仂仄仗仍亠从 仂弍亠仗亠亠仆亳 亰舒亳仆仂亞仂 亳仆仂仄舒亳仂仆仆仂亞仂 仗亠亳仄亠舒 亳 从仂仆仂仍亳亠仄仂亶 亟亠亞舒亟舒亳亳 亳仆仂仄舒亳仂仆仆仂亶 亠亳 亳亠仄 仗舒于仍亠仆亳 仍亠从仂仆亠亞亠亳亠从亳 仂弍亠从仂于
REDUCING CYBER-ATTACK ACTUAL DAMAGE BY CONTROLLED DEGRADATION OF THE CONTROL SYSTEM TO LESS VULNERABLE NETWORK CONFIGURATION AND ISOLATING INFECTED SYSTEM COMPONENTS
Classification cyber security threats of modern substationNikandrov Maxim
油
This document discusses cyber security threats to modern power substations. It begins by outlining features of information infrastructures that create opportunities for cyber threats, such as large networks of intelligent devices, lack of network segmentation, and use of unprotected default passwords. It then presents a system model and identifies vectors of potential attacks. Threats are classified into three levels based on their impact: decreasing functional safety and reliability, decreasing transmission efficiency, and violating security of the core transmission process. Examples of possible attacks from a competition are described, such as disabling information networks or reprogramming time servers. Finally, objects are ranked into three security classes based on their impact and influence if compromised.
Cyber Security in Substation Automation (IEC 61850)Nikandrov Maxim
油
This document discusses cyber security risks in electrical substation automation systems that use IEC 61850 protocols. It outlines how unauthorized access and spoofing attacks can manipulate systems by sending false operational commands and positioning data. Specifically, it demonstrates how Man-in-the-Middle attacks can spoof Multicast MAC Secure (MMS) and Generic Object Oriented Substation Event (GOOSE) messages to send false commands. The document calls for improvements in cyber security practices, policies, personnel training, use of encryption and other protections to address these risks.