SlideShare a Scribd company logo
1 of 37
 Dr. Vivek Chandra, Head IT vivekchandra123@gmail.com
 Dr. Ashok Kumar Tiwari, EE (RAPDRP)
ashokktiwari@gmail.com
MPPKVVCL Jabalpur
1
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
S.
No.
Particulars
1 East Discom in MP as a typical Indian Power Distribution
Utility & prevailing IT systems prior to R-APDRP.
2 Launch of R-APDRP & ERP in the Discom.
3 Network Architecture Post R-APDRP & ERP
4 Vulnerability of the new system and Potential Threats to
Security.
5 Security Measures adopted at various levels.
6 Conclusion
2
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
3
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 MP East Discom was
formed after the
unbundling of
erstwhile MP State
Electricity Board in
July’02.
4
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
The major applications deployed included:
 Consumer Bill Generation System
 Financial Accounting System
 Stores Management System
 Payroll System.
5
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
6
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
S.
No.
Name of
Application
Architecture Office
where
deployed
No. of
locations.
1. Billing System (HT) Distributed RAO 6 Nos.
2. Billing System (LT) Distributed Circle/Dn 29 Nos.
3. Stores
Management
System
Distributed Area Stores 5 Nos.
4. Financial
Accounting System
Distributed RAO 6 Nos.
5. Payroll System Distributed RAO 6 Nos.
7
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
8
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 Power Sector in the country suffers a loss of over 35% on
account of AT&C losses.
 To curtail these losses R-APDRP scheme was launched by
GoI to reform Distribution Sector during XITH
plan.
 The scheme intends to cover urban areas i.e. towns and cities
with population above 30,000 (10,000 in case of special
category states).
Projects under the scheme is in Two Parts.
 Part-A covered IT applications in distribution sector
 Part-B covered System improvement, strengthening
and augmentation etc.
9
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
Establishment of IT Infrastructure for determination of
baseline data of AT&C losses.
Reduction of AT&C losses
Focus on system reliability and customer satisfaction
Achieve operational efficiency through IT enablement
10
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
11
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 Creation of Centralized Consumer Care Centre.
 Setup of Data Centre at Jabalpur.
 Setup of a Centralized Control Centre at Jabalpur.
 Setup of Data Recovery Centre at Bhopal.
 All offices located in select 27 towns connected
through MPLS network .
12
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 Considering the
limited modules
coverage under R-
APDRP the Company
decided to procure the
same through ERP .
 
