ERP-CBM Cybersecurity Application

CYBERSECURITY APPLICATION - ERP-CBM

革新的なシステム

The Cybersecurity Application, "ERP-CBM", has been designed by edibon to allow the students, teachers and researchers to understand how substations are protected against cyber attacks.

一般的な説明を表示

関連ニュース

概要

The Cybersecurity Application, "ERP-CBM", has been designed by edibon to allow the students, teachers and researchers to understand how substations are protected against cyber attacks.

Power engineers demand the most reliable services for their control and protection systems. Settings cannot be disturbed, cables cannot be switched, and significant latency cannot be tolerated. Engineers must have full control of their critical systems and maintain full access

control to their equipment 24 hours a day, 365 days a year. Cybersecurity must protect these assets and enable power engineers to accomplish their work efficiently.

The ERP-CBM has been designed to protect power protections relays network from malicious traffic with an integrated firewall and strong authentication access control.

Protects meters, protective relays, programmable logic controllers (PLC), remote terminals unit (RTUs), and computers, are communicated through EIA-232, also known as RS-232 (standard for serial communication transmission of data).

The ERP-CBM allows the students to study how prevent unauthorized access, control, monitoring, and malicious attacks by authenticating and optionally encrypting all data along the communications path.

演習と指導の慣行

マニュアルに含まれるガイド付き実習

  1. Accessing the cybersecurity protection relay web server.
  2. Creating administrator accounts.
  3. Configuration of the hierarchical communication cybersecurity system between the protection relays using the ACSelerator software.
  4. Creation of users, groups and permissions.
  5. Configuration of the cybersecurity relay communication ports.
  6. Creating communications between different protection relays and the cybersecurity relay.
  7. Creating user passwords with different access levels.

より実用的な練習をして、ユニットを完成させる

  1. Resetting the protection relay to set up the communication system from scratch.
  2. Simulation of cyber attack.
  3. Creation of encrypted communication between the cybersecurity relay and the differential protection relay.
  4. Creation of encrypted communication between the cybersecurity relay and the overcurrent protection relay.
  5. Creation of encrypted communication between the cybersecurity relay and the distance protection relay.
  6. Creation of encrypted communication between the cybersecurity relay and the directional protection relay.
  7. Creation of encrypted communication between the cybersecurity relay and the feeder management relay.

品質

アフターサービス

リクエスト情報