This page contains a Flash digital edition of a book.
20
ComPuterS & CoNtrolS
Securing integrated Scada
systems against cyber attacks
U
ntil quite
Failure to protect a
recently,
plant's Scada system Scada
from the threat of cyber
systems were
attack can have big
traditionally ‘walled
security implications.
off’ from other systems
Paul Hurst discusses the
protection options.
operating independently
from the network. Prior to
the awareness of possible
Ne pas protéger un
attacks, this seemed to
système Scada d’un site provide all the protection
contre la menace d’une the Scada system required.
cyberattaque risque
However, over time they
d’avoir de lourdes
have become integrated
implications en matière
into larger company
de sécurité. Paul Hurst
aborde les diverses
networks as a means of
options de protection
leveraging their valuable
possibles.
data to increase plant
efficiency. The result
of this is that now their
Das Versäumnis, das
security is often only as
Scada-System eines
strong as the security of
Werks vor der Gefahr
the overall network.
einer Cyberattacke zu
The process of
schützen, kann
schwerwiegende Folgen
protecting Scada networks
für die Sicherheit haben.
starts with the creation of a written security assessment, a physical audit of all the computer
Paul Hurst erörtert die
policy. Failure to have a policy in place exposes and networking equipment, associated software
Schutzoptionen. the company to attacks, loss of revenue and and network routings needs to be performed.
legal action. The security policy should also be A clear and accurate network diagram should
a living document, not a static policy created be used to present a detailed depiction of the
once and then shelved. The management team infrastructure following the audit.
needs to draw very clear and understandable The results would typically be presented in
objectives, goals, rules and formal procedures to a hierarchical manner, which, in turn, sets the
define the overall position and architecture of priority to address security concerns and the
the plan. It should also cover the following key level of related funding associated with each
components: roles and responsibilities of those area of vulnerability. For example, within a
affected by the policy; actions, activities and typical Scada environment, key items and the
processes that are allowed, and those that are related hierarchy could be as follows:
not allowed; consequences of non-compliance. v Operational availability of operator stations.
Prior to completing the written policy a v Accuracy of real time data.
vulnerability assessment must be undertaken to v Protection of system configuration data.
identify both the potential risks associated with v Interconnection to business networks.
the different aspects of the Scada-related IT v Availability of historical data.
infrastructure, and the priority of the different v Availability of casual user stations.
aspects of the infrastructure. In addition, After defining the hierarchy and auditing
the vulnerability assessment also acts as a the different system components, the options
mechanism to identify holes or flaws in the with regard to security measures need to be
understanding of how a system is constructed considered. For Scada networks there are some
(ie its architecture) and where threats against common security mechanisms that apply to
the system may originate. all networks that have any form of wide area
To successfully complete a vulnerability (WAN) or Internet-based access requirements.
www.engineerlive.com
Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44
Produced with Yudu - www.yudu.com