Cybersecurity based on IEC 62351 and IEC 62443 for IEC 61850 systems
Cybersecurity based on IEC 62351 and IEC 62443 for IEC 61850 systems
- Author(s): D. Dolezilek ; D. Gammel ; W. Fernandes
- DOI: 10.1049/cp.2020.0016
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
15th International Conference on Developments in Power System Protection (DPSP 2020) — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): D. Dolezilek ; D. Gammel ; W. Fernandes Source: 15th International Conference on Developments in Power System Protection (DPSP 2020), 2020 page ()
- Conference: 15th International Conference on Developments in Power System Protection (DPSP 2020)
- DOI: 10.1049/cp.2020.0016
- ISBN: 978-1-83953-277-1
- Location: Liverpool, UK
- Conference date: 9-12 March 2020
- Format: PDF
The word “cyber,” originating from the Greek word meaning “skilled steering or guidance,” has taken on the modern meaning of using digital communications within and among intelligent devices to perform information gathering and commanded control. Information technology (IT) systems include networked communications among computers, business systems, and the internet. Operational technology (OT) systems include networked communications among industrial control system (ICS) devices performing automatic safety, operational, and monitoring processes. In this paper, established ICS methods and standards are used to design defense-in-depth cybersecurity methods for digital communications within an energy control system (ECS) communications network. The ECS communications architecture is a mission-critical ICS and is divided into multiple levels with unique requirements and features from the process up through the station and finally to the control center. Using these levels, it is possible to identify interacting cyber defense technologies, the levels at which they should be deployed, and which devices they belong to (IEC 62443 Part 3) instead of the arbitrary defense-in-breadth strategy of requesting that every device include every cyber defense technology (IEC 62443 Part 4).
Inspec keywords: industrial control; IEC standards; Internet; computer network security; information technology
Subjects: Data security; Other computer networks; Computer communications
Related content
content/conferences/10.1049/cp.2020.0016
pub_keyword,iet_inspecKeyword,pub_concept
6
6