An Evaluation of Cybersecurity Assessment Tools on a SCADA Environment

被引:0
|
作者
Hahn, Adam [1 ]
Govindarasu, Manimaran [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Increased concerns for electric grid cybersecurity has lead to the development of compliance requirements that must be evaluated by utilities. The North American Electric Reliability Council (NERC) has created Critical Infrastructure Protection (CIP) requirements for all cyber assets supporting the bulk power system[17]. This research explores whether the methodologies and tools commonly used for traditional information technology (IT) systems are sufficient to meet the cybersecurity assessment needs in power systems. This paper reviews these assessment tools to determine their ability to assist in the evaluation of the CIP requirements. In addition to the evaluation the tool capabilities, they are also reviewed for their potential to negatively impact the network availability properties. Evaluation was performed on the PowerCyber testbed at Iowa State University which implements real-world environment as in employs industry standard hardware, software and field devices. The results of this analysis is provided along with a review known gaps where current IT cybersecurity tools do not appropriately support SCADA environments.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Vulnerability Assessment of Cybersecurity for SCADA Systems
    Ten, Chee-Wooi
    Liu, Chen-Ching
    Manimaran, Govindarasu
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2008, 23 (04) : 1836 - 1846
  • [2] Cybersecurity of SCADA Systems: Vulnerability Assessment and Mitigation
    Liu, Chen-Ching
    Ten, Chee-Wooi
    Govindarasu, Manimaran
    2009 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION, VOLS 1-3, 2009, : 808 - +
  • [3] Power System Reliability Evaluation With SCADA Cybersecurity Considerations
    Zhang, Yichi
    Wang, Lingfeng
    Xiang, Yingmeng
    Ten, Chee-Wooi
    IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (04) : 1707 - 1721
  • [4] Vulnerability assessment of cybersecurity for SCADA systems using attack trees
    Ten, Chee-Wooi
    Liu, Chen-Ching
    Govindarasu, Manimaran
    2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 2527 - +
  • [5] A Framework for the Deployment of Cybersecurity Monitoring Tools in the Industrial Environment
    Armellin, Alessandro
    Caviglia, Roberto
    Gaggero, Giovanni
    Marchese, Mario
    IT PROFESSIONAL, 2024, 26 (04) : 62 - 70
  • [6] Evaluation of Security Solutions in the SCADA Environment
    Larkin, Robert D.
    Lopez, Juan, Jr.
    Butts, Jonathan W.
    Grimaila, Michael R.
    DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2014, 45 (01): : 38 - 53
  • [7] Experiences with the automotive SPICE for cybersecurity assessment model and tools
    Messnarz, Richard
    Ekert, Damjan
    Macher, Georg
    Much, Alexander
    Zehetner, Tobias
    Aschbacher, Laura
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2022, 35 (09)
  • [8] Evaluation of Traditional Security Solutions in the SCADA Environment
    Larkin, Robert
    Lopez, Juan
    Butts, Jonathan
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 399 - 403
  • [9] Psychometric Evaluation of the Cybersecurity Curriculum Assessment
    Herman, Geoffrey L.
    Huang, Shan
    Peterson, Peter A.
    Oliva, Linda
    Golaszewski, Enis
    Sherman, Alan T.
    PROCEEDINGS OF THE 54TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, VOL 1, SIGCSE 2023, 2023, : 228 - 234
  • [10] Participatory Evaluation and Needs Assessment Tools for Cooperative Extension in a Virtual Environment
    Vines, Karen A.
    JOURNAL OF EXTENSION, 2022, 60 (03):