Cyber Security Management in a Real Time Distributed Control Systems: A Field Based Case Study
By
ABSTRACT
Real time distributed control systems are widely distributed systems, and require a large number of remote terminals, each controlling a small number of devices, and gathering data from a small number of sensors. In a complex system, it works as central processing unit, thus are vulnerable to various types of security threats. The objective of this paper is to present an introduction to the cyber security management in a real time distributed control systems. The paper further explores what real time distributed control systems are and why they are used. It also evaluates the vulnerability of real time distributed control or SCADA systems to cyber threats. The method used for conducting the research is secondary. Thus, after reviewing and analyzing the presented data, beneficial results and conclusions are put forward.
TABLE OF CONTENTS
ABSTRACTII
CHAPTER 1: INTRODUCTION1
Background1
Aims and Objectives2
Research Questions2
Definition of SCADA2
CHAPTER 2: LITERATURE REVIEW3
Overview of Real Time Distributed Control Systems3
SCADA and IT Systems4
Past Cyber Attacks and Incidents in Distributed Control Systems5
Distributed Control System Security5
SCADA Attack Topology Vulnerabilities7
CHAPTER 3: METHODOLOGY9
Research Design9
Research Method9
Data Analysis Method10
Secondary Data10
Qualitative Research10
Literature Search11
CHAPTER 4: DISCUSSION AND ANALYSIS12
Real Time Distributed Control Systems Utilization Area12
Real Time Distributed Control Systems Security Issues13
Vulnerabilities in Real Time Distributed Control Systems to Cyber Threats13
Securing Real Time Distributed Control Systems15
Cryptography for Securing Distributed Control Systems Networks17
CHAPTER 5: CONCLUSION20
REFERENCES21
CHAPTER 1: INTRODUCTION
Background
Real time distributed control systems or SCADA systems are used in the operation of many industrial systems, from the power grid to potable water distribution (Boyer, 1999). They are used to automate large, monolithic systems which are critical to the health and well-being of the citizenry. These systems are widely distributed, and require a large number of remote terminals, each controlling a small number of devices, and gathering data from a small number of sensors (Donald, 2003). Many of these systems are connected to a central control location by a variety of possible commodity communications systems, ranging from radio links to industrial Ethernet connections. Unfortunately, as these systems have grown larger, the pervasiveness and public awareness of these commodity communications systems has also grown.
Corporations and utilities can no longer rely on security through obscurity to protect these systems. Further, with the growth of the Internet, these systems have become increasingly connected, forcing industries to defend against security threats well outside these systems' design parameters (Rinaldi, et al., 2001). Network security and an understanding of these communications problems can only provide a modest amount of security. Drop in modules can provide additional security, but these control systems have product lifetimes measured in decades. The security solutions used in these modules may find them-selves outmoded or broken in a few months or years, becoming a huge expense to any company maintaining a device's security (Knezo, 2002).
Aims and Objectives
The research aims at studying cyber security management in a real time distributed control systems as a field based case study. In addition, the research has following objectives:
To explore what real time distributed control systems are ...