Cybersecurity has become a critical concern for businesses across all industries as they increasingly rely on digital technology to operate. In the face of evolving cyber threats such as ransomware attacks, data breaches, and other types of cyberattacks, organizations need to implement robust cybersecurity measures to protect their sensitive data, intellectual property, and reputation. Effective cybersecurity in industry requires a proactive approach to identify and address vulnerabilities and threats, including implementing firewalls, encryption, and multifactor authentication. It is also important for organizations to provide cybersecurity training to their employees and to develop incident response plans to minimize the damage in the event of a cyber attack. Additionally, complying with relevant regulatory requirements, such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA), is essential for maintaining customer trust and avoiding legal consequences. Ultimately, cybersecurity in industry is critical to maintaining the confidentiality, integrity, and availability of information and ensuring that businesses can continue to operate securely and efficiently in the digital age.
2. Contents:
• What is cyber security?
• Why cyber security?
• Cyber Security & modern world.
• Cyber security in industry.
• What is ICE 61850?
• ICE 61850 architecture example
• Protocol of ICE 61850
• ICE 61850 and cyber security solution
• Conclusion.
• References.
2
3. 1. What is cyber security?
• Cyber security is the exercise of protecting computer systems and
networks.
• It saves data and information from disclosure and theft.
• It's too known as data innovation security or electronic data security.
3
4. 2. Why cyber security?
Computers of US department of defense division
were found with “backdoors” installed in servers
Yahoo!, Amazon, eBay websites hit with
massive Dos attack
“WannaCry” ransom ware attack which
encrypted data and demands ransom in bitcoin
In
1999
In
2000
In
2007
4
5. 3. Cyber security & modern world:
• Internet is being used globally resulting the easy accessing in personal
information.
• Increasing dependency on internet.
• Adaptation of IOT and IIOT.
5
6. 4. Cyber security in industry
• All companies today have information technology (IT) and
operational technology (OT) system.
• Cyber security is associated with these systems in order to protect the
data flow.
• IEC international standards are providing the protocols to implement
successful cyber security program.
6
7. 5. What is IEC 61850?
• It is an communication protocol for intelligent Electronic devices
(IDE) at substations.
• It is a Part of International Electro-technical commission (ICE).
• It has multiple protocol, namely MMS,GOOSE,SMV.
7
9. 7. Protocol of ICE 61850
• Goose: Generic Object Oriented Substation Event. Fast and safe
messages sent in the substation to exchange data among intelligent
devices.
• MMS: Manufacturing Message Specification is a client/server based
protocol for communications between IEDs and higher level entities
such as SCADAs over Ethernet.
• SVM: Sampled Values is mechanism to publish sampled analog
measurements from measurement devices like current transformers
(CT) and voltage transformers (VT). Sampled Values messages are
“published” by a device via Ethernet multicast such that they can be
“subscribed” by any number of other devices. 9
10. 8. ICE 61850 and cyber security solution
Analyzes all communication in station
and alerts when threat is detected
Simulate all IDEs and
SAS.
Visualize goose and all
IDEs data models and can
also be simulate IDEs
Protection testing with
CMC test sets
DANEO triggered on
faults
10
11. 9. Conclusions
• Hence in this emerging world of internet cyber security is the
mandatory tool to secure sensitive data.
• As the automation industries have been utilizing IIOT therefore to
secure firm it is important to installed security system.
11