Advance network security, support system monitoring

Cyber security: Applications can improve power reliability and reduce energy costs by advancing network security and supporting system monitoring. Allowing network access raises cyber security concerns. Five defense-in-depth measures can help.

04/20/2015


Mapping networked assets and practicing defense-in-depth strategies can lower the risk of cyber security intrusion, while allowing access to important information, such as energy use. Courtesy: EatonTo make intelligent power management decisions that reduce energy consumption and improve power reliability, it is critical to monitor and understand how power is used, day after day, year after year, although collecting and accessing that information can introduce cyber security concerns.

Does it matter if historical electrical consumption for a facility gets in the hands of the "wrong people"? Probably not. Simply having access to energy usage data may not be exceptionally meaningful or problematic. However, monitoring is used to gain access to equipment to prevent downtime, and see system parameters and diagnostics, creating a risk of unauthorized information access or providing unintended access to equipment operations and settings to unauthorized users.

Therefore, it is necessary to understand that the main focus of the industrial control's network is safety, availability, and integrity of data, and the industrial control system (ICS) security protects the facility's ability to safely and securely operate, regardless of what may befall the rest of the network. 

5 defense-in-depth tips

"Defense in depth" is a strategy to establish variable barriers across multiple levels in the organization to secure the ICS. These barriers include electronic countermeasures such as:

  1. Establish firewalls to add stringent and multifaceted rules for communication between various network segments and zones in the ICS network.
  2. Create demilitarized zones from the established firewall by grouping critical components and isolating them from the traditional business IT network.
  3. Deploy intrusion detection and prevention systems that focus on identifying possible incidents in an ICS network.
  4. Establish well-documented and continuously reviewed policies, procedures, standards, and guidelines regarding IC network security.
  5. Implement continuous assessment and security training to ensure the security of the ICS and the safety of the people who depend on it.

- Marty Aaron is product line manager, and Rick Schear is a product manager at Eaton; edited by Mark T. Hoske, content manager, CFE Media, Control Engineering, mhoske@cfemedia.com.

ONLINE extra

www.eaton.com

See the Control Engineering cyber security page



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
Each year, a panel of Control Engineering and Plant Engineering editors and industry expert judges select the System Integrator of the Year Award winners in three categories.
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Additive manufacturing benefits; HMI and sensor tips; System integrator advice; Innovations from the industry
Robotic safety, collaboration, standards; DCS migration tips; IT/OT convergence; 2017 Control Engineering Salary and Career Survey
Integrated mobility; Artificial intelligence; Predictive motion control; Sensors and control system inputs; Asset Management; Cybersecurity
Featured articles highlight technologies that enable the Industrial Internet of Things, IIoT-related products and strategies to get data more easily to the user.
This article collection contains several articles on how automation and controls are helping human-machine interface (HMI) hardware and software advance.
This digital report will explore several aspects of how IIoT will transform manufacturing in the coming years.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Infrastructure for natural gas expansion; Artificial lift methods; Disruptive technology and fugitive gas emissions
Mobility as the means to offshore innovation; Preventing another Deepwater Horizon; ROVs as subsea robots; SCADA and the radio spectrum
Future of oil and gas projects; Reservoir models; The importance of SCADA to oil and gas
Automation Engineer; Wood Group
System Integrator; Cross Integrated Systems Group
Jose S. Vasquez, Jr.
Fire & Life Safety Engineer; Technip USA Inc.
This course focuses on climate analysis, appropriateness of cooling system selection, and combining cooling systems.
This course will help identify and reveal electrical hazards and identify the solutions to implementing and maintaining a safe work environment.
This course explains how maintaining power and communication systems through emergency power-generation systems is critical.
click me