Professional Documents
Culture Documents
Agenda
Evolution
of Communication System
SCADA Overview
Power System Protocols
Is the Cyber threat real?
Recommendations for SCADA
security R&D
PSTI\SDP\AD
PSTI\SDP\AD
PSTI\SDP\AD
Current SCADA
Closed systems, limited coordination, unprotected cyberinfrastructure
Local, limited adaptation (parametric), manual control
Static, centralized structure
Future requirements
Decentralized, secure open systems (peer-to-peer, mutable
hierarchies of operation)
Direct support for coordinated control, authority restriction
Trusted, automated reconfiguration
Isolate drop-outs, limit cascading failure, manage regions
under attack
Enable re-entry upon recovery to normal operation
Coordinate degraded, recovery modes
Diagnosis, mitigation of combined physical, cyber attack
Advanced SCADA for productivity, market stability,
manageability
PSTI\SDP\AD
Generative Programming
Intelligent Microsystems: infrastructure of the future with
security co-design with hardware and software.
PSTI\SDP\AD
Link
Layer
Layer
PSTI\SDP\AD
PSTI\SDP\AD
PSTI\SDP\AD
PSTI\SDP\AD
Source : http://standeyo.com/News_Files/NBC/Terrorist_cells.html
Terrorist Cells
in the US
Updated September 3, 2003
PSTI\SDP\AD
PSTI\SDP\AD
Cyber Trends
Unauthorized modems
Disgruntled employee
You hired a terrorist
Unauthorized access
In-sufficient attention to security (leave the door open)
PSTI\SDP\AD
Thank You
By
SANJAY D. PATIL
Assistant Director
NPTI
PSTI\SDP\AD