ERP-CBM Aplikasi Keamanan Siber

CYBERSECURITY APPLICATION - ERP-CBM

SISTEM INOVATIF

The Cybersecurity Application, "ERP-CBM", has been designed by EDIBON to allow the students, teachers and researchers to understand how substations are protected against cyber attacks.

Lihat uraian umum

BERITA TERKAIT

GAMBARAN UMUM

The Cybersecurity Application, "ERP-CBM", has been designed by EDIBON to allow the students, teachers and researchers to understand how substations are protected against cyber attacks.

Power engineers demand the most reliable services for their control and protection systems. Settings cannot be disturbed, cables cannot be switched, and significant latency cannot be tolerated. Engineers must have full control of their critical systems and maintain full access

control to their equipment 24 hours a day, 365 days a year. Cybersecurity must protect these assets and enable power engineers to accomplish their work efficiently.

The ERP-CBM has been designed to protect power protections relays network from malicious traffic with an integrated firewall and strong authentication access control.

Protects meters, protective relays, programmable logic controllers (PLC), remote terminals unit (RTUs), and computers, are communicated through EIA-232, also known as RS-232 (standard for serial communication transmission of data).

The ERP-CBM allows the students to study how prevent unauthorized access, control, monitoring, and malicious attacks by authenticating and optionally encrypting all data along the communications path.

LATIHAN DAN PRAKTEK PEDOMAN

LATIHAN PRAKTIS YANG DIANDAL TERMASUK DALAM PANDUAN

  1. Accessing the cybersecurity protection relay web server.
  2. Creating administrator accounts.
  3. Configuration of the hierarchical communication cybersecurity system between the protection relays using the ACSelerator software.
  4. Creation of users, groups and permissions.
  5. Configuration of the cybersecurity relay communication ports.
  6. Creating communications between different protection relays and the cybersecurity relay.
  7. Creating user passwords with different access levels.

LEBIH BANYAK LATIHAN PRAKTIS YANG AKAN DILAKUKAN DENGAN UNIT

  1. Resetting the protection relay to set up the communication system from scratch.
  2. Simulation of cyber attack.
  3. Creation of encrypted communication between the cybersecurity relay and the differential protection relay.
  4. Creation of encrypted communication between the cybersecurity relay and the overcurrent protection relay.
  5. Creation of encrypted communication between the cybersecurity relay and the distance protection relay.
  6. Creation of encrypted communication between the cybersecurity relay and the directional protection relay.
  7. Creation of encrypted communication between the cybersecurity relay and the feeder management relay.

KUALITAS

LAYANAN PURNA JUAL

Meminta informasi