 It was decided to
implement the solution
across all offices up
the level of
Distribution Centres.
 The Project has been
launched in 2011.
R-APDRP ERP
1 Metering, Billing &
Collection
Procurement &
Material
Management
2 Maintenance
Management
Project Systems
3 Asset
Management
Human Resource
Management
4 Email Solution Financial
Accounting
13
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
Particulars R-APDRP ERP
1. Extent 27 towns having
population above
30,000.
All offices up to distribution Centres i.e
500+ locations.
2. Connectivity
through MPLS
Through MPLS
Network only
(Primary as well as
secondary)
Through MPLS Network
3. Connectivity
Through
Internet
Not provisioned Yes, The VPN Users(Around 500 No.
who have been provided the firewall
authentication (VPN username and
password) shall be able to access the
entire MPLS network. Normal Internet
users shall access the application
through Reverse Proxy.
14
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
3. Network Architecture Post R-APDRP
& ERP
15
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
16
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 DMZ stands for "demilitarized zone“.
 The purpose of a DMZ is to add an additional layer of
security to an organization's local area network (LAN).
 An external attacker only has access to equipment in
the DMZ, rather than any other part of the network.
 A DMZ configuration typically provides security from
external attacks.
17
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 The VPN Users who have been provided the
firewall authentication (VPN username and
password) can access the entire MPLS network.
 Normal Internet users shall access the application
through Reverse Proxy. Reverse proxy fetches
the information from internal network. These users
shall require login and passwords of application.
As per requirements only some forms/reports are
exposed to internet.
18
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
19
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
Proxy: A proxy takes requests from an
internal network and forwards them to the
Internet To keep machines behind it
anonymous, mainly for Security.
Reverse Proxy receives requests from
the Internet and forwards them to servers in
the internal network. This is for Security of
Internal Network.
20
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
21
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
22
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
23
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
24
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
25
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 Creation of sizable amount of IT Infrastructure.
 Built of great amount of data.
 Convergence of GIS, AMR , SCADA and CCC networks to a
single network.
 Creation of numerous interface points between heterogeneous
networks which could prove potential weak links.
 Creation of a very large Intranet exposed to internet.
26
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
27
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 Introduction of malicious code such as viruses,
Trojan horses, and worms.
 Interception and tampering of data.
 Denial of service attacks.
 Web hacking.
 SQL Injection.
 Input Validation attacks.
28
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
5. Security Measures adopted at
various levels.
29
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
30
Physical
Security
Fire &
Smoke
Redundant Power
Supply
Data Backup
Closed Circuit
Cameras
Smoke
Detectors
Redundant Power Supply SAN Storage
Permanent Security
Guards
Fire
Extinguishers
Backup power consists of
power from two feeders,
battery banks, and diesel
generators
Tape Library
Use of Identity
Access Cards
Water Leakage
Detectors
To prevent single points of
failure, all elements of the
electrical systems, including
backup systems, are typically
fully duplicated.
Replication of
Data at SAN in
Data Recovery
Site.
Use of Biometric
Devices like Finger
Print Recognition
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 Network virtualization is a method of combining the
available resources in a network by splitting up the
available bandwidth into channels.
 Each resource is independent from the other and
each of which can be assigned (or reassigned) to a
particular server or device in real time.
 Each channel is independently secured.
 Every subscriber has shared access to all the
resources on the network from a single computer.
31
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 Identity Access Management
 Blocking use of CD Drives and Pen Drives
 Anti-virus software is installed and enabled on all
workstations.
 Anti-virus definition are updated through Antivirus
server at Data Centre rather than individual
machine getting updated through internet.
32
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 Role based Access Control.
 Audit trail and Real time Monitoring Logs.
 Administrator and operator logs.
 Communication through Asymmetric/ symmetric
key Cryptography
 Role Based Access Control
 Single Sign-on functionality
33
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 Internet access is given to users who have legitimate
need. Following kind of access can be provided to users
to restrict misuse of internet:
 Use of Web Filter for Filtration of undesired web content.
 Throttling of bandwidth (to restrict the download speed)
 Use of Spam Filter for blocking of junk mails.
34
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
6. Conclusion.
35
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
 As technology advances, so does the associated
threats and risks.
 There is no panacea against all potential threats.
 It is for the utility to identify the treats, prioritize
them and identify the mitigation actions according
to the risk involved and its affordability.
36
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur
37
© vivek chandra and ashok kumar
tiwari MPPKVVCL Jabalpur

More Related Content

What's hot

LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network SecuritySatish Chavan
 
IEC61850: Use of IEC61850 to telecontrol MV grids (Article)
IEC61850: Use of IEC61850 to telecontrol MV grids (Article)IEC61850: Use of IEC61850 to telecontrol MV grids (Article)
IEC61850: Use of IEC61850 to telecontrol MV grids (Article)iGrid T&D
 
IoT Seminar (Jan. 2016) - (4) friedhelm rodermund - lwm2m and lpwa
IoT Seminar (Jan. 2016) - (4) friedhelm rodermund - lwm2m and lpwaIoT Seminar (Jan. 2016) - (4) friedhelm rodermund - lwm2m and lpwa
IoT Seminar (Jan. 2016) - (4) friedhelm rodermund - lwm2m and lpwaOpen Mobile Alliance
 
Radisys Optimizing VAS for Greater Revenue Generation
Radisys Optimizing VAS for Greater Revenue GenerationRadisys Optimizing VAS for Greater Revenue Generation
Radisys Optimizing VAS for Greater Revenue GenerationRadisys Corporation
 
