You are on page 1of 5

TRANSMISSION

Investigating the security of


power system SCADA
by Edward Chikuni, Polytechnic University of Namibia, and Maxwell Dondo, Defence R&D, Canada

Supervisory control and data acquisition (SCADA) systems control and monitor the majority of the utility networks today. The increased number
of attacks on computer systems and computer networks has resulted in an increased concern of security issues in inter-networked industrial
automation systems.

Internal and external saboteurs pose a big monitors the equipment essential for power prompted many researchers to focus their
threat that could disrupt power delivery. To delivery. It is used, among other things, for attention to this critical and often overlooked
give us a better understanding of the nature fault detection, equipment isolation and part of public infrastructure [3], [12]. The 2003
of the vulnerabilities to supervisory control and restoration (protection), load and energy power blackout in Canada and parts of the
data acquisition system (SCADA) systems and management, automated meter reading, USA served as a wake-up call to what could
highlight the need to defend and protect the and substation control. happen in the event of a successful attack
SCADA systems from ongoing cyber threats, to power grid [15].
Many of the SCADA systems being used by
we investigate the vulnerabilities and ways
today’s utilities were developed many years SCADA background
to protect them which are unique to SCADA
ago; before the Internet and there were
systems. We achieve this by studying SCADA The geographically dispersed electric power
no public or private computer networks.
communication systems as well as taking system grid is commonly controlled by a
a survey of common SCADA vendors; we The only security threat to the utilities and
SCADA system consisting of at least one
focus our attention to SCADA on the electric SCADA systems was physical destruction
computer running appropriate application
power grid. We find that SCADA vendors do [11]. Nobody foresaw advances in the utility
software. The components of the SCADA
not implement adequate security measures industr y in equipment automation and
system are interconnected by varying types
in their products, and we recommend that a deregulation which would require SCADA
of communications media.
security policy be put in place to ensure the systems to be interconnected. The need
security of the vital public infrastructures. for remote connectedness of these control Ideally, the SCADA communications are
devices opened up the whole interconnected intended to be interconnected to every
To assist in the management and control system to new and challenging vulnerabilities part of the utility as illustrated in Fig. 1. The
of the country’s critical infrastructures, such majority of the SCADA’s main controls are in
that every computer network in the world is
as the electrical power grid, automation the control center where operators man the
facing today– cyber-attacks [3], [18]. Utilities,
processes like SCADA were developed
governments, and other stake-holders are SCADA computers.
and implemented – complete with remote
teaming up together to tackle these latest
communications. The complexity of the Access to the control room is usually limited
threats.
interconnected controls adds new challenges to the few controllers who work on the control
for the deliver y of secure and reliable Although the biggest threat to electric utilities machines. SCADA systems have a wide
services by these systems. The electrical is still physical destruction, the number variety of functions which are crucial to the
power system SCADA system controls and of cyber attacks to SCADA systems has day-to-day running of the electrical power

Fig. 1: SCADA communications in an electric power system.

