PL EN
Wydawnictwo
AWSGE
Akademia Nauk Stosowanych
WSGE
im. Alcide De Gasperi
BOOK CHAPTER (133-154)
Issues of critical infrastructure cyber security in the power sector
 
More details
Hide details
 
 
KEYWORDS
ABSTRACT
The article presents the problem of modern threats to critical IT infrastructure in the power sector (ICS − Industrial Control Systems) and the current status of global solutions, norms, standards and procedures and shows typical control systems protection strategies employed in the power sector. The emergence of advanced cyber-attacks against power control and distribution systems indicates a growing possibility of military attacks and malware prepared as a new forms of offensive weapons. Taking into consideration the possibility of using advanced techniques in cyber-attacks, most of the existing, commercial protection systems may be insufficient. It is necessary for critical infrastructure in the power sector to isolate systems from the outside world, which in turn could be inconvenient because it limits the possibility of remote process observation. In addition, solutions for the secure data communication are constantly developed and evaluated and this article presents in detail a secure communication solution for acquiring data from industrial DCS automation systems (power generation).
 
REFERENCES (14)
1.
Bayar T. (2016). Cybersecurity in the power sector. Power Engineering International.
 
2.
Clarke R., Knake K. (2012). Cyber War; The Next Threat to National Security and What to Do About It. NY Ecco HarperCollins Publishers.
 
3.
Falliere N., Murchu L.; W32.Sruxnet.Dossier, http://www.symantec.com/conten... [data dostępu: 16.09.2016].
 
4.
Farwell J., Rogozinski R. (2012). Stuxnet and the Future of Cyber War. Survival 54.
 
5.
GE Power Digital Solutions, 5 Security Imperatives for Power Executives, https://www.ge.com/digital/pro...- [data dostępu: 16.09.2016].
 
6.
Hadji-Janev M., Bogdanoski M. (2015). Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare. JVG Books LLC.
 
7.
Kaiser R. (2015). The birth of cyberwar. Political Geography.
 
8.
Kyung-bok L., Jong-in L. (2016). The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd. KSII Transactions on Internet and Information Systems Vol. 10.
 
9.
North Amercan Electric Realiability Corporation CIP Standards, http://www.nerc.com/pa/Stand/P... [data dostępu: 16.09.2016].
 
10.
Rządowe Centrum Bezpieczeństwa Narodowy Program Infrastruktury Krytycznej, http://rcb.gov.pl/wp-content/u... [data dostępu: 16.09.2016].
 
11.
Takebe T. (2014). Trends in Industry Standards and International Standards for Industrial Automation Control System Security. Yokogawa Technical Report English Edition Vol. 57 No. 2.
 
12.
The NIS Directive of the European Parliament, http://eur-lex.europa.eu/legal... [data dostępu: 16.09.2016].
 
13.
Wilson C. (2014). Cyber Threats to Critical Information Infrastructure, chapter un Cyberterrorism: Understanding, Assessment, and Response, Chapter: Cyber Threats to Critical Information Infrastructure. Springer-Swansea University.
 
14.
Zespół międzyresortowy Ministerstwa Cyfryzacji, Założenia Strategii Cyberbezpieczeństwa dla Rzeczpospolitej Polskiej, https://mc.gov.pl/files/zaloze... [data dostępu: 16.09.2016].
 
Journals System - logo
Scroll to top