Loading...
Loading

Cyber Security Analysis Of Automation Systems

2019-06-28by Sarah Del Rosario

The cyber security of numerous industries has been compromised over the last few years. The international standardization committees and the research community have raised their awareness about protecting the information in Substation Automation Systems (SAS). Many of today’s control systems use the same operating system, PC hardware, and communications as corporate office and industrial networks. Hence, the security of automation systems is an urgent issue.

The use of common technologies in industries – Ethernet/TCP/IP, Microsoft Windows, and Intel PC-based computers, means that vital process and production control systems can be exposed to the same security threats and spams that corporate IT departments have been experiencing for several years.

However, with automation systems, there are definite differences in assumptions, objective, and goals of what needs to be protected. As per the experts at Equustek, it is critical to understand what ‘continuous operation,’ and ‘real-time performance’ really means and hence, determine how benevolent software security solutions hinder with automatic control systems. 

Beyond the common architectures, numerous industry networks are connected with process networks. This change has opened doors for the viruses and hackers to enter the process and production environments. If under-managed, or simply ignored, this can lead to severe problems.

In reality, the process automation systems were planned and developed for performance and functionality, not security. These systems were mostly exclusive and required specialized knowledge to operate. Considering the end-to-end functions, system components were introduced as black boxes, and there was negligible concern regarding its interconnectivity with other systems. They were functioned in separation from the rest of the systems – both physically and technically, assuming a milieu of implicit trust. Therefore, when these systems are introduced in conventional industrial networks, they are often the drawback in total network security.  

 

Experts recommend having separate networks where firewalls and routers strictly limit access to control systems and automation. Applications and users on control networks should be restricted to those explicitly required for the process – no internet browsing, no games, and no emails. Control rooms may also need a separate business network for business applications and email. Budget-conscious administrators broadly suggest network commonality; however, it exposes the automation systems network to a whole host of issues. Although the parallel connection of separate networks is not an amenity, it is critical and should be mandated.

Secure location and architecture

Security comes from proper design, maintenance, and operation of security infrastructures and architectures that provide up to date protection. A robust network security environment includes in-built high security engineered into the infrastructure, while allowing administrators, supervisors, and operators the ability to interact with the systems without getting into prolonged, tedious, and arduous procedures.

Final Words

A well thought out security architecture provides the necessary mechanisms for prioritizing and managing traffic, give preferential treatment to control traffic, and restrict outside traffic. 

news Buffer
Author

Leave a Comment