energize - December 2007 - Page 22


TRANSMISSION
utility. These functions include identifying faults, and distribution substations. IEDs include sabotage through the physical destruction
isolating them and restoring service, circuit meters, voltage regulators, transformer tap of the utility ’s property. SCADA systems
breaker and recloser control, feeder switching positions, relays, reclosers and other electrical were secured by limiting physical access
and reconfiguration, line switching, voltage transducers. to the SCADA terminals and consoles that
control, load management, automatic SCADA devices are interconnected by control the electric grid to a few authorised
meter reading, automatic generation communication links such as optical fiber, controllers. However, as the modernisation of
control, economic dispatch, simulation radio, telephone line, microwave, satellite, SCADA systems continues, they are getting
and emulation, capacitor bank switching, or ethernet. The IEEE standard C37.1-1994 increasingly interconnected to internal and
voltage regulator monitoring, transformer specifies the communication topologies external networks (and the Internet as a
temperature, and metering [5], [7]. used in SCADA. They vary from simple a point- whole). This exposes the SCADA system to
to-point to composite architectures with one vulnerabilities inherent in these networks,
It is important to mention at this point that
single master station, multiple sub-master such as the numerous reported cases of
the electric utility is constructed with built-in
(slave master) stations and multiple RTUs. attacks and potential threats on SCADA
automatic safeguards and controls that
systems worldwide [6], [9]. These range from
are ideally intended to ensure reliable One or more IEDs may link to a RTU through
attempted DoS attacks on an Israeli power
supply as specified in the the IEEE standard a fieldbus [4] such as Profibus or Foundation
Fieldbus. The communication links may also plant [17] to slammer worm attacks on an
C37.1 (among many other powers systems
use different interface types, e.g. RS-232, Ohio nuclear power plant [13], [14]. There
standards). Automatic relays, reclosers and
RS-485, depending on the SCADA protocol are also reported vulnerabilities like the GE
circuit breakers ensure that power supply
and architecture being used. SCADA systems XA/21 [15] bug that could be exploited by
is uninterrupted by altering the power
can also be connected to the local area attackers if systems are not patched. This
flow routes to circumvent faults that may
network (LAN). This enables anyone within bug contributed to the North American
disrupt power flows. If SCADA systems fail,
the LAN with the correct authentication and blackout of 14 August 2003.
or they send a control signal that ends up
applications software to be able to access
needlessly shutting down power flows, then These attacks are not unique to SCADA
the SCADA system.
the automatic controls would self-correct systems. The vulnerabilities capitalised in
and send the right signal to ensure continued SCADA software these cases affect all networked computers
power supply. regardless of where they are deployed. The
The SCADA master also runs some selected
unique thing about SCADA systems is that they
energy management system (EMS)
The bottom line is that SCADA controls can are highly customized and rarely have the
applications. The additional utility applications
only work within the specified parameters same configuration and functionality. Thus,
software are used to communicate and
of the powers systems network they are attacking SCADA systems requires specific
control other parts of the grid, like the
controlling. For example, they cannot raise and detailed knowledge.
protection or unit commitment systems.
the temperature of the substation when there
Software is available in either proprietary or Historically control of utility power systems was
are no heaters in the substation.
open protocol implementations. Most utilities a failsafe system that did not rely on computer
SCADA devices would prefer open software so that they don’t systems. The use of computer systems in
depend on just one equipment manufacturer, SCADA has exposed the SCADA networks
The main component of the SCADA system is
and they don’t have to pay royalties [4], [7]. to computer vulnerabilities. We will look at
the SCADA master. This is usually a computer
RTU software is used to communicate with SCADA vulnerabilities by considering the
system (PC based systems or workstations) the master station and other RTUs. Some computing vulnerabilities at various points in
running the appropriate SCADA software RTUs have sufficient processing power to the SCADA network. We then present possible
under an appropriate operating system be able to perform some local control, e.g. solutions to those vulnerabilities that are
[7]. These computers also provide for and automatic switching of capacitor banks for unique to SCADA systems, paying particular
interface with monitors to provide controllers var compensation. attention to the elements of computer
with a visual state of the system.
Other key components of the SCADA software security (authentication, confidentiality,
A SCADA system consists of remote terminal include alarms, trends, and databases. It also integrity, availability).
units (RTUs) located in different parts of needs to be fault-tolerant, scalable and able SCADA computing vulnerabilities
the utility, such as substations and power to support client/server distributed computing.
plants. RTUs are special purpose computers The vendors range from providers of the We discuss the computing vulnerabilities
containing both analog to digital converters computer operating systems to the SCADA whose sources include protesters, activists,
and digital to analog converters. They applications that sit on these operating hobbyist hackers, terrorists, employees
communicate their data with the SCADA systems (OSs). While the UNIX multi-tasking and former employees, vendors, and
master, sub-master, or with other RTUs through operating system was traditionally used for contractors.
the multiple sports. higher sophistication and complexity, it is SCADA hardware
gradually being replaced by Windows. Linux
More than one ma s t e r s t a t i o n m a y The vulnerabilities on the different SCADA
is gaining popularity as an OS of choice in
communicate with an RTU. In large systems, hardware devices (RTUs, IEDs, SACAD masters,
SCADA systems due to its low cost and UNIX-
sub-masters (slave masters) gather information like properties [7]. etc.) are similar to the vulnerabilities of
from the RTUs and relay it to and from the regular computer systems: interruption (DoS),
control master station. Depending on the Typical SCADA vulnerabilities interception and eavesdropping. Similarly, the
architecture, repeaters may also be required. When SCADA systems were first put into communications link between the hardware
Generally, RTUs interface with intelligent widespread use, the only plausible threat devices is also susceptible to vulnerabilities
electronic devices (IEDs) used in transmission to the SCADA system was considered to be seen in regular computer networks.

