Smart Grids Part 3. Renewable Energy and Cyber Security



Similar documents
Production and Performance Management in the Automotive Industry. Information as a production factor

Cyber Security. Global solutions for energy automation. Benefit from certified products, system solutions.

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Production Balance Management

Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters

zenon Supervisor Automation at your level. Have a winning advantage with outstanding usability, best ergonomics and excellent performance.

SICAM PAS - the Key to Success Power Automation compliant with IEC and your existing system

/ gridsecurity Cyber Security Global solutions for energy automation Answers for infrastructure and cities.

straton Universal control and strong connections. embedded field bus controller soft-plc scada logic

Siemens ENEAS solutions for substation automation and protection

industry solutions zenon in Food & Beverage Minimize Resources, Maximize Efficiency. Dynamic Process Solutions, Served to Your Taste.

Progress zenon projects to FDA 21 CFR Part 11 compliance

Symphony Plus Cyber security for the power and water industries

Siemens D3 platform 3.0-MW, 3.2-MW, 3.3-MW, and 3.4-MW direct drive turbines. Reduced complexity, increased profitability. siemens.

PSS SINCAL - Overview -

Impact of Renewable generation

Lessons Learned from AMI Pioneers Follow the Path to Success

Florida Department of Education Student Performance Standards

energized: zenon energy edition. reliable supervision and efficient control of energy plants, distribution networks and substations.

future data and infrastructure

Active Directory LDAP

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

VGB Congress Power Plants 2001 Brussels October 10 to 12, Solar Power Photovoltaics or Solar Thermal Power Plants?

Levelized Cost of New Electricity Generating Technologies

Case Study 5 Use of Wind Turbine Technology

Straton and Zenon for Advantech ADAM Copalp integrates the straton runtime into the ADAM-5550 device from Advantech

Industrial Security Solutions

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

Introduction to Cyber Security / Information Security

Client-Server SCADA Technology

Using RFID Technology to Stop Counterfeiting

Security in the smart grid

Modern insurance solutions protect innovative technologies RENEWABLE ENERGY

CSMS. Cyber Security Management System. Conformity Assessment Scheme

2010 Ing. Punzenberger COPA-DATA GmbH. All rights reserved.

2010 Ing. Punzenberger COPA-DATA GmbH. All rights reserved.

2009 Ing. Punzenberger COPA-DATA GmbH. All rights reserved.

William Hery Research Professor, Computer Science and Engineering NYU-Poly

SCADA Security: Challenges and Solutions

AN4108 Application note

CG Automation Solutions USA

Cyber Security and Privacy - Program 183

Future Grids: challenges and opportunities

SCADA SYSTEMS AND SECURITY WHITEPAPER

Microgrids Digital Transformation

White Paper. Convergence of Information and Operation Technologies (IT & OT) to Build a Successful Smart Grid

Cyber Security of the Smart Grid

How To Manage A Project

SCADA Security Training

emobility WAGO Leading the Charge

Cybersecurity and Secure Authentication with SAP Single Sign-On

NTP Software File Auditor

The best network information. COPA-DATA know-how: SNMP with zenon

Alberta Reliability Standard Cyber Security Security Management Controls CIP-003-AB-5

ABB solar inverters. User s manual ABB Remote monitoring portal

RSA SecurID Software Token Security Best Practices Guide

Protecting productivity with Plant Security Services

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Digital Grids: IT-OT Convergence to Enable the Interoperability

Plant automation and telecontrol in one system. SIMATIC PCS 7 TeleControl SIMATIC PCS 7. Answers for industry.

A Systems Approach to HVAC Contractor Security

SCADA Security. Balancing security and functionality in the development and integration of next generation SCADA architectures

Deep Dive on Microgrid Technologies

Cyber Security for SCADA/ICS Networks

Secure Machine to Machine Communication on the example of Smart Grids

Avira Server Security Product Updates. Best Practice

Cutting edge technologies of self reliant and distributed energy. Kimio Yamaka, President of the Institute of Energy Strategy

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Redefining MDM for a Smart Grid Enabled

How to implement an ISO/IEC information security management system

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet

Securely Connect, Network, Access, and Visualize Your Data

GE Measurement & Control. Cyber Security for Industrial Controls

Security in Smart Grid / IoT. Nenad Andrejević Comtrade Solutions Engineering

The pivotal role of TSOs in European energy market integration

SCADA Systems Automate Electrical Distribution

Convenient Charging of Electric Vehicles

Smart Grids. MIECF Conference April 2011

Fact Sheet on China s energy sector and Danish solutions

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Running a Load Flow Analysis

Solar, storage and mining: New opportunities for solar power development. By Thomas Hillig (THEnergy) and James Watson (SolarPower Europe)

RENEWABLE ENERGY MIX FOR EGYPT

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Symantec Client Management Suite 8.0

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Wind Cluster Management for Grid Integration of Large Wind Power

Transcription:

