom Council of Canada Motivations for
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008
UK Networks & Security An Overview Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 Objectives The structure of your public communication networks The threat landscape these networks face
Telephone Company Lease Line Elimination. Dewey Day Principal Operational Technology Architect Pacific Gas & Electric
Telephone Company Lease Line Elimination Dewey Day Principal Operational Technology Architect Pacific Gas & Electric Lease Line Elimination What s Happening? Telephone Companies Eliminating Lease Line
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Smart Substation Security
Smart Substation Security SmartSec Europe 2014 Amsterdam 29/01/2014 Agenda Context Elia Introduction to the substation environment in Elia Security design and measures in the substation Near and far future
SCADA/Business Network Separation: Securing an Integrated SCADA System
SCADA/Business Network Separation: Securing an Integrated SCADA System This white paper is based on a utility example but applies to any SCADA installation from power generation and distribution to water/wastewater
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED RAJESH KUMAR SUNDARARAJAN Assistant Vice President - Product Management, Aricent Group WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED This whitepaper
Designing Reliable IP/MPLS Core Transport Networks
Designing Reliable IP/MPLS Core Transport Networks Matthias Ermel Workshop ITG FG 5.2.1 14. November 2008 München Content 1. Introduction 2. Protection Mechanisms 3. Failure Detection Page 1 Architecture
WAN and VPN Solutions:
WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.
L2 Box Layer 2 Network encryption Verifiably secure, simple, fast. reliable line encryption. Nowadays internal and confidential data is exchanged between locations or computer centres of public authorities
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
Mira Zafirovic-Vukotic, Roger Moore, Michael Leslie, Rene Midence, Marzio Pozzuoli, RuggedCom Inc.
Securing SCADA Communications following NERC CIP Requirements Abstract Mira Zafirovic-Vukotic, Roger Moore, Michael Leslie, Rene Midence, Marzio Pozzuoli, RuggedCom Inc. Asia Energy Week 2008, Kuala Lumpur,
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Building integrated services intranets
Building integrated services intranets A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com CONTENTS CONTENTS...2 1 EXECUTIVE SUMMARY...3 2 INTRODUCTION...4
NETWORK TO NETWORK INTERFACE PLAN
AT&T will provide interconnect points at both the Network Security Operations Center (NSOC) and the Sam Houston Building (SHB), the prescribed DIR locations via AT&T s VPN (AVPN) service. The standards-based
Failsafe Protection for Utility Critical Infrastructure
Failsafe Protection for Utility Critical Infrastructure Introduction PUCs maintain a crucial part of the nation s CI that provide essential services to the public, business and government. Reliable CI
Voice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
Cyber Security Seminar KTH 2011-04-14
Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid [email protected] Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon
MPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
Quidway MPLS VPN Solution for Financial Networks
Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional
SIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
SDH and WDM: a look at the physical layer
SDH and WDM: a look at the physical SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group [email protected] http://www.telematica.polito.it/ Network management and
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
Information Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
Benefits of RPR for Utility Critical Infrastructure Networks
Benefits of RPR for Utility Critical Infrastructure Networks Introduction Utility company professionals charged with designing, maintaining and managing survivable communications networks to support CI,
A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH)
677 A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH) Olabenjo Babatunde 1, Salim Mbarouk 2 1 (Department of Information Systems Engineering, Cyprus International
SDH and WDM A look at the physical layer
SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group [email protected] http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Copyright This
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
Security appliances with integrated switch- Even more secure and more cost effective
Security appliances with integrated switch- Even more secure and more cost effective There is currently a great deal of discussion about the issue of cyber security and its optimisation. But not many businesses