energize - December 2007 - Page 23


TRANSMISSION
SCADA information usually travels through SCADA communications [1] through the Gas quick solution that may be unique to SCADA
exposed communication links. In most cases, Technology Institute (GTI). It is recommending access control would be to house computers
messages are not encrypted. This may result the use of encryption to protect vital data. that have SCADA consoles in very secure
in data or password interception; whether buildings and locations. This reduces the
SCADA networks
proprietary protocols are used or not. SCADA likelihood of a disgruntled former employee
monitors are generally not shielded to protect Each point in the SCADA network is a having access to the SCADA controls.
radiation emissions that could be read by potential entry point and remote access is
Other SCADA vulnerabilities
unauthorised people. usually available. While these security holes
are also present in any current computer SCADA systems still need to be housed in
One important remedy to hardware
network, SCADA systems are particularly more secure locations where access is restricted to
vulnerabilities is to have a strong security
vulnerable since very little work has been authorised personnel only. This also applies to
policy in place. New hardware should always
done to enhance their security; nobody all IEDs and RTUs. Pole mounted IEDs should
pass the National Computer Security Center
believed that there was a problem there. be placed in locations that are inaccessible
(NCSC) C2 rating. Encryption can also be
to unauthorized users. The control room may
used on the communication links, and in To make matters worse, some of the SCADA
need to be shielded so that emissions from
some cases, fibre optic cables may reduce networks are interconnected through the
control monitors may not be accessible to
the risk of interception, fabrication, and Internet, and use common internet protocols
unauthorised individuals.
modification of SCADA data. SCADA monitors for communication. With less security in
should also be shielded if the control room is place for SCADA systems, it makes them Unlike most IT professionals, SCADA operators
not located in a very secure environment. vulnerable to potential internet attacks. are not generally trained and aware of the
Like any computer network, connecting need for SCADA security. Most operators
SCADA software
the SCADA network to the Internet without do not have a full picture of the SCADA
Like any other software, the most common the proper safeguards is a recipe for security policy and roles. In some cases, any
vulnerabilities of SCADA software are disaster. A complete security policy should employee could walk into a SCADA control
interruption, interception, and modification. be implemented in this case. Properly room, without anyone stopping them.
Software may be deleted intentionally by configured firewalls and IDSs need to be
part of the connection policy. Telephone and modem dial-in
an attacker resulting in a potentially serious
access is another source of possible
malfunction. The most lethal attacks on
Other computing vulnerabilities SCADA vulnerability that need special
software are usually related to software
modification. In this attack, software is In addition to the vulnerabilities stated attention. Where available, access to
modified to either make it fail or perform above, other sources of security concern relays, controllers, IEDs, and RTUs should
unintended tasks. Bugs are also very serious exist. Unauthorised access to computing be password controlled. Remote
form of software vulnerability [15]. If they are equipment may deny a legitimate user or communications with these devises is very
not fixed in time, hobbyist hackers with very process access to required resources thus common, so secure communications is
little skills can take advantage of publicised resulting in the failure of the SCADA system very important. For example, encryption
vulnerabilities to attack and unpatched to perform what it is intended to. modems [2] are available for secure dial-
SCADA. up communications. Using phone numbers
Another source of vulnerability which is more
that you perceive are unknown to the public
Again, there are no unique ways to prevent widespread in SCADA systems is the screening
is not good enough, since there are ways
these software attacks in SCADA systems that of people who are allowed access to the
of getting unlisted phone numbers, e.g.
are not similar to what is currently being done SCADA controls. In most cases, there are
through wire tapping, “war-dialing”, or using
in computer systems. Because of the nature of limited consoles to the SCADA system, and
software widely available on the internet.
the systems being protected, stricter controls controllers take turns to use the controllers.
like configuration management systems to As a result, passwords are either written Security solutions unique to SCADA
control software access would reduce the somewhere or they are not that secret. A
risk software deletion, modification, and There are no new solutions that are unique to
disgruntled or former employee may cause
theft. It would also be advisable to use OSs SCADA systems per se. Most of the security
extensive damage to the system through
and software applications that pass at least solutions to potential vulnerabilities in SCADA
unauthorised access and execution of
NCSC C2 level rating. systems are already known to the Internet
restricted commands.
security world. Due to the nature of the assets
SCADA data integrity The other false sense of security with SCADA being protected, the computing resources
SCADA data has more value to an attacker vendors and clients alike is that they use used have to be able to withstand most of
than the software and hardware. Metering, proprietar y protocols and therefore do the known vulnerabilities. We will explore this
status, and control data can be used to the nothing about security since they believe through the basic elements of security.
detriment of the utility if not handled with nobody else knows the protocols well
Authentication
extreme caution. As in ordinary networks, enough to attack their SCADA. However, this
SCADA data may be stolen for use by is not necessarily so. Former employees of All employees with access to SCADA control
competitors or saboteurs. Data may also be the utility or SCADA vendor, SCADA experts terminals should be authorised to do so,
modified to perform tasks that are harmful to and consultants are very well conversant an their authorisation needs to be current.
the utility or its personnel. with these protocols and can pose a big Strong authentication should be used. Simple
threat to the SCADA system. Software tools password protection may not be sufficient.
Currently, only CRC error checking is performed
to analyse protocols can be downloaded
on SCADA data. To safeguard data integrity, At least a two-factor authentication system
form the Internet.
vital data needs to be encr ypted. The should be used. Access to IEDs should require
American Gas Association (AGA) has been Once again, these vulnerabilities are not the use of strong authentication or smart
researching on cryptographic protection of just unique to SCADA systems. However, one card access.