Smart Grids Part 3 Renewable Energy and Cyber Security

Following COPA-DATA s first two articles about Smart Grids, we will review two more topics in this white paper. Firstly, the very current topic of renewable energies - which has received an additional boost as a result of the current discussions about nuclear power. And secondly, the topic of cyber security in the Smart Grid. Goodbye nuclear power? For some countries, nuclear power remains a seminal source of costeffective electricity. Other countries, such as Germany for example, want to take their nuclear power plants out of the grid as soon as possible. The gaping hole in energy generation is to be filled with renewable energies. The greatest potential for closing the hole is, in addition to photovoltaics, wind energy. In order top replace all 17 German nuclear power plants, the number of wind turbines in Germany has to be more or less doubled. Even though the pull-out from nuclear power will not - and cannot - be carried out overnight, and even though generation of the energy shortfall can only be made up in part by wind power plants, the growth of wind energy will continue. The number of wind turbines already installed, just under 22,000 in Germany alone, will certainly multiply in the coming years. It should be noted that COPA- DATA s HMI and SCADA system, zenon, plays a significant role in local turbine control and park management. Efficient visualization of local turbine control in the nacelle or in the tower is one of zenon s major strengths. Due to its scalability, starting with Windows 7, or even Server 2008R2 systems for park management applications, through to Windows embedded platforms for turbine control, zenon ably plays on its strength as one tool for many platforms. This results in the GUI (user interface) of the turbine control being accessible with overlaid park management without additional software being required. The flexible design of the park management administration through the tools and modules of zenon are enhanced by a multitude of integrated communication possibilities. For example, communication via IEC 61400-25 can be configured quickly and easily. However, direct forwarding of data to a telecontrol protocol such as a IEC 60870-5-101/-104, if required, completes the system. In addition to the expansion of renewable energies at a national level, solutions being presented are increasingly dependent on energy imports. In Germany, one option being considered for the future is fulfilling the basic load with power from French nuclear plants.. Abandoning nuclear power is not an option for France. With nearly 60 nuclear reactors in operation, France is dependent on this source of energy and also earns a great deal of revenue from exporting energy produced by nuclear power plants. 2

Another option being pursued is the hundred-year old idea of producing power from the desert. Solar-thermal power plants are being constructed in the desert under the name of Desertec. Within six hours, the deserts will receive more energy from the sun than humanity consumes in a year. Or to put it another way: The deserts of the world could theoretically generate 300 times the amount of energy that humanity requiresi. The plan is to convert solar energy from the Sahara into electrical energy and to route this to the major energy consumers. The major energy consumers are north of the Sahara in Europe. How can these amounts of energy be transported over several thousands of kilometers whilst keeping loss as low as possible? One technology that promises low losses during transfer is High Voltage Direct Current (HVDC). A loss of 3% over 1000 kilometers is cited. This is approximately a tenth of the loss from a 380 kv cable using conventional A/C technology. HDVC lines between Africa and Europe could become an umbilical cord for Europe in the future.. This will hold especially true at times when there is no wind in Europe.. These lines will therefore need to be well monitored, using, for example, SCADA systems such as zenon. In order for not only the process (i.e.: the transmission of energy) to be monitored, but also the system to be protected from external threats, precautions to prevent cyber crime must be taken. Cyber Security Due to the convergence of energy generation and web technologies within the Smart Grid, energy companies must now consider the risk of attack from hackers. In addition to the theft of energy, the greatest threat comes from hackers with a terrorist motive. For this reason, discussions in a number of research projects and working groups are concerned with overcoming this threat. Due to its sensitivity in relation to terrorist activities, the USA leads the field ahead of Europe in this. The CIP (Critical Infrastructure Protection) Standards from the NERC (North American Electric Reliability Corporation), to which much attention is given in the energy sector, form the basis for the strengthening of guidelines for European manufacturers and integrators. A study from Red Tiger Security ii shows that there is a need to take action. There are already a multitude of loopholes in the classic set-up of energy generation, energy transmission and energy distribution. What was interesting about this study was, amongst other things, that security loopholes were closed on average only 331 days after they became known. Hackers would have had time to carry out attacks during this 331 day period. Most shortfalls in security were between the company network and the HMI network. Between these two domains, there is usually the network for archiving, the domain controller, web server and various applications for tasks such as optimization and forecasting 3

services. Because this area is something of an interface between two worlds the IT world and the SCADA world and these two worlds are maintained by different personnel, there is often no clear accountability here. This then leads to things such as irregular maintenance cycles, or security patches only being implemented after a delay. This finding alone proves once again that security is not just a matter of systems and technology, but instead one of accountability, responsibility, working processes and documentation. Clearly responsibilities and processes must always be clarified and defined internally. It should then be possible to rely on a system which meets the corresponding security requirements, such as zenon. Properties that zenon possesses in order to create more secure applications include: Storage in binary format Encrypted network protocol Password stored in encrypted form No SQL server when the program is running User administration Active Directory or ADAM Documentation of system components Separation of applications and engineering Option for authentication and encryption of communication protocols Furthermore, COPA-DATA supports its customers in creating securityrelated documentation. The challenges in relation to system security for energy supply companies are definitely increasing. We want to support you with this. If you would like to find out more about Smart Grids, the security features of zenon or zenon Energy Edition, visit us at www.copadata.com/energy or email us at energy@copadata.com. 4

2011 Ing. Punzenberger COPA-DATA GmbH All rights reserved. Distribution and/or reproduction of this document or parts thereof in any form is permitted solely with the written permission of the COPA-DATA company. The technical data contained herein has been provided solely for informational purposes and is not legally binding. Subject to change, technical or otherwise. zenon and straton are both trademarks registered by Ing. Punzenberger COPA-DATA GmbH. All other brands or product names are trademarks or registered trademarks of the respective owner and have not been specifically earmarked. i Dr. Gerhard Knies; Physician; Hamburg ii Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters; Jonathan Pollet, CISSP, CAP, PCIP; July 2010 5