WLAN Traffic Offload in LTE
WLAN Traffic Offload in LTE WLAN Traffic Offload in LTE
WLAN Traffic Offload in LTE Praveen Kumar
 
Dynamic Data Offloading : Connect Intelligently With ANDSF
Dynamic Data Offloading : Connect Intelligently With ANDSFDynamic Data Offloading : Connect Intelligently With ANDSF
Dynamic Data Offloading : Connect Intelligently With ANDSFGreen Packet
 
Understanding Wi-Fi offload
Understanding Wi-Fi offloadUnderstanding Wi-Fi offload
Understanding Wi-Fi offloadKenan Masic
 
Schneider Electric Security Notification Security Notification -Embedded Web ...
Schneider Electric Security Notification Security Notification -Embedded Web ...Schneider Electric Security Notification Security Notification -Embedded Web ...
Schneider Electric Security Notification Security Notification -Embedded Web ...Ismail Tasdelen
 
IRJET- A Survey on Various Location Tracking Systems
IRJET- A Survey on Various Location Tracking SystemsIRJET- A Survey on Various Location Tracking Systems
IRJET- A Survey on Various Location Tracking SystemsIRJET Journal
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014iotisrael
 
Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)Bob Radvanovsky
 
Tags. troubleshooting and optimization startup sauna
Tags. troubleshooting and optimization startup saunaTags. troubleshooting and optimization startup sauna
Tags. troubleshooting and optimization startup saunaKarina Uryvskaya
 
Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?AirTight Networks
 
BSS training 2012 - for students
BSS training 2012 - for studentsBSS training 2012 - for students
BSS training 2012 - for studentszhiar ahmad
 
IRJET- Smart City using IoT
IRJET- Smart City using IoTIRJET- Smart City using IoT
IRJET- Smart City using IoTIRJET Journal
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Honeywell
 

What's hot (20)

LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
 
IEC61850: Use of IEC61850 to telecontrol MV grids (Article)
IEC61850: Use of IEC61850 to telecontrol MV grids (Article)IEC61850: Use of IEC61850 to telecontrol MV grids (Article)
IEC61850: Use of IEC61850 to telecontrol MV grids (Article)
 
GE MDS Overview
GE MDS OverviewGE MDS Overview
GE MDS Overview
 
IoT Seminar (Jan. 2016) - (4) friedhelm rodermund - lwm2m and lpwa
IoT Seminar (Jan. 2016) - (4) friedhelm rodermund - lwm2m and lpwaIoT Seminar (Jan. 2016) - (4) friedhelm rodermund - lwm2m and lpwa
IoT Seminar (Jan. 2016) - (4) friedhelm rodermund - lwm2m and lpwa
 
Radisys Optimizing VAS for Greater Revenue Generation
Radisys Optimizing VAS for Greater Revenue GenerationRadisys Optimizing VAS for Greater Revenue Generation
Radisys Optimizing VAS for Greater Revenue Generation
 
P1111141868
P1111141868P1111141868
P1111141868
 
WLAN Traffic Offload in LTE
WLAN Traffic Offload in LTE WLAN Traffic Offload in LTE
WLAN Traffic Offload in LTE
 
Dynamic Data Offloading : Connect Intelligently With ANDSF
Dynamic Data Offloading : Connect Intelligently With ANDSFDynamic Data Offloading : Connect Intelligently With ANDSF
Dynamic Data Offloading : Connect Intelligently With ANDSF
 
SCADA Security
SCADA SecuritySCADA Security
SCADA Security
 
Understanding Wi-Fi offload
Understanding Wi-Fi offloadUnderstanding Wi-Fi offload
Understanding Wi-Fi offload
 
Schneider Electric Security Notification Security Notification -Embedded Web ...
Schneider Electric Security Notification Security Notification -Embedded Web ...Schneider Electric Security Notification Security Notification -Embedded Web ...
Schneider Electric Security Notification Security Notification -Embedded Web ...
 