energize - December 2007 - Page 24


TRANSMISSION
Availability, integrity and confidentiality provides for login and Timeout, “settable” • Authentication provided to operators
user rights, “Select-Checkback” to field through SCADA PCs’ OS access control
The software and hardware should at
devices, multi-level tagging zones • N o d a t a e n c r y p t i o n – c l i e n t ’ s
least meet the NCSC class C2 rating.
or Responsibility, and two-factor VPN responsibility.
VPN protocols (PPTP, IPSec, L2TP) should
Authentication application and keys
be considered for communications on • Different levels of security provided for by
for secure communications to remote
substation RTUs and IEDs. Encryption should the LANs are also available to operators/
stations. engineers.
be used for all sensitive data transfer,
• Supports proprietary and open protocols–
including control requests. If an option to GE XA/21 [8]
both serial and over–TCP/IP interfaces.
use encryption is provided by the vendor, • Built-in proactive services performed by
it should be used. It is important that these • Not concerned about the data as it
application e.g. removing unwanted
cryptographic algorithms be incorporated travels between the master and the
files, learing unwanted users. Multilevel
RTUs or IEDs. This is up to the customer to
into the SCADA communications protocols authentication.
implement.
and operational standards. For example, • PC based, intranet and internet browser
the IEEE standard C37.1 recommends Siemens
access, ODBC onnectivity through third
the cryptographic algorithms to use with • PC-based SCADA application uses a party tools, online capability to update
SCADA systems. The same standard also central systemwide management for the database, add/delete/modify
addresses the implementation of security users. System also has encrypted storage terminal units and datalink objects, Data
features in both asynchronous serial SCADA of user information in a database format. sharing between sites.
communications as well as communications Maintains a log of all activities by the • Supports various industr y standard
over the internet. users and administrators; including login protocols. Determines the quality and
on/off, incorrect password entries and integrity of data based on preset limits,
The IEEE standard C37.1 also recommends
commands send out. No SCADA data normal/abnormal states, and other
that high value communications should
encryption. standards.
integrate an IDS. In some cases firewalls
and router ACLs can be used to verify that • Full web operation and monitoring using • Secure repository database for mission-
OPC XML for communication. critical data.
a SCADA signal destined for an RTU or IED is
intended for that system by checking firewall • Other components used by the Siemens • Supported on IBM AIX6000, SUN/Solaris
and ACL rules for the SCADA protocol being WinCC SCADA are: MS Windows Server, and Motorola/AIX.
used. For example, MODBUS/TCP uses port MS SQL server, MS VBA,MS OS(Win 2000, • To ensure data integrity, GE uses available
502, so, monitoring traffic logs using this port XP), VBScript, ActiveX components. technology, like SSL, proximity devices,
can easily reveal attempted break-ins on • Authentication provided for operators digital signatures of software, strict
the system. when they log on to the console. Password password policies, etc.
log is available. Different authentication Discussion of SCADA vendor survey
SCADA vendor survey on security
and privileges for user categories.
While vendors showed some general level
These surveys were carried out between • Supports both open and proprietary
of security awareness, a lot still needs to be
July and December 2004. The security protocols.
done. The security levels available in most of
awareness of all the vendors surveyed was ABB Spider (also includes Ranger, Cadops) these SCADA systems are those that come
very limited. The responses obtained from
the majority of the vendors listed below • Network Manager is the SCADA/ EMS/ with the computer systems that the SCADA
showed limited implementation of security DMS/ GMS solution for large electrical applications are installed on. Using the
features in SCADA on the vendor side. One and gas systems available on Unix/Linux metrics we established in Section III-A, we
plausible argument raised by one vendor and Windows platforms. discuss the SCADA vendor security awareness
is that industry (in this case the utilities) is • Network Manager allows integration into in the following:
not pushing to have these security features utility’s IT systems while maintaining the
SCADA hardware
included, or the possible extra costs that existing security levels.
may be incurred discourages them from • Supports both open and proprietary All the surveyed vendors use PC-based or
pursuing this further; since they always have protocols. workstation-based SCADA systems. Most
a limited, but functionally reliable backup • With ABB SCADA, clients are expected of them did not explicitly state the type of
system. The comments included in this to implement their own security policies computer hardware to use with their SCADA.
survey were obtained from the named for their SCADA systems. Third party We therefore assume that the SCADA is as
individual vendors though email, telephone firewall implementations are available vulnerable as the computer being used. It is
discussions, or both. Downloaded internet- to securely separate the office networks recommended that utilities specify the use
based data sheets were also used. from the SCADA networks. Encryption of workstations and servers that meet the
is also available through third party NCSC C2 rating as a minimum requirement.
Survalent LT (formerly Quindar [16])
applications. For example, California The hardware area found to be most lacking
• Available on Windows and OpenVMS ISO [10] implemented an ABB SCADA with all the vendors was the security of the
platforms. The Windows SCADA system security system that encr ypts data
communications link.
uses Dell PowerEdge servers and Windows between RTUs and SCADA masters. It
Server 2003 OS. The VMS SCADA system also uses a combination of firewalls, VPN Software
uses HP Alpha servers and OpenVMS and digital certificates to ensure secure
OS. No specifics were found on software
communication.
• Uses a System Manager software that applications security. However, the security
Telvent OASys
provides for operator authentication of the application software is as good as the
and different security zones for users • Supports both open and proprietary software itself and if the weaknesses (in the
and peripherals such as printers. Also protocols. application(s)) are not public knowledge.

