Substation equipment and cyber issues

Feb. 29, 2008
Substation equipment and cyber issues Much has been written about what did, didn’t, or could have happened with the recent Florida blackout. Any potential terrorism issues would be physical and/or cyber. Physical terrorism is generally visible and can be ruled in or out fairly quickly. Unfortunately, the same cannot be said for cyber. There are several interesting cyber considerations in electric substations: - It is a recognized fact that substations with remotely accessible digital relays re...
Substation equipment and cyber issues Much has been written about what did, didn’t, or could have happened with the recent Florida blackout. Any potential terrorism issues would be physical and/or cyber. Physical terrorism is generally visible and can be ruled in or out fairly quickly. Unfortunately, the same cannot be said for cyber. There are several interesting cyber considerations in electric substations: - It is a recognized fact that substations with remotely accessible digital relays require cyber protection that often does not exist. - DOE national laboratory tests and demonstrations have clearly shown the vulnerability of substation relays to intentional and unintentional cyber threats. - Relays can be remotely misconfigured without SCADA acknowledging or logging the setpoint changes. - Misconfigured relays have shutdown equipment including nuclear plants. - Most relays (and for that matter other control systems) do not have logging capabilities for identifying cyber events. Consequently, it is often not possible to know if relays have been electronically compromised. - Transformers and other large substation equipment can be damaged by cyber events.  There will be a session on cyber vulnerabilities of substation devices and associated IEEE standards at the August Control System Cyber Security Conference in Chicago in August. Joe Weiss  

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.