Cyber Security in
Power Utility Automation Systems

 

Protecting the power grid against cyber attacks requires a security strategy that takes hold on all levels. Such a security concept ranges from digital access management, physical access control and secure maintenance processes in substations to monitoring and detection of suspicious or unauthorized activity in the network. The requirements in the power system domain are different from those in the office IT environment. Our experts for protection technology and IEC 61850 have been dealing with the topic of cyber security in power systems since 2010. It is our goal to share this knowledge with our customers.



Cyber Security in OMICRON-Products

The Cyber Dilemma
How to include security in networked protection engineering

Protection engineering and IT – do they really belong together at all? Although their interaction is based on the same technology, there are vast differences between them when you actually look at the details. This poses great challenges to companies, especially when it comes to the topic of cyber security.


Cyber Security
How it will affect the work
in the digital substation

Andreas Klien of OMICRON, after setting the record straight about certain digital substation cyber security myths, talks about cyber security risks and how to defend against cyber attacks.


How to protect your substation? Think like an attacker! 

Andreas Klien, leader of OMICRONs Business Unit Power Utility Communication, shows possible cyber attack vectors in today's substations and recommends permanent automatic monitoring with emergency alerting as a suitable measure against such attacks.

OMICRON's Cyber Security Solutions

Secure testing in IEC 61850 environments

 

StationGuard: Detecting Cyber Intrusions in digital substations

Multiple layers are necessary to ensure the cyber security of substations. Unfortunately, cryptography, firewalls or “air gaps” cannot prevent all types of attacks to a substation. Therefore, measures are needed to detect threats within the substation to enable a quick response and to minimize consequences. StationGuard, the Intrusion Detection System for IEC 61850 substations and the process bus, not only detects threats in these networks but also functional problems of the IEC 61850 communication and the devices. Further, it is almost immediately ready for operation and does not need a learning phase.

More about StationGuard


In the depths of the SAS - Testing Station Automation Systems

StationScout, our system for efficient testing of your station automation, works like a firewall which guarantees a secure connection between the test PC and the station network. Read in this technical article how StationScout provides a clear overview of the entire system during commissioning, maintenance and operation. In addition, it tracks the signals through the entire system. At the same time, it considerably reduces the time required for testing the entire control system signalling with powerful simulation functions.

READ MORE703 kB


MBX1 platform with cyber security functionality

The dedicated hardware MBX1 ensures cyber-secure operation of test PCs within the communication network of substations. It is specially designed for digital substations and offers an extremely hardened platform with crypto chip, secured boot chain, encryption of alldata and communication and a specially hardened operating system.

READ MORE313 kB


StationScout - Test Automation and Cyber Security

Testing automation, communication and SCADA takes as much time as testing protection - often more. StationScout simplifies all these tests, significantly reduces the effort required and separates the test PC from the station network working like a cyber-secure firewall.

WATCH VIDEO

Secure Management of Test and Equipment Data

 

No strategy without secure data

Protection systems are essential resources of critical infrastructures. Regular inspections, as well as systematic maintenance and documentation, are therefore urgently required. Read in this article how the data management system ADMO supports these processes. With its help, not only are the requirements of the standards regarding cyber security met, utilities thus also create the basis for efficient and secure maintenance management.

Read more849 kB


The challenge of Asset Management

The implementation of adequate security systems that provide protection against cyber attacks and data loss is necessary and useful. Sometimes, however, they are associated with very cumbersome and restrictive bureaucratic traits that impede daily processes. Read how ADMO, the easy-to-use data and asset management tool that is tailored to the needs of protection auditors, provides valuable support in evaluating and protecting the data of all assets.

READ MORE3,02 MB

Вы используете устаревшую версию браузера.
Пожалуйста, обновите ваш браузер или используйте другой браузер, чтобы данная страница отображалась корректно.
×