Cybersecurity for Protection and Control Systems: An Overview of Proven Design Solutions

This article explains practical design principles to follow for networked protection and control (P&C) systems. Proven cybersecurity best practices, system architectures, monitoring methods, and defense-in-depth techniques are described. The risks and proper mitigations are explain ed for many common problems, such as human error, malicious malware, and advanced nation-state zeroday attacks. This article references and summarizes several industry standards.

[1]  Krishnanjan Gubba Ravikumar,et al.  Complete power management system for an industrial refinery , 2015, 2015 IEEE Petroleum and Chemical Industry Committee Conference (PCIC).

[2]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[3]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[4]  Paul Omar,et al.  Framework for evaluating information flow security in multicore processors , 2012 .

[5]  Yakov Rekhter,et al.  Address Allocation for Private Internets , 1994, RFC.

[6]  Scott Manson,et al.  Practical cybersecurity for protection and control system communications networks , 2017, 2017 Petroleum and Chemical Industry Technical Conference (PCIC).

[7]  Nicholas Seeley,et al.  Making peace with communications networks: What power engineers need to know about modern and future network communication for plants and substations , 2011, 2011 Record of Conference Papers Industry Applications Society 58th Annual IEEE Petroleum and Chemical Industry Conference (PCIC).