beautypg.com

Introduction – GarrettCom Ethernet Networks and Web Management User Manual

Page 2

background image

1

INTRODUCTION

This paper explores the state of network security options today at the Ethernet switch level and offers

an elementary roadmap for industrial operations to plan for and deploy secure communications

systems. Industrial systems need to take advantage of the advanced networking technologies that can

support greater efficiency, reliability, and security in plant and remote operations. As SCADA

systems, relays, and other industrial control, monitoring and management systems become more

intelligent, a rich supply of data is available for improving plant performance and remote maintenance

and management. However, as with all technology advances, there are challenges as well as

opportunities.

SECURITY OVERVIEW

In today’s uncertain world, security stands beside profitability, productivity, performance and control

as a key element for maintaining business activities in industrial facilities. Prevention of malicious

attacks against business infrastructure has become as vital to ongoing success as has the widespread

use of the computer systems which make such attacks so easy and so painful. It is no longer enough to

catch the perpetrator during or after the commission of a malicious act; considerable time and expense

is being consumed to address how to secure systems to prevent intrusion.

Repercussions from the 2003 power blackout in the Northeastern US were felt throughout the country.

Attacks such as the Zobot worm and Mytob bot software effectively shut down well protected

computers at CNN, the New York Times and many other places. Imagine how much worse a

concentrated and widespread act of industrial sabotage might be.

Until just recently, SCADA (Supervisory Control And Data Acquisition) environments were not

considered at risk for cyber attack because of the highly customized nature of these systems. In March

2002, articles were still being written that debunked the concern for more security of utility service

providers. Yet this viewpoint is compromised by documented cyber-related incidents, such as the

Slammer Worm infiltration of an Ohio Nuclear power plant, and the wireless attack on a sewage-

SCADA system in Queensland Australia.