IRJET- A Survey on Various Location Tracking Systems
IRJET- A Survey on Various Location Tracking SystemsIRJET- A Survey on Various Location Tracking Systems
IRJET- A Survey on Various Location Tracking Systems
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014
 
Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)
 
Tags. troubleshooting and optimization startup sauna
Tags. troubleshooting and optimization startup saunaTags. troubleshooting and optimization startup sauna
Tags. troubleshooting and optimization startup sauna
 
Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?
 
BSS training 2012 - for students
BSS training 2012 - for studentsBSS training 2012 - for students
BSS training 2012 - for students
 
LTE MTC evolution
LTE MTC evolutionLTE MTC evolution
LTE MTC evolution
 
IRJET- Smart City using IoT
IRJET- Smart City using IoTIRJET- Smart City using IoT
IRJET- Smart City using IoT
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 

Similar to Information Security in Electrical Power Distribution

Unleash the power, intelligence, and analytics of your networks with a flexib...
Unleash the power, intelligence, and analytics of your networks with a flexib...Unleash the power, intelligence, and analytics of your networks with a flexib...
Unleash the power, intelligence, and analytics of your networks with a flexib...Alcatel-Lucent Enterprise
 
IRJET- Crane Control by using Hand Gestures
IRJET-  	  Crane Control by using Hand GesturesIRJET-  	  Crane Control by using Hand Gestures
IRJET- Crane Control by using Hand GesturesIRJET Journal
 
IRJET- Smart Bank Security using PLC
IRJET- Smart Bank Security using PLCIRJET- Smart Bank Security using PLC
IRJET- Smart Bank Security using PLCIRJET Journal
 
7th SDN Expert Group Seminar - Session2
7th SDN Expert Group Seminar - Session27th SDN Expert Group Seminar - Session2
7th SDN Expert Group Seminar - Session2NAIM Networks, Inc.
 
Security challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresSecurity challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresP K Agarwal
 
IRJET- IoT based Street Light Monitoring & Control with Lora/Lorawan Network
IRJET-  	  IoT based Street Light Monitoring & Control with Lora/Lorawan NetworkIRJET-  	  IoT based Street Light Monitoring & Control with Lora/Lorawan Network
IRJET- IoT based Street Light Monitoring & Control with Lora/Lorawan NetworkIRJET Journal
 
Embracing SDN in the Next Gen Network
Embracing SDN in the Next Gen NetworkEmbracing SDN in the Next Gen Network
Embracing SDN in the Next Gen NetworkNetCraftsmen
 
Smart Grids & smart grid technologies in India
Smart Grids & smart grid technologies in IndiaSmart Grids & smart grid technologies in India
Smart Grids & smart grid technologies in IndiaIRJET Journal
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
 
Using OpenContrail with Kubernetes
Using OpenContrail with KubernetesUsing OpenContrail with Kubernetes
Using OpenContrail with KubernetesMatt Baldwin
 
Implementing Oracle Utilities Smart Grid Gateway: A Customer Experience
Implementing Oracle Utilities Smart Grid Gateway: A Customer ExperienceImplementing Oracle Utilities Smart Grid Gateway: A Customer Experience
Implementing Oracle Utilities Smart Grid Gateway: A Customer Experiencecgjohns
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PROIDEA
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center LandscapeCisco Canada
 
IRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe RequestIRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe RequestIRJET Journal
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow ControllerIRJET Journal
 
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKSA REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKSIRJET Journal
 

Similar to Information Security in Electrical Power Distribution (20)

Unleash the power, intelligence, and analytics of your networks with a flexib...
Unleash the power, intelligence, and analytics of your networks with a flexib...Unleash the power, intelligence, and analytics of your networks with a flexib...
Unleash the power, intelligence, and analytics of your networks with a flexib...
 
