ERP-CBM Anwendung für Cybersicherheit

CYBERSECURITY APPLICATION - ERP-CBM

INNOVATIVE SYSTEME

The Cybersecurity Application, "ERP-CBM", has been designed by EDIBON to allow the students, teachers and researchers to understand how substations are protected against cyber attacks.

Allgemeine Beschreibung anzeigen

ÄHNLICHE NEUIGKEITEN

ALLGEMEINE BESCHREIBUNG

The Cybersecurity Application, "ERP-CBM", has been designed by EDIBON to allow the students, teachers and researchers to understand how substations are protected against cyber attacks.

Power engineers demand the most reliable services for their control and protection systems. Settings cannot be disturbed, cables cannot be switched, and significant latency cannot be tolerated. Engineers must have full control of their critical systems and maintain full access

control to their equipment 24 hours a day, 365 days a year. Cybersecurity must protect these assets and enable power engineers to accomplish their work efficiently.

The ERP-CBM has been designed to protect power protections relays network from malicious traffic with an integrated firewall and strong authentication access control.

Protects meters, protective relays, programmable logic controllers (PLC), remote terminals unit (RTUs), and computers, are communicated through EIA-232, also known as RS-232 (standard for serial communication transmission of data).

The ERP-CBM allows the students to study how prevent unauthorized access, control, monitoring, and malicious attacks by authenticating and optionally encrypting all data along the communications path.

ÜBUNGEN UND GEFÜHRTE PRAKTIKEN

GEFÜHRTE PRAKTISCHE ÜBUNGEN IM HANDBUCH ENTHALTEN

  1. Accessing the cybersecurity protection relay web server.
  2. Creating administrator accounts.
  3. Configuration of the hierarchical communication cybersecurity system between the protection relays using the ACSelerator software.
  4. Creation of users, groups and permissions.
  5. Configuration of the cybersecurity relay communication ports.
  6. Creating communications between different protection relays and the cybersecurity relay.
  7. Creating user passwords with different access levels.

MEHR PRAKTISCHE ÜBUNGEN FÜR DAS GERÄT

  1. Resetting the protection relay to set up the communication system from scratch.
  2. Simulation of cyber attack.
  3. Creation of encrypted communication between the cybersecurity relay and the differential protection relay.
  4. Creation of encrypted communication between the cybersecurity relay and the overcurrent protection relay.
  5. Creation of encrypted communication between the cybersecurity relay and the distance protection relay.
  6. Creation of encrypted communication between the cybersecurity relay and the directional protection relay.
  7. Creation of encrypted communication between the cybersecurity relay and the feeder management relay.

QUALITÄT

KUNDENDIENST

Informationen anfordern