616,726 research outputs found

    Trends in Process Control Systems Security

    Get PDF
    The protection of critical infrastructure systems is a hotly debated topic. The very label critical infrastructure implies that these systems are important, and they are: they support our everyday lives, from the water and food in our homes to our physical and financial welfare. This article explores the recent evolution of programmable logic controllers (PCSs) and their environments, explains the need for improved security in these systems, and describes some of the emerging research areas that offer promise in PCS security

    Energy security issues in contemporary Europe

    Get PDF
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends in the energy sector. Our paper discusses energy security status and innovations in the energy sector in European Union (EU). We analyze the recent up-to-date developments of the energy policy and exploitation of energy sources, as well as scrutinize the channels of energy streaming to the EU countries and the risks associated with this energy import. Moreover, we argue that the shift to the low-carbon production of energy and the massive deployment of renewable energy sources (RES) might become the key issue in ensuring the energy security and independency of the EU from its external energy supplies. Both RES, distributed energy resources (DER) and “green energy” that will be based on the energy efficiency and the shift to the alternative energy supply might change the energy security status quo for the EU

    Securing industrial control system environments: the missing piece

    Get PDF
    Cyberattacks on industrial control systems (ICSs) are no longer matters of anticipation. These systems are continually subject to malicious attacks without much resistance. Network breaches, data theft, denial of service, and command and control functions are examples of common attacks on ICSs. Despite available security solutions, safety, security, resilience, and performance require both private public sectors to step-up strategies to address increasing security concerns on ICSs. This paper reviews the ICS security risk landscape, including current security solution strategies in order to determine the gaps and limitations for effective mitigation. Notable issues point to a greater emphasis on technology security while discounting people and processes attributes. This is clearly incongruent with; emerging security risk trends, the biased security strategy of focusing more on supervisory control and data acquisition systems, and the emergence of more sector-specific solutions as against generic security solutions. Better solutions need to include approaches that follow similar patterns as the problem trend. These include security measures that are evolutionary by design in response to security risk dynamics. Solutions that recognize and include; people, process and technology security enhancement into asingle system, and addressing all three-entity vulnerabilities can provide a better solution for ICS environments

    Trends in aeropropulsion research and their impact on engineering education

    Get PDF
    This presentation is concerned with the trends in aeropropulsion both in the U.S. and abroad and the impact of these trends on the educational process in our universities. In this paper, we shall outline the new directions for research which may be of interest to educators in the aeropropulsion field. Awareness of new emphases, such as emission reductions, noise control, maneuverability, speed, etc., will have a great impact on engineering educators responsible for restructuring courses in propulsion. The information presented herein will also provide some background material for possible consideration in the future development of propulsion courses. In describing aeropropulsion, we are concerned primarily with air-breathing propulsion; however many observations apply equally as well to rocket engine systems. Aeropropulsion research needs are primarily motivated by technologies required for advanced vehicle systems and frequently driven by external requirements such as economic competitiveness, environmental concern and national security. In this presentation, vehicle based research is first described, followed by a discussion of discipline and multidiscipline research necessary to implement the vehicle-focused programs. The importance of collaboration in research and the training of future researchers concludes this presentation

    Achieving ICS resilience and security through granular data flow management

    Get PDF
    Modern Industrial Control Systems (ICS) rely on enterprise to plant floor connectivity. Where the size, diversity, and therefore complexity of ICS increase, operational requirements, goals, and challenges defined by users across various sub-systems follow. Recent trends in Information Technology (IT) and Operational Technology (OT) convergence may cause operators to lose a comprehensive understanding of end-to-end data flow requirements. This presents a risk to system security and resilience. Sensors were once solely applied for operational process use, but now act as inputs supporting a diverse set of organisational requirements. If these are not fully understood, incomplete risk assessment, and inappropriate implementation of security controls could occur. In search of a solution, operators may turn to standards and guidelines. This paper reviews popular standards and guidelines, prior to the presentation of a case study and conceptual tool, highlighting the importance of data flows, critical data processing points, and system-to-user relationships. The proposed approach forms a basis for risk assessment and security control implementation, aiding the evolution of ICS security and resilience

    PERANCANGAN SIMULATOR SISTEM SCADA PUSAT LISTRIK TENAGA UAP SURALAYA

    Get PDF
    Simulator sistem SCADA (Supervisory Control and Data Acquisition) adalah perangkat lunak berbasis HMI yang mampu memvisualisasikan proses plant. Makalah ini memaparkan simulator sistem SCADA yang digunakan untuk sistem pembangkitan di PLTU Suralaya. Sistem pembangkitan ini terdiri dari 3 proses utama, yaitu proses bahan bakar berupa batubara, proses air sebagai pengisi boiler dan air sebagai pendingin yang diambil dari air laut. Simulator ini menggunakan data teknis yang di ambil dari PLTU Suralaya dan dikembangkan dengan software Wonderware Intouch 10. Software ini dilengkapi dengan gambar komponen, animasi, tampilan kontrol, sistem alarm, real-time trend, historical trend, dan sistem keamanan. Simulator ini menggambarkan aliran energi yang terjadi pada PLTU. Simulator ini dapat digunakan sebagai pelatihan operator sebelum mengoperasikan plant yang sebenarnya. Kata kunci: SCADA, HMI, Human Machine Interface, PLTU, Suralaya, Wonderware Intouch. SCADA system simulator (Supervisory Control and Data Acquisition) is a software-based HMI that can visualize the process plant. This paper describes the simulator of SCADA systems used for the generation system in Suralaya. This generation system consists of three main processes, the processes of fuel, the process water as filler boiler and cooling water were taken from seawater. This simulator uses technical data obtained from Suralaya steam power plant and developed with Wonderware Intouch 10. This software comes with the component images, animation, display control, alarm systems, real-time trends, historical trends, and security systems. This simulator illustrates the flow of energy that occurs in the plant. This simulator can be used as operator training before operating the real plant. Keyword: SCADA, HMI, Human Machine Interface, Steam Power Plant, Suralaya, Wonderware Intouch

    Comparison of Routable Control System Security Approaches

    Get PDF
    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard

    Strategic deterrence redux Nuclear weapons and European security

    Get PDF
    One of the most notable consequences of the end of the Cold War was the diminished role of nuclear weapons in international relations. The world’s primary nuclear weapon powers, the United States and the Russian Federation, made considerable reductions in their nuclear forces. The climax of the process was the New START Treaty signed in 2010. Now, the optimism that characterized the first decades of the post-Cold War era is rapidly evaporating. Geopolitical competition again dominates global and regional security dynamics. Nuclear powers are modernizing their forces and introducing novel systems that may affect strategic stability. At the same time, existing arms control regimes are crumbling. This report takes stock of recent developments in deterrence in general, and nuclear deterrence in particular. Its main ambition is to understand how deterrence has changed in light of certain post-Cold War trends, particularly in Europe. To this end, the report introduces the basic principles of deterrence. It also explores the nuclear-related policies and capabilities of the four nuclear weapon states most directly involved in European security affairs – Russia, the United States, France, and the United Kingdom. Importantly, the report also analyses the implications of the recent trends in strategic deterrence for Northern Europe
    corecore