Security

Meeting IED Integration Cyber Security Challenges

Download Now Free registration required

Executive Summary

With the aim to replace legacy protective relays, and to enhance metering and equipment monitoring, utilities are currently installing large numbers of modern Intelligent Electronic Devices (IED) in their substations. These devices are useful in providing valuable information to help utilities in improve reliability and also to reduce operating costs. The integration of IEDs also requires utilities to deploy extensive communication networks. These devices are now connected using modern communication technologies. This has resulted in the growing concern about the security of Supervisory Control and Data Acquisition systems (SCADA). Although, traditionally, SCADA systems used dedicated communication lines and obscure protocols, which me them secure, but now when they are being deployed with modern systems using industry standard TCP/IP networks, wireless technologies, and standard protocols such as DNP3 or IEC 60870-5-104, the security has become a big issue. The paper provides information with the purpose of assisting utilities in meeting IED integration cyber security challenges. Security is necessary for generating confidence in customers. Only if one has enough confidence in information security, will one trust the personal savings to banking system computers, which can be easily accessed through thousands of ATMs throughout the world. SCADA security is still in its development stage. This makes it necessary for regulatory bodies to develop measures that meet the requirement of experts in both the fields of security and process control. With the aim to replace legacy protective relays, and to enhance metering and equipment monitoring, utilities are currently installing large numbers of modern Intelligent Electronic Devices (IED) in their substations. These devices are useful in providing valuable information to help utilities in improve reliability and also to reduce operating costs. The integration of IEDs also requires utilities to deploy extensive communication networks. These devices are now connected using modern communication technologies. This has resulted in the growing concern about the security of Supervisory Control and Data Acquisition systems (SCADA). Although, traditionally, SCADA systems used dedicated communication lines and obscure protocols, which me them secure, but now when they are being deployed with modern systems using industry standard TCP/IP networks, wireless technologies, and standard protocols such as DNP3 or IEC 60870-5-104, the security has become a big issue. The paper provides information with the purpose of assisting utilities in meeting IED integration cyber security challenges. Security is necessary for generating confidence in customers. Only if one has enough confidence in information security, will one trust the personal savings to banking system computers, which can be easily accessed through thousands of ATMs throughout the world. SCADA security is still in its development stage. This makes it necessary for regulatory bodies to develop measures that meet the requirement of experts in both the fields of security and process control.

  • Format: PDF
  • Size: 72.5 KB