ERP-CBM 사이버 보안 응용

CYBERSECURITY APPLICATION - ERP-CBM

혁신적인 시스템

The Cybersecurity Application, "ERP-CBM", has been designed by EDIBON to allow the students, teachers and researchers to understand how substations are protected against cyber attacks.

일반적인 설명보기

관련 뉴스

일반적인 설명

The Cybersecurity Application, "ERP-CBM", has been designed by EDIBON to allow the students, teachers and researchers to understand how substations are protected against cyber attacks.

Power engineers demand the most reliable services for their control and protection systems. Settings cannot be disturbed, cables cannot be switched, and significant latency cannot be tolerated. Engineers must have full control of their critical systems and maintain full access

control to their equipment 24 hours a day, 365 days a year. Cybersecurity must protect these assets and enable power engineers to accomplish their work efficiently.

The ERP-CBM has been designed to protect power protections relays network from malicious traffic with an integrated firewall and strong authentication access control.

Protects meters, protective relays, programmable logic controllers (PLC), remote terminals unit (RTUs), and computers, are communicated through EIA-232, also known as RS-232 (standard for serial communication transmission of data).

The ERP-CBM allows the students to study how prevent unauthorized access, control, monitoring, and malicious attacks by authenticating and optionally encrypting all data along the communications path.

연습 및 가이드

매뉴얼에 포함 된 가이드 실기 연습

  1. Accessing the cybersecurity protection relay web server.
  2. Creating administrator accounts.
  3. Configuration of the hierarchical communication cybersecurity system between the protection relays using the ACSelerator software.
  4. Creation of users, groups and permissions.
  5. Configuration of the cybersecurity relay communication ports.
  6. Creating communications between different protection relays and the cybersecurity relay.
  7. Creating user passwords with different access levels.

장비로 수행 할 수있는 더 많은 실용적 연습

  1. Resetting the protection relay to set up the communication system from scratch.
  2. Simulation of cyber attack.
  3. Creation of encrypted communication between the cybersecurity relay and the differential protection relay.
  4. Creation of encrypted communication between the cybersecurity relay and the overcurrent protection relay.
  5. Creation of encrypted communication between the cybersecurity relay and the distance protection relay.
  6. Creation of encrypted communication between the cybersecurity relay and the directional protection relay.
  7. Creation of encrypted communication between the cybersecurity relay and the feeder management relay.

품질

판매 후 서비스

정보 요청