A Comparison of Electrical Sector Cyber Security Standards and Guidelines

سال انتشار: 1390
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 2,160

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ROUDSARIT01_237

تاریخ نمایه سازی: 19 مرداد 1390

چکیده مقاله:

This report informs on existing standards and best practices in the field of information and control system security. The objective is to provide guidance for those who develop cyber security in Electric Power Utility .The traditional distrust between IT and the SCADA engineer is being broken down. IT is becoming widespread and the traditional IT expert is replaced by a wide variety of specialists. The growth of the Internet and its associated technologies has allowed IT solutions to be applied to SCADA e.g. Ethernet, the IP suite of protocols. IT hardware and software has developed and improved its performance to the extent that specialized SCADA systems are being replaced by generic IT solutions (e.g. SQL databases, PC’s). The relative ease of interface between systems allows data to be readily transferred from SCADA into other business applications

نویسندگان

Hossein Shahin zadeh

Department of Electrical Engineering - Islamic Azad University Khomeini Shahr Branch

Parastoo Azizyan

Department of Electrical Engineering - Islamic Azad University Najaf Abad Branch

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • "Managing Information Security in an Electric Utility", Electra No 216, ...
  • "Cyber Security Considerations in Power System Operations: , ...
  • B. Buchholz, C. Schaefer, T. Stephanblome, H. Frey, N. Lewald, ...
  • no comprehensive security guidelines or standards are its reliability analysis, ...
  • ICT Infrastructure Management ...
  • The Busines Perspective ...
  • Application Management ...
  • Software Asset Management ...
  • framework for information Security Management, since Centeno, " An information ...
  • Security Management in an integrated and complex IEEE Trans On ...
  • Te EPU is recommendled to use _ security domain Challenge ...
  • Business, ownership, personnel, organization, technology, threats, vulnerabilities etc. are all ...
  • Te S CADA/Contro System domains include organization, culture, technology, security ...
  • Management of Information Security is an essentil and natural part ...
  • نمایش کامل مراجع