energize - December 2007 - Page 25


TRANSMISSION
Once weaknesses are known, patches need SCADA security and presented a vendor Acknowledgement
to be applied fast before anyone exploits the sur vey on SCADA security. There were
This paper was presented at the recent
weakness e.g. the GE XA/21 bug. several revelations that we got from this
IEEE African 2007 Conference in Namibia
work. SCADA, as a vital public infrastructure,
In most cases, other EMS and protection in September 2007, and is republished with
needs a more robust security policy and
applications are running on the permission.
awareness than what we found to be the
same computer system. Under these
existing scenario. References
circumstances, care should be taken to
ensure that they don’t consume substantial To their credit, SCADA systems and the electric [1] AGA Report No. 12-1, “Cr yptographic
computer resources to effect a DoS on protection of SCADA communications,” Tech.
utility have very robust built-in safeguards as
Rep., 2003.
the SCADA system. Siemens also adds to specified in the IEEE standard C37.1.
its vulnerability by using many Microsoft [2] A Beyer, “Securing dialup communications
For example, the component limits of the with encryption modems,” Tech. Rep., 2003.
ActiveX components as well as the MS SQL
utility are usually coded into the SCADA [3] R Carlson, “Sandia SCADA program: High-
server which may be susceptible to attacks.
system. So, if an attacker inputs commands security SCADA LDRD final report,” Sandia
It would also be safer not to mention in National Laboratories, Tech. Rep., 2002.
that fall outside these ranges, then the
datasheets the type of database being
SCADA system is supposed to ignore them. [4] G Clarke and D Reynders, Practical Modern
used; this may give attackers good hints on
The same thing applies to the electricity grid. SCADA Protocols: DNP3, 60870.5 and Related
how to attack the system. Systems. Oxford: Elsevier, 2004.
If a command is issued to isolate a certain
Encrypted storage of data in databases section of the grid for no apparent reason, [5] M G Dondo and M E El-Hawary, “An
by Siemens is a good security step. On the approach to implement electricity metering
the grid will automatically restore itself after
in real-time using artificial neural networks,”
software side, the OS is the most critical; performing a self check.
IEEE Transactions on Power Delivery, vol. 18,
there are many exploits for different OSs. MS
In addition, SCADA systems are usually no. 2, pp. 383–386, April 2003.
Windows XP and MS windows servers do not
custom made for that particular utility, and [6] R Farrow, “Critical infrastructure security and
currently have an NCSC rating; neither do
no two utilities use the same configuration. you,” Network Magazine, 2002.
they have the Common Criteria Certification
Therefore to effect serious damage on [7] D G Fink and H W Beaty, Standard Handbook
rating yet. It is not advisable to use OSs that
the SCADA system, one has to be very for Electrical Engineers. New York, NY: McGraw-
are not NCSC C2 rated. Hill, 1978.
knowledgeable with the SCADA system as
OSs that have earned the C2 rating include well as the grid itself. This tends to limit the [8] GE Network Solutions, “XA/21,” General
versions of IBM’s OS/400 and Digital ’s Electric, 2002.
number of possible attackers, and may
OpenVMS. NT 3.5 (Workstation and Server) explain why the number of attacks on [9] B Gellman, “Cyber-attacks by al qaeda
with Service Pack 3 (SP3) earned the C2 rating feared:terrorists at threshold of using internet
SCADA have not been as widespread as in
