Cybersecurity considerations for electrical distribution systems
Securing the Network Management Module – 203
•
•
•
•
5 Securing the Network Management Module
5.1 Cybersecurity considerations for electrical distribution systems
5.1.1 Purpose
The purpose of this section is to provide high-level guidance to help customers across industries and applications apply Eaton
solutions for power management of electrical systems in accordance with current cybersecurity standards.
This document is intended to provide an overview of key security features and practices to consider in order to meet industry
recommended standards and best practices.
5.1.2 Introduction
Every day, cyber-attacks against government and commercial computer networks number in the millions. According to U.S. Cyber
Command, Pentagon systems are probed 250,000 times per hour. Similar attacks are becoming more prevalent on other kinds of
information-based smart networks as well, such as those that operate buildings and utility systems. Whether the objective is to
steal intellectual property or halt operations, the tools and the techniques used for unauthorized network access are increasingly
sophisticated.
5.1.3 Connectivity—why do we need to address cybersecurity for
industrial control systems (ICS)?
There is increasing concern regarding cybersecurity across industries where companies are steadily integrating field devices into
enterprise-wide information systems. This occurs in discrete manufacturing and process industrial environments, a wide range of
general and specific purpose commercial buildings, and even utility networks. Traditionally, electrical systems were controlled
through serial devices connected to computers via dedicated transceivers with proprietary protocols. In contrast, today’s control
systems are increasingly connected to larger enterprise networks, which can expose these systems to similar vulnerabilities that
are typically found in computer systems. The differences between information technology (IT) and ICS networks can be
summarized as follows:
The main focus of the IT network is to ensure the confidentiality and the integrity of the data using rigorous access control
and data encryption
The main focus of the ICS network is safety, availability, and integrity of data
Enterprise security protects the servers’ data from attack
Control system security protects the facility’s ability to safely and securely operate, regardless of what may befall the rest of
the network
5.1.4 Cybersecurity threat vectors
Cybersecurity threat vectors are paths or tools that an entity can use to gain access to a device or a control network in order to
deliver a malicious attack. Figure below shows examples of attack vectors on a network that might otherwise seem secure.
Содержание Network-M3
Страница 1: ...UPS Network Management Card Network M3 User s Guide English 10 27 2023...
Страница 2: ......
Страница 10: ...Table of Contents 10 Applicable product Eaton UPS ATS...
Страница 32: ...Home Contextual help of the web interface 32 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode...
Страница 34: ...Home Contextual help of the web interface 34 3 2 7 2 3 Battery mode 3 2 7 2 4 Off mode...
Страница 36: ...Home Contextual help of the web interface 36 3 2 7 3 2 Bypass mode 3 2 7 3 3 Battery mode...
Страница 37: ...Home Contextual help of the web interface 37 3 2 7 3 4 HE mode ESS mode 3 2 7 3 5 Maintenance bypass mode...
Страница 63: ...Protection Contextual help of the web interface 63 Example 2 Immediate OFF...
Страница 64: ...Protection Contextual help of the web interface 64 Example 4 Custom Settings 1...
Страница 120: ...Settings Contextual help of the web interface 120 3 7 6 3 SSH 3 7 6 4 SNMP 3 7 6 5 MQTT...
Страница 287: ...Acronyms and abbreviations Information 287...
Страница 294: ......