GarrettCom Ethernet Networks and Web Management Manual De Usuario

Descargar
Página de 12
 1
INTRODUCTION 
 
This paper explores the state of network security options today at the Ethernet switch level and offers 
an elementary roadmap for industrial operations to plan for and deploy secure communications 
systems. Industrial systems need to take advantage of the advanced networking technologies that can 
support greater efficiency, reliability, and security in plant and remote operations.  As SCADA 
systems, relays, and other industrial control, monitoring and management systems become more 
intelligent, a rich supply of data is available for improving plant performance and remote maintenance 
and management. However, as with all technology advances, there are challenges as well as 
opportunities. 
 
SECURITY OVERVIEW 
In today’s uncertain world, security stands beside profitability, productivity, performance and control 
as a key element for maintaining business activities in industrial facilities. Prevention of malicious 
attacks against business infrastructure has become as vital to ongoing success as has the widespread 
use of the computer systems which make such attacks so easy and so painful. It is no longer enough to 
catch the perpetrator during or after the commission of a malicious act; considerable time and expense 
is being consumed to address how to secure systems to prevent intrusion.  
 
Repercussions from the 2003 power blackout in the Northeastern US were felt throughout the country.  
Attacks such as the Zobot worm and Mytob bot software effectively shut down well protected 
computers at CNN, the New York Times and many other places. Imagine how much worse a 
concentrated and widespread act of industrial sabotage might be. 
 
Until just recently, SCADA (Supervisory Control And Data Acquisition) environments were not 
considered at risk for cyber attack because of the highly customized nature of these systems. In March 
2002, articles were still being written that debunked the concern for more security of utility service 
providers. Yet this viewpoint is compromised by documented cyber-related incidents, such as the 
Slammer Worm infiltration of an Ohio Nuclear power plant, and the wireless attack on a sewage-
SCADA system in Queensland Australia.