Cybersecurity considerations for electrical distribution systems
Securing the Network Management Module – 204
•
•
•
•
•
•
•
•
•
•
5.1.4.1 Paths to the control network
The paths in above figure include:
External users accessing the network through the Internet
Misconfigured firewalls
Unsecure wireless routers and wired modems
Infected laptops located elsewhere that can access the network behind the firewall
Infected USB keys and PLC logic programs
Unsecure RS-232 serial links
The most common malicious attacks come in the following forms:
Virus—a software program that spreads from one device to another, affecting operation
Trojan horse—a malicious device program that hides inside other programs and provides access to that device
Worm—a device program that spreads without user interaction and affects the stability and performance of the ICS network
Spyware—a device program that changes the configuration of a device
5.1.5 Defense in depth
While there are differences between traditional IT systems and ICS, the fundamental concept of “defense in depth” is applicable to
both. Defense in depth is a strategy of integrating technology, people, and operations capabilities to establish variable barriers
across multiple layers of an organization. These barriers include electronic countermeasures such as firewalls, intrusion detection
software/components, and antivirus software, coupled with physical protection policies and training. Fundamentally, the barriers are
intended to reduce the probability of attacks on the network and provide mechanisms to detect “intruders.”
Содержание Network-M3
Страница 1: ...UPS Network Management Card Network M3 User s Guide English 10 27 2023...
Страница 2: ......
Страница 10: ...Table of Contents 10 Applicable product Eaton UPS ATS...
Страница 32: ...Home Contextual help of the web interface 32 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode...
Страница 34: ...Home Contextual help of the web interface 34 3 2 7 2 3 Battery mode 3 2 7 2 4 Off mode...
Страница 36: ...Home Contextual help of the web interface 36 3 2 7 3 2 Bypass mode 3 2 7 3 3 Battery mode...
Страница 37: ...Home Contextual help of the web interface 37 3 2 7 3 4 HE mode ESS mode 3 2 7 3 5 Maintenance bypass mode...
Страница 63: ...Protection Contextual help of the web interface 63 Example 2 Immediate OFF...
Страница 64: ...Protection Contextual help of the web interface 64 Example 4 Custom Settings 1...
Страница 120: ...Settings Contextual help of the web interface 120 3 7 6 3 SSH 3 7 6 4 SNMP 3 7 6 5 MQTT...
Страница 287: ...Acronyms and abbreviations Information 287...
Страница 294: ......