IT in Manufacturing


Cyber security in utility ­communication networks

March 2016 IT in Manufacturing

Security concerns faced in the electrical substations of today stem from a variety of factors. The adoption of new technologies – such as transmission control protocol/Internet protocol (TCP/IP)-based technologies for both substation automation networks and wide area network (WAN) communications between substations – has opened these networks up to more cyber threats. A good cyber security policy, however, is a simple first step to maintaining the reliability and the safety of substation and grid operations.

Cyber security is often used to describe protection against online attacks, but a more holistic view of cyber security involves a collection of measures adopted to prevent unauthorised use, malicious use, denial of use, or modification of information, facts, data or resources. Cyber security not only refers to intentional attacks from outside the network, but also internal issues and unintentional modifications of information.

With both internal and external threat sources in mind, it is important to establish preventative processes for any issue that could lead to network downtime. These measures could include devices, configurations, internal security policies, and employee and contractor training. And since it’s not realistic to assume all threats can be prevented 100% of the time, recovery strategies after issues occur are also critical to protect network uptime.

Cyber security in utility communication networks

Historically, substation control networks were based on local connections and proprietary applications. Systems were designed for safety, reliability and ease of use, and security was not traditionally a concern of network managers or installers. But this approach is no longer valid.

Today’s communications networks are characterised by the use of:

• Commercial off-the-shelf technology.

• Ethernet and TCP/IP-based communications protocols.

• Open standards, IEC60870-5-104 and IEC61850.

• Integration of legacy industrial protocols (DNP3) and Modbus TCP.

• Remote connections (multiple devices and mobility).

• Interconnection with company IT systems.

• Use of public networks.

The complexity of power grids has increased over the years. As they have become interconnected with systems across countries, it has made failures and mistakes more likely – and their potential impact greater in scope and cost.

A thoughtful cyber security policy, combined with a well-designed network infrastructure, can help minimise or contain threats. Cyber security policies strive to meet three main objectives:

1. Confidentiality: preventing unauthorised access to information.

2. Integrity: preventing unauthorised modification or theft of information.

3. Availability: Preventing denial of service (DoS) and ensuring authorised access to information.

In IT networks, confidentiality is the main objective. However, in industrial networks, availability is the critical design parameter.

Analysis of threats

Most network security incidents are accidental instead of intentional. According to the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) vulnerability analysis, authentication flaws were the most abundant vulnerability type identified in 2013. This liability is of particular concern because an attacker with a minimal skill level could potentially gain administrator level access to devices that are accessible over the Internet. Other common vul­nerabilities identified in the analysis include factory hard-coded credentials and weak authentication keys.

Unintentional threats, such as equipment failures and employee carelessness, and deliberate threats, like cyber hackers and viruses, have different types of consequences.

They impact information systems, network infrastructure management and power system assets differently. Due to the critical role the communications network plays in the operation and protection of the high voltage and medium voltage grids, a DoS attack may lead to service disruption and financial losses, as a result of repairs and equipment replacement.

Cyber security is an iterative process – not static. As surrounding conditions or threat sources change, systems and policies may need to be updated to address those changes.

For a better understanding of this process, interested readers can download the full Belden white paper at: http://www.instrumentation.co.za/J667.pdf





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Revolutionising mining operations with MineOptimize
IT in Manufacturing
Now more than ever, mining and mineral processing companies need to boost productivity, ensure safety, and protect the environment. ABB’s comprehensive electrification, automation and digital solutions portfolio is ideally positioned to meet these challenges across all mining processes, from mine to port, transforming performance in a digital world.

Read more...
Buildings in Africa’s urban evolution
Schneider Electric South Africa IT in Manufacturing
Africa is now an urban continent. How does the continent mobilise to accommodate urban dwellers and maintain and implement critical infrastructure that allows for this expansion? Building management systems provide a tangible solution to optimise resource use, lower operations costs and ultimately contribute to a growing continent that also employs green practices.

Read more...
TwinCAT Vision functionality extended
Beckhoff Automation IT in Manufacturing
The image processing and camera integration capabilities of Beckhoff’s TwinCAT 3 Vision software have been expanded.

Read more...
Automation software to future-proof your operations
Adroit Technologies IT in Manufacturing
As the official partner of Mitsubishi Electric Factory Automation, Adroit Technologies empowers businesses with cutting-edge solutions that reduce costs, improve quality and increase productivity.

Read more...
Siemens automation portfolio, your bridge to the industrial metaverse
Siemens South Africa IT in Manufacturing
Step into the future with Siemens’ automation portfolio, your bridge to the industrial metaverse. Our cutting-edge solutions integrate AI, digital twins and real-time simulation, driving smarter, more efficient production.

Read more...
Transform your manufacturing efficiency
TransLution Software IT in Manufacturing
MÄDLER offers a wide range of gears in various materials, modules and designs, available directly from stock.

Read more...
Optimise the cutting of metal materials
IT in Manufacturing
KRON Cutting is a comprehensive web-based system designed to optimise the cutting of metal materials, including rebar, pipes and profiles.

Read more...
Black Rock Mining centralises mining operations with AVEVA
IT in Manufacturing
Black Rock Mine Operations replaced and upgraded its existing infrastructure, and installed additional capacity to expand production from 3 to 4,6 million tons in three years. The new system is powered by a suite of AVEVA solutions.

Read more...
The strategic role of technology in today’s economy
IT in Manufacturing
In an era of economic uncertainty and persistent market volatility, businesses are under immense pressure to manage costs while maintaining operational effectiveness. The role of chief information officers and chief technology officers has never been more critical, as they are tasked with leveraging technology not just as a tool for efficiency but as a strategic asset in navigating these turbulent times.

Read more...
Minutes to meltdown: surviving a cyber attack
IT in Manufacturing
Commvault recently hosted its Minutes to Meltdown event. Led by the company’s security experts, this was an interactive and detailed ransomware attack simulation designed to help companies understand how to respond in the event of a cyber attack.

Read more...