SlideShare a Scribd company logo
1 of 36
Maxwell Dondo PhD PEng SMIEEE
1
 Evolution of grid automation
 SCADA introduction
 SCADA Components
 Smart Grid
 SCADA Security
2
 Traditionally power delivery was
unsophisticated
◦ Generation localised around communities
◦ Simple consumption (e.g. lights)
◦ Simple communication with consumer
◦ Consumer billed monthly
 System relied on consumer phone calls for
fault notifications
 Ground crews dispatched to fix problems
 Time consuming process
3
 EPUs (Electric Power Utilities)
became more sophisticated to
meet energy demands
 Complex generation systems
 Longer interconnected
transmission lines
 Sophisticated substations
 Complex distribution systems
 Automation systems common
 Sophisticated communications
became necessary
4
 Generation (usually 25kV or less)
◦ Thermal
◦ Hydro
◦ Nuclear
◦ “Green” Sources
 Transmission Lines
◦ AC or DC
◦ Transmit power at high voltage over long distances
◦ High voltage, low current to reduce losses e.g.
735kV for James Bay transmission lines.
5
 Substations ordinarily contain
◦ Transformers step up/down voltages for
transmission or distribution e.g. Distribution
substation: 115kV/27.6kV
◦ Instrument transformers (CTs/VTs), meters
◦ Circuit breakers, switches, isolators, relays
 Substations are capable of local control and
monitoring
 Substation can be of different varieties (e.g.
simple switching station or very sophisticated
distribution substation)
6
 Grid evolved
◦ from manned substations to remotely
monitored and controlled system
◦ from electromechanical systems to dial-
up system
◦ from unsophisticated one-way
communication to two-way
communication
 Automation became a requirement
 Regulatory reporting requirement
 Automation became integrated with
preventative/predictive maintenance
 Need computers to process grid’s
operational and non operational data
 Achieved through automation called
SCADA
7
 A complex computer based system that uses
modern applications to analyse the electric
power grid system to acquire data, monitor
and control facilities and processes.
 SCADA applications can support dispatchers,
operators, engineers, managers, etc. with
tools to predict, control, visualize, optimise,
and automate the EPU.
8
 Originally EPUs used electro-mechanical automation
 Dial-up modems used for remote access
 In 1970s computer-based SCADA commenced
 Suppliers (e.g. IBM, Siemens, GE) supplied complete
proprietary systems
 More advanced with client-server computers
 Advanced functions became common (e.g. EMS.
DMS, load forecasting, dispatch, protection
engineering, regulatory reporting, etc)
 Communication link evolved from noisy narrow
bandwidth telephone lines to SONET, Microwave,
radio, power line carrier, cellular networks
9
 SCADA Master Terminal Unit (MTU): The
server that acts as SCADA system
 RTU (remote terminal unit) : remote
telemetry data acquisition units located at
remote stations
 IED (intelligent electronic devices) smart
sensors/actuators with intelligence to
acquire data, process it, and communicate
 HMI (human-machine interface) : software
to provide for visualisation and interaction
with SCADA
10
 Can be broken down into 3 categories
 NIST representation of SCADA system
◦ Control Center
◦ Programmable Logic Controllers(PLCs), Remote
Terminal Units (RTUs), IEDs
◦ Communications Network
◦ SCADA host software
11
 Provides for real-time grid management
 SCADA Server
◦ Also known as the MTU (master terminal unit)
 HMI for visualisation and human interaction
 Programming/Engineering workstations
 Data historian, a database storage for operational
activities
 Control server, hosts software to communicate
with lower level control devices
 Communication routers
 Could be connected to other regional control
centers (desired for large networks)
12
 Phone line/leased line, power line carrier
 Radio
 Cellular network
 Satellite
 Fibre optic
13
 Star
 Ring
 Mesh
 Tree
 Bus
14
 Many possible topologies
 Direct connection
 Connection with slave
 Other. See IEEE C37.1
15
 Allow communications between devices
 MODBUS: master-slave application-layer protocol
◦ Attackers with IP access can run Modbus client simulator to
effect many types of attacks.
 DNP3 : Distributed Network Protocol is a set of open
communication protocols
◦ IEEE recommended for RTU to IED messages
◦ Has no in-built security: Messages can be intercepted,
modified and fabricated.
 IEC 60870 suite:
◦ Substation control centre communication (IEC 60870-5-
101/104)
◦ Communication with protection equipment (IEC 60870-5-103)
◦ IEC 62351 intends to implement security (end-to-end
encryption; vendors reluctant to implement due to complexity)
 Other proprietary protocols
16
