ERP-CBM 网络安全应用

CYBERSECURITY APPLICATION - ERP-CBM

創新系統

The Cybersecurity Application, "ERP-CBM", has been designed by EDIBON to allow the students, teachers and researchers to understand how substations are protected against cyber attacks.

查看一般說明

相關新聞

一般說明

The Cybersecurity Application, "ERP-CBM", has been designed by EDIBON to allow the students, teachers and researchers to understand how substations are protected against cyber attacks.

Power engineers demand the most reliable services for their control and protection systems. Settings cannot be disturbed, cables cannot be switched, and significant latency cannot be tolerated. Engineers must have full control of their critical systems and maintain full access

control to their equipment 24 hours a day, 365 days a year. Cybersecurity must protect these assets and enable power engineers to accomplish their work efficiently.

The ERP-CBM has been designed to protect power protections relays network from malicious traffic with an integrated firewall and strong authentication access control.

Protects meters, protective relays, programmable logic controllers (PLC), remote terminals unit (RTUs), and computers, are communicated through EIA-232, also known as RS-232 (standard for serial communication transmission of data).

The ERP-CBM allows the students to study how prevent unauthorized access, control, monitoring, and malicious attacks by authenticating and optionally encrypting all data along the communications path.

練習和指導練習

手册中包含的指导实践练习

  1. Accessing the cybersecurity protection relay web server.
  2. Creating administrator accounts.
  3. Configuration of the hierarchical communication cybersecurity system between the protection relays using the ACSelerator software.
  4. Creation of users, groups and permissions.
  5. Configuration of the cybersecurity relay communication ports.
  6. Creating communications between different protection relays and the cybersecurity relay.
  7. Creating user passwords with different access levels.

与该单位进行更多实际操作

  1. Resetting the protection relay to set up the communication system from scratch.
  2. Simulation of cyber attack.
  3. Creation of encrypted communication between the cybersecurity relay and the differential protection relay.
  4. Creation of encrypted communication between the cybersecurity relay and the overcurrent protection relay.
  5. Creation of encrypted communication between the cybersecurity relay and the distance protection relay.
  6. Creation of encrypted communication between the cybersecurity relay and the directional protection relay.
  7. Creation of encrypted communication between the cybersecurity relay and the feeder management relay.

質量

售後服務

要求信息