in July 1995. Modern UNIX systems fulfil C2 as tool of bloodshed, experts say,” Washington
other computer networking environments.
Post, 2002.
requirements, and many OS vendors offer the This does not, however, mean that SCADA
C2 package. It is therefore recommended [10] Hathaway Industrial Automation, “California
systems are safe from attacks. All it means is
iso project,” Tech. Rep.,1999.
that the C2 package be used in all SCADA that, the types of attacks that are likely to be
systems using the Solaris, AIX, and Unix OSs. [11] Internet Security Systems, “Assessment and
experienced by the utility are most likely from
remediation of vulnerabilities in SCADA and
This is applicable to ABB and Siemens SCADA professional saboteurs, rather than hobbyist process control systems,” Internet Security
systems. hackers. Thus a robust and hardened security Systems, pp. 1–10, April 2003.
Data integrity policy needs to be put in place. [12] NERC, “Security guidelines for the electricity
sector,” North American Electric reliability
Except for CRC checks, there is very little In this work, we came to the conclusion
Council, Tech. Rep., 2002.
data protection on the vendor side. Almost that there are no unique ways needed
[13] North American Electric Reliability Council,
all vendors surveyed insists that this is the to protect SCADA systems. All currently
“SQL slammer worm lessons learned. for
responsibility of the client. GE’s XA/21 mentions known and available computer network
consideration by the electricity sector,” North
attempts to ensure data integrity through protection systems are equally applicable American Electric Reliability Council, 2003.
different means. ABB claims to use VPNs to SCADA systems, although some custom [14] K Poulsen, “Slammer worm crashed ohio
and encryption to ensure payload security. configurations may be needed. IEEE nuke plant net,” SecurityFocus, 2003.
These are good steps towards ensuring data standard C37.1 recommends some [15] SecurityFocus, “Software bug contributed
integrity, but overall more needs to be done important security aspects on SCADA systems to blackout,” SecurityFocus News, February
in order to standardise data integrity within which should be taken into consideration 2004.
SCADA protocols. when designing SCADA systems. [16] Survalent Technology, “Quindar products, ltd.
Asynchronous serial communications, unveils new identity, aggressive growth plans,”
Networks Survalent Technology, 2002.
which are common in SCADA systems can
All vendors surveyed are capable of internet be securely protected with retrofit security [17] G Yamini, “Iranian hacking attempt to electric
connectivity. This exposes the SCADA system features. Wise choice of SCADA software corporation foiled,” Online: Ha’aretz, 2003.
to unwanted attacks from the internet. and hardware also contributes to a robust [18] L Zocco, “SEL and electric power utilities
Once again, the connection and security and secure SCADA system. Software and working to safeguard the electric power grid,”
configuration of such networks were said to hardware should at least meet the NCSC in Power Systems World, 2002.

be the responsibility of the client. class C2 rating. Secure communications Contact Edward ChikuniPolytechnic University
and encryption should be considered for of Namibia, echikuni@polytechnic.edu.na
Summary and conclusions
vital data, and access to IEDs and RTUs or Maxwell Dondo, Defence R&D Ottawa,
We have looked at several aspects of should be restricted. maxwell.dondo@drdc-rddc.gc.ca v

energize - December 2007 - Page 26

You might also like