 Acquire telemetry, relay data from system
 Covert it to digital signals if necessary
 Send data to MTU or engineering stations
 Receive control, settings, resets from MTU
17
Field component
Telemetry
Meters
Relays, etc
SCADA MTU
Control,
Settings
Device Ports
 Reads status and alarms through relay and
control circuit auxiliary contacts. Meter reading.
 Manual/remote control e.g. activate alarm. RTU
control outputs connected to control relays
 No data storage
 Some PLCs equipped to be RTUs
 May aggregate IED data
 Either open standard or proprietary based
◦ Modbus, DNP3, IEC 60870-5-101/104
 Serial communication
◦ RS232, RS485
18
 Similar to RTU, is open or proprietary based
 Acquires data from electrical devices, e.g.
relay or circuit breaker status, switch position.
 Reads meter data such as V, A, MW, MVAR.
Some modern meters have IED capabilities,
they can communicate their readings with RTU
or MTU.
 Control functions include:
◦ CB control, voltage regulators, recloser control.
 Newer substations only use modern IEDs
 IEDs can support horizontal communication
19
20
21
22
23
 Concept of a fully automated power
distribution system that can monitor and
control all aspects of the system
 Ideally a smart grid provides voltage/power
flow optimisation and self healing (after
disruption)
 SCADA, WAMS, AMI provide and enable the
“brains” of the smart grid concept
 SCADA makes real-time automated decisions
to regulate voltages, optimal power flows,
etc.
24
 Supports sophisticated two-
way communication
 Allows efficient power dispatch
 Easy to integrate with other
sources e.g. green energy
 Supports smart metering
 Can coordinate with home area
networks (HANs) for efficient
consumption
 Supports efficient self-healing
after faults
25
 Traditionally isolated networks
 No security measures deemed necessary;
security by obscurity
 Only threats were insiders and physical
sabotage
 Modem war-dialing was also possible threat
 With interconnected EPU, SCADA is connected
over wide area networks and internet
 That has exposed SCADA to attacks
26
 Increased automation
widens SCADA network’s
attack surface
27
 Espionage
◦ Spies (industrial and state actors)
◦ Terrorists
 Script kiddies
 Insiders, e.g. disgruntled employees
 Criminal elements (blackmail)
 Business competitors
 Hacktivists (ideological activists)
28
 Vulnerabilities are weaknesses in the cyber
system that threats (actors) exploit to carry
out attacks
 Examples of forms vulnerabilities:
◦ Technical
 Hardware
 Software and protocol
 Network
◦ Policy
29
 CVE-2015-1179: Allows remote attackers to inject
arbitrary web script; found in Mango Automation
systems
 CVE-2015-0981: Allows remote attackers to bypass
authentication and read/write to arbitrary database
fields via unspecified vectors.
 CVE-2015-0096 (MS15-018) : Stuxnet, a worm
targeting ICSs such as SCADA.
 Other examples from 2014: CVE-2014-8652 , CVE-2014-
5429
 GE Energy's XA/21: 2003 flaw responsible for alarm
system failure at FirstEnergy's Akron, Ohio control
center
30
 Stuxnet: Intercepts and makes changes to
data read from and written to a PLC
 Night Dragon : Suspected SCADA data
exfiltration from Exxon, Shell and BP
 Others: Havex (Trojan targeting ICSs and
SCADA), Blacken (Targets users of SCADA
software Simplicity)
 Many others targeting the PCs used in
SCADA.
31
 Define SCADA security networking policy
◦ Access control
◦ Identify all SCADA assets and their connectivity
◦ Schedule regular vulnerability assessments
 User training and awareness (e.g. what to do
when you pick up a USB stick in parking lot)
 Technical
◦ Isolate SCADA from internet as much as possible
◦ Encryption of data
◦ Implement strict firewall rules between SCADA network
and all other networks.
◦ Perform anomaly detection
32
◦ Put in place effective policies
◦ Limit access to SCADA network; implement tight
security access controls
◦ Use hardened hardware
◦ Patch regularly, don’t use unpatched software or
vulnerable systems
◦ Implement vendor security features (No defaults)
◦ Audit (include red teaming) SCADA IT systems for
security holes
33
 SCADA systems enhance power delivery by
providing grid situational awareness and
control
 Delivers operational and non-operational
data through a variety of communication
methods
 SCADA is an important part of the Smart Grid
 SCADA system is traditionally insecure,
security measures needed
34
 IEEE Standard for SCADA and Automation
Systems C37.1, 2007
 IEC 61850 Communication networks and
systems in substations
 Guide to Supervisory Control and Data
Acquisition (SCADA) and Industrial Control
Systems Security, NIST, 2007
 G. Clarke, and D. Reynders, Practical Modern
SCADA Protocols, Elsevier 2004
35
36

