Cybersecurity considerations for electrical distribution systems
Securing the Network Management Module – 190
•
•
•
•
•
•
•
•
•
•
5.1.4.1 Paths to the control network
The paths in above figure include:
External users accessing the network through the Internet
Misconfigured firewalls
Unsecure wireless routers and wired modems
Infected laptops located elsewhere that can access the network behind the firewall
Infected USB keys and PLC logic programs
Unsecure RS-232 serial links
The most common malicious attacks come in the following forms:
Virus—a software program that spreads from one device to another, affecting operation
Trojan horse—a malicious device program that hides inside other programs and provides access to that device
Worm—a device program that spreads without user interaction and affects the stability and performance of the ICS network
Spyware—a device program that changes the configuration of a device
5.1.5 Defense in depth
While there are differences between traditional IT systems and ICS, the fundamental concept of “defense in depth” is applicable to
both. Defense in depth is a strategy of integrating technology, people, and operations capabilities to establish variable barriers
across multiple layers of an organization. These barriers include electronic countermeasures such as firewalls, intrusion detection
software/components, and antivirus software, coupled with physical protection policies and training. Fundamentally, the barriers are
intended to reduce the probability of attacks on the network and provide mechanisms to detect “intruders.”
Содержание Network-M2
Страница 1: ...UPS Network Management Card Network M2 User s Guide English 10 15 2020 2 0 5 ...
Страница 2: ......
Страница 24: ...Configuring Modbus Installing the Network Management Module 24 ...
Страница 25: ...Configuring Modbus Installing the Network Management Module 25 ...
Страница 26: ...Configuring Modbus Installing the Network Management Module 26 ...
Страница 38: ...Home Contextual help of the web interface 38 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode ...
Страница 40: ...Home Contextual help of the web interface 40 3 2 7 2 3 Battery mode 3 2 7 2 4 Off mode ...
Страница 42: ...Home Contextual help of the web interface 42 3 2 7 3 2 Bypass mode 3 2 7 3 3 Battery mode ...
Страница 43: ...Home Contextual help of the web interface 43 3 2 7 3 4 HE mode ESS mode 3 2 7 3 5 Maintenance bypass mode ...
Страница 64: ...Protection Contextual help of the web interface 64 Example 2 Immediate OFF Example 4 Custom ...
Страница 65: ...Protection Contextual help of the web interface 65 Settings 1 ...
Страница 261: ...Acronyms and abbreviations Information 261 ...
Страница 268: ......