Show Energy management systems (EMS) are automation systems that collect energy measurement data from the field and making it available to users through graphics, online monitoring tools, and energy quality analyzers, thus enabling the management of energy resources. From: Advances in Renewable Energies and Power Technologies, 2018
Industrial control system (ICS) is a collective term used to describe different types of control systems and associated instrumentation, which include the devices, systems, networks, and controls used to operate and/or automate industrial processes. Depending on the industry, each ICS functions differently and are built to electronically manage tasks efficiently. Today the devices and protocols used in an ICS are used in nearly every industrial sector and critical infrastructure such as the manufacturing, transportation, energy, and water treatment industries. There are several types of ICSs, the most common of which are Supervisory Control and Data Acquisition (SCADA) systems, and Distributed Control Systems (DCS). Local operations are often controlled by so-called Field Devices that receive supervisory commands from remote stations.
What is an ICS System?What function does a SCADA system fulfillCommunication within ICS SystemsDevices and control modules in ICS systems relay information through communication protocols. There are several communication protocols used through various ICS environments. Most of these protocols are designed for specific purposes such as process automation, building automation, power systems automation, and many more. These protocols were also developed to ensure interoperability between different manufacturers. However, there are some protocols that only work if the protocols and equipment come from the same manufacturer. The ICS protocols that are commonly found include:
Common Threats to Industrial Control SystemsIn order to improve system functions and productivity, every ICS constantly incorporates new technologies and software in both IT and OT. With IT and OT merged, they become bigger targets for cybercriminals. One of the common flaws of security solutions used in OT infrastructure is its inability to protect legacy control systems such as SCADA. In addition to that, organizations also have to face the rise of security challenges in new and emerging technologies, such as cloud computing, big data analytics, and the internet of things (IoT). Centralization introduces new and unknown vulnerabilities into the cyber ecosystem. [Related: Why do attackers target industrial control systems?] Attacks on ICS systems are often targeted attacks that use the ICS entry path to gain a foothold inside a system which will allow them to laterally move into the organization. Among the most high-profile cases are the Stuxnet worm, which was used to manipulate centrifuges inside nuclear facilities in Iran, and BlackEnergy, which affected power generation facilities in Ukraine. Despite most of the attacks focusing on data theft and/or industrial espionage, both of the aforementioned cases demonstrated how malware had a kinetic effect. The Trend Micro whitepaper titled Cyber Threats to the Mining Industry explores how the mining industry is increasingly becoming a target of cyber espionage campaigns. These cyber espionage campaigns are designed to gain the latest technical knowledge and intelligence that will help some interest groups thrive and maintain competitive advantage. [Read: Protecting ICS: Defensive strategies for industrial control systems] |