More Related Content

Similar to SCADAPresentation.pptx information about scada

Semester syllabus
Semester syllabusSemester syllabus
Semester syllabusbramesh316
 
Distributed Control System
Distributed Control SystemDistributed Control System
Distributed Control System3abooodi
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
Scada systems basics winnie mbau
Scada systems basics winnie mbauScada systems basics winnie mbau
Scada systems basics winnie mbauwinnie15
 
Introduction to scada systems & power control centres
Introduction to scada systems & power control centresIntroduction to scada systems & power control centres
Introduction to scada systems & power control centresHelder Joaquim Ale Psico
 
Power system automation introduction
Power system automation introductionPower system automation introduction
Power system automation introductionMohammed Naser
 
CONCEPT OF SCADA System EMERSON EDUARDO RODRIGUES
CONCEPT OF SCADA System  EMERSON EDUARDO RODRIGUESCONCEPT OF SCADA System  EMERSON EDUARDO RODRIGUES
CONCEPT OF SCADA System EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
SCADA only for the advance version of the module
SCADA only for the advance version of the moduleSCADA only for the advance version of the module
SCADA only for the advance version of the moduleAJITTHAKUR68
 
Introduction to SCADA
Introduction to SCADAIntroduction to SCADA
Introduction to SCADAPraveen Kumar
 
Ls catalog thiet bi tu dong master rtu e_dienhathe.vn
Ls catalog thiet bi tu dong master rtu e_dienhathe.vnLs catalog thiet bi tu dong master rtu e_dienhathe.vn
Ls catalog thiet bi tu dong master rtu e_dienhathe.vnDien Ha The
 
Link vue system pvt ltd product catalouge 2021 -
Link vue system pvt ltd  product catalouge 2021 -Link vue system pvt ltd  product catalouge 2021 -
Link vue system pvt ltd product catalouge 2021 -Mahesh Chandra Manav
 
Wireless Communciation and Automation
Wireless Communciation and  AutomationWireless Communciation and  Automation
Wireless Communciation and Automationirfanhyd
 
Power system automation
Power system automationPower system automation
Power system automationAbbas Ali
 

Similar to SCADAPresentation.pptx information about scada (20)

Semester syllabus
Semester syllabusSemester syllabus
Semester syllabus
 
Distributed Control System
Distributed Control SystemDistributed Control System
Distributed Control System
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Scada systems basics winnie mbau
Scada systems basics winnie mbauScada systems basics winnie mbau
Scada systems basics winnie mbau
 
Introduction to scada systems & power control centres
Introduction to scada systems & power control centresIntroduction to scada systems & power control centres
Introduction to scada systems & power control centres
 
Power system automation introduction
Power system automation introductionPower system automation introduction
Power system automation introduction
 
Dcs vs scada
Dcs vs scadaDcs vs scada
Dcs vs scada
 
SCADA PPT.pdf
SCADA PPT.pdfSCADA PPT.pdf
SCADA PPT.pdf
 
CONCEPT OF SCADA.pdf
CONCEPT OF SCADA.pdfCONCEPT OF SCADA.pdf
CONCEPT OF SCADA.pdf
 
CONCEPT OF SCADA System EMERSON EDUARDO RODRIGUES
CONCEPT OF SCADA System  EMERSON EDUARDO RODRIGUESCONCEPT OF SCADA System  EMERSON EDUARDO RODRIGUES
CONCEPT OF SCADA System EMERSON EDUARDO RODRIGUES
 
SCADA only for the advance version of the module
SCADA only for the advance version of the moduleSCADA only for the advance version of the module
SCADA only for the advance version of the module
 
Introduction to SCADA
Introduction to SCADAIntroduction to SCADA
Introduction to SCADA
 
Ls catalog thiet bi tu dong master rtu e_dienhathe.vn
Ls catalog thiet bi tu dong master rtu e_dienhathe.vnLs catalog thiet bi tu dong master rtu e_dienhathe.vn
Ls catalog thiet bi tu dong master rtu e_dienhathe.vn
 
8 scada
8 scada8 scada
8 scada
 
Link vue system pvt ltd product catalouge 2021 -
Link vue system pvt ltd  product catalouge 2021 -Link vue system pvt ltd  product catalouge 2021 -
Link vue system pvt ltd product catalouge 2021 -
 
Wireless Communciation and Automation
Wireless Communciation and  AutomationWireless Communciation and  Automation
Wireless Communciation and Automation
 
Scada primer
Scada primerScada primer
Scada primer
 
Scada primer
Scada primerScada primer
Scada primer
 
Introduction-II.pptx
Introduction-II.pptxIntroduction-II.pptx
Introduction-II.pptx
 
Power system automation
Power system automationPower system automation
Power system automation
 

Recently uploaded

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 

Recently uploaded (20)

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

SCADAPresentation.pptx information about scada

  • 1. Maxwell Dondo PhD PEng SMIEEE 1
  • 2.  Evolution of grid automation  SCADA introduction  SCADA Components  Smart Grid  SCADA Security 2
  • 3.  Traditionally power delivery was unsophisticated ◦ Generation localised around communities ◦ Simple consumption (e.g. lights) ◦ Simple communication with consumer ◦ Consumer billed monthly  System relied on consumer phone calls for fault notifications  Ground crews dispatched to fix problems  Time consuming process 3
  • 4.  EPUs (Electric Power Utilities) became more sophisticated to meet energy demands  Complex generation systems  Longer interconnected transmission lines  Sophisticated substations  Complex distribution systems  Automation systems common  Sophisticated communications became necessary 4
  • 5.  Generation (usually 25kV or less) ◦ Thermal ◦ Hydro ◦ Nuclear ◦ “Green” Sources  Transmission Lines ◦ AC or DC ◦ Transmit power at high voltage over long distances ◦ High voltage, low current to reduce losses e.g. 735kV for James Bay transmission lines. 5
  • 6.  Substations ordinarily contain ◦ Transformers step up/down voltages for transmission or distribution e.g. Distribution substation: 115kV/27.6kV ◦ Instrument transformers (CTs/VTs), meters ◦ Circuit breakers, switches, isolators, relays  Substations are capable of local control and monitoring  Substation can be of different varieties (e.g. simple switching station or very sophisticated distribution substation) 6
  • 7.  Grid evolved ◦ from manned substations to remotely monitored and controlled system ◦ from electromechanical systems to dial- up system ◦ from unsophisticated one-way communication to two-way communication  Automation became a requirement  Regulatory reporting requirement  Automation became integrated with preventative/predictive maintenance  Need computers to process grid’s operational and non operational data  Achieved through automation called SCADA 7
  • 8.  A complex computer based system that uses modern applications to analyse the electric power grid system to acquire data, monitor and control facilities and processes.  SCADA applications can support dispatchers, operators, engineers, managers, etc. with tools to predict, control, visualize, optimise, and automate the EPU. 8
  • 9.  Originally EPUs used electro-mechanical automation  Dial-up modems used for remote access  In 1970s computer-based SCADA commenced  Suppliers (e.g. IBM, Siemens, GE) supplied complete proprietary systems  More advanced with client-server computers  Advanced functions became common (e.g. EMS. DMS, load forecasting, dispatch, protection engineering, regulatory reporting, etc)  Communication link evolved from noisy narrow bandwidth telephone lines to SONET, Microwave, radio, power line carrier, cellular networks 9
  • 10.  SCADA Master Terminal Unit (MTU): The server that acts as SCADA system  RTU (remote terminal unit) : remote telemetry data acquisition units located at remote stations  IED (intelligent electronic devices) smart sensors/actuators with intelligence to acquire data, process it, and communicate  HMI (human-machine interface) : software to provide for visualisation and interaction with SCADA 10
  • 11.  Can be broken down into 3 categories  NIST representation of SCADA system ◦ Control Center ◦ Programmable Logic Controllers(PLCs), Remote Terminal Units (RTUs), IEDs ◦ Communications Network ◦ SCADA host software 11
  • 12.  Provides for real-time grid management  SCADA Server ◦ Also known as the MTU (master terminal unit)  HMI for visualisation and human interaction  Programming/Engineering workstations  Data historian, a database storage for operational activities  Control server, hosts software to communicate with lower level control devices  Communication routers  Could be connected to other regional control centers (desired for large networks) 12
  • 13.  Phone line/leased line, power line carrier  Radio  Cellular network  Satellite  Fibre optic 13
  • 14.  Star  Ring  Mesh  Tree  Bus 14
  • 15.  Many possible topologies  Direct connection  Connection with slave  Other. See IEEE C37.1 15
  • 16.  Allow communications between devices  MODBUS: master-slave application-layer protocol ◦ Attackers with IP access can run Modbus client simulator to effect many types of attacks.  DNP3 : Distributed Network Protocol is a set of open communication protocols ◦ IEEE recommended for RTU to IED messages ◦ Has no in-built security: Messages can be intercepted, modified and fabricated.  IEC 60870 suite: ◦ Substation control centre communication (IEC 60870-5- 101/104) ◦ Communication with protection equipment (IEC 60870-5-103) ◦ IEC 62351 intends to implement security (end-to-end encryption; vendors reluctant to implement due to complexity)  Other proprietary protocols 16
  • 17.  Acquire telemetry, relay data from system  Covert it to digital signals if necessary  Send data to MTU or engineering stations  Receive control, settings, resets from MTU 17 Field component Telemetry Meters Relays, etc SCADA MTU Control, Settings Device Ports
  • 18.  Reads status and alarms through relay and control circuit auxiliary contacts. Meter reading.  Manual/remote control e.g. activate alarm. RTU control outputs connected to control relays  No data storage  Some PLCs equipped to be RTUs  May aggregate IED data  Either open standard or proprietary based ◦ Modbus, DNP3, IEC 60870-5-101/104  Serial communication ◦ RS232, RS485 18
  • 19.  Similar to RTU, is open or proprietary based  Acquires data from electrical devices, e.g. relay or circuit breaker status, switch position.  Reads meter data such as V, A, MW, MVAR. Some modern meters have IED capabilities, they can communicate their readings with RTU or MTU.  Control functions include: ◦ CB control, voltage regulators, recloser control.  Newer substations only use modern IEDs  IEDs can support horizontal communication 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23
  • 24.  Concept of a fully automated power distribution system that can monitor and control all aspects of the system  Ideally a smart grid provides voltage/power flow optimisation and self healing (after disruption)  SCADA, WAMS, AMI provide and enable the “brains” of the smart grid concept  SCADA makes real-time automated decisions to regulate voltages, optimal power flows, etc. 24
  • 25.  Supports sophisticated two- way communication  Allows efficient power dispatch  Easy to integrate with other sources e.g. green energy  Supports smart metering  Can coordinate with home area networks (HANs) for efficient consumption  Supports efficient self-healing after faults 25
  • 26.  Traditionally isolated networks  No security measures deemed necessary; security by obscurity  Only threats were insiders and physical sabotage  Modem war-dialing was also possible threat  With interconnected EPU, SCADA is connected over wide area networks and internet  That has exposed SCADA to attacks 26
  • 27.  Increased automation widens SCADA network’s attack surface 27
  • 28.  Espionage ◦ Spies (industrial and state actors) ◦ Terrorists  Script kiddies  Insiders, e.g. disgruntled employees  Criminal elements (blackmail)  Business competitors  Hacktivists (ideological activists) 28
  • 29.  Vulnerabilities are weaknesses in the cyber system that threats (actors) exploit to carry out attacks  Examples of forms vulnerabilities: ◦ Technical  Hardware  Software and protocol  Network ◦ Policy 29
  • 30.  CVE-2015-1179: Allows remote attackers to inject arbitrary web script; found in Mango Automation systems  CVE-2015-0981: Allows remote attackers to bypass authentication and read/write to arbitrary database fields via unspecified vectors.  CVE-2015-0096 (MS15-018) : Stuxnet, a worm targeting ICSs such as SCADA.  Other examples from 2014: CVE-2014-8652 , CVE-2014- 5429  GE Energy's XA/21: 2003 flaw responsible for alarm system failure at FirstEnergy's Akron, Ohio control center 30
  • 31.  Stuxnet: Intercepts and makes changes to data read from and written to a PLC  Night Dragon : Suspected SCADA data exfiltration from Exxon, Shell and BP  Others: Havex (Trojan targeting ICSs and SCADA), Blacken (Targets users of SCADA software Simplicity)  Many others targeting the PCs used in SCADA. 31
  • 32.  Define SCADA security networking policy ◦ Access control ◦ Identify all SCADA assets and their connectivity ◦ Schedule regular vulnerability assessments  User training and awareness (e.g. what to do when you pick up a USB stick in parking lot)  Technical ◦ Isolate SCADA from internet as much as possible ◦ Encryption of data ◦ Implement strict firewall rules between SCADA network and all other networks. ◦ Perform anomaly detection 32
  • 33. ◦ Put in place effective policies ◦ Limit access to SCADA network; implement tight security access controls ◦ Use hardened hardware ◦ Patch regularly, don’t use unpatched software or vulnerable systems ◦ Implement vendor security features (No defaults) ◦ Audit (include red teaming) SCADA IT systems for security holes 33
  • 34.  SCADA systems enhance power delivery by providing grid situational awareness and control  Delivers operational and non-operational data through a variety of communication methods  SCADA is an important part of the Smart Grid  SCADA system is traditionally insecure, security measures needed 34
  • 35.  IEEE Standard for SCADA and Automation Systems C37.1, 2007  IEC 61850 Communication networks and systems in substations  Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, NIST, 2007  G. Clarke, and D. Reynders, Practical Modern SCADA Protocols, Elsevier 2004 35
  • 36. 36

Editor's Notes

  1. Images: http://www.electricenergyonline.com/show_article.php?mag=&article=321
  2. Source: http://www.thecanadianencyclopedia.ca/en/article/electric-power-transmission/
  3. http://www.wue.coop/aboutwue
  4. Control Centre: http://www.techinteriors.com/market_process.php
  5. Image bottom: https://www.gedigitalenergy.com/products/ -control center collects operational data from substations, provides operator visualisations for real-time status of network.
  6. http://www.electricenergyonline.com/show_article.php?mag=&article=321
  7. IEDs and RTU are connected using serial RS232 to the substation communication bus.
  8. Time overcurrent relays: https://www.gedigitalenergy.com/
  9. https://www.gedigitalenergy.com/
  10. https://www.gedigitalenergy.com/
  11. Wind turbine image: http://enthone.com/Industries/Heavy_Equip_Energy/Solar_and_Wind_Turbines/Wind_Turbines.aspx Solar panel image: http://www.processindustryforum.com/hottopics/advantages-and-disadvantages-of-solar-energy
  12. Mango Automation is a flexible software application that allows you to view, log, graph, animate, alarm, and report on data from sensors, equipment, PLCs, databases, webpages, etc GE Energy's XA/21: http://www.nipc.gov/dailyreports/2003/August/DHS_IAIP_Daily_2003-08-18.pdf The flaw was responsible for the alarm system failure at FirstEnergy's Akron, Ohio control center