Evolution of internet by Ali Kashif
Evolution of internet  by Ali KashifEvolution of internet  by Ali Kashif
Evolution of internet by Ali Kashif
 
IRJET- Crane Control by using Hand Gestures
IRJET-  	  Crane Control by using Hand GesturesIRJET-  	  Crane Control by using Hand Gestures
IRJET- Crane Control by using Hand Gestures
 
IRJET- Smart Bank Security using PLC
IRJET- Smart Bank Security using PLCIRJET- Smart Bank Security using PLC
IRJET- Smart Bank Security using PLC
 
7th SDN Expert Group Seminar - Session2
7th SDN Expert Group Seminar - Session27th SDN Expert Group Seminar - Session2
7th SDN Expert Group Seminar - Session2
 
Security challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructuresSecurity challenges to power grid and smart grid infrastructures
Security challenges to power grid and smart grid infrastructures
 
IRJET- IoT based Street Light Monitoring & Control with Lora/Lorawan Network
IRJET-  	  IoT based Street Light Monitoring & Control with Lora/Lorawan NetworkIRJET-  	  IoT based Street Light Monitoring & Control with Lora/Lorawan Network
IRJET- IoT based Street Light Monitoring & Control with Lora/Lorawan Network
 
Embracing SDN in the Next Gen Network
Embracing SDN in the Next Gen NetworkEmbracing SDN in the Next Gen Network
Embracing SDN in the Next Gen Network
 
Smart Grids & smart grid technologies in India
Smart Grids & smart grid technologies in IndiaSmart Grids & smart grid technologies in India
Smart Grids & smart grid technologies in India
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Using OpenContrail with Kubernetes
Using OpenContrail with KubernetesUsing OpenContrail with Kubernetes
Using OpenContrail with Kubernetes
 
Implementing Oracle Utilities Smart Grid Gateway: A Customer Experience
Implementing Oracle Utilities Smart Grid Gateway: A Customer ExperienceImplementing Oracle Utilities Smart Grid Gateway: A Customer Experience
Implementing Oracle Utilities Smart Grid Gateway: A Customer Experience
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
 
Scada system
Scada systemScada system
Scada system
 
Oliver Spink
Oliver SpinkOliver Spink
Oliver Spink
 
IRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe RequestIRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe Request
 
IRJET- Build SDN with Openflow Controller
IRJET-  	  Build SDN with Openflow ControllerIRJET-  	  Build SDN with Openflow Controller
IRJET- Build SDN with Openflow Controller
 
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKSA REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
 

More from Dr Ashok Tiwari (20)

Vector Space.pptx
Vector Space.pptxVector Space.pptx
Vector Space.pptx
 
LINEAR TRANSFORMATION22.pdf
LINEAR TRANSFORMATION22.pdfLINEAR TRANSFORMATION22.pdf
LINEAR TRANSFORMATION22.pdf
 
AI in science.pptx
AI in science.pptxAI in science.pptx
AI in science.pptx
 
cv2.pdf
cv2.pdfcv2.pdf
cv2.pdf
 
syllabus_GATE_ee_2022.pdf
syllabus_GATE_ee_2022.pdfsyllabus_GATE_ee_2022.pdf
syllabus_GATE_ee_2022.pdf
 
Probability (1) (1).pdf
Probability (1) (1).pdfProbability (1) (1).pdf
Probability (1) (1).pdf
 
LINEAR TRANSFORMATION22.pptx
LINEAR TRANSFORMATION22.pptxLINEAR TRANSFORMATION22.pptx
LINEAR TRANSFORMATION22.pptx
 
stat1.pptx
stat1.pptxstat1.pptx
stat1.pptx
 
proba dist questions (1).pdf
proba dist questions (1).pdfproba dist questions (1).pdf
proba dist questions (1).pdf
 
T-test (1).pptx
T-test (1).pptxT-test (1).pptx
T-test (1).pptx
 
stat2.pptx
stat2.pptxstat2.pptx
stat2.pptx
 
SCR3.pptx
SCR3.pptxSCR3.pptx
SCR3.pptx
 
SCR2.pptx
SCR2.pptxSCR2.pptx
SCR2.pptx
 
SCR1 missing concepts22.pptx
SCR1 missing concepts22.pptxSCR1 missing concepts22.pptx
SCR1 missing concepts22.pptx
 
Diode circuits for GATE
Diode circuits for GATEDiode circuits for GATE
Diode circuits for GATE
 
Indian Women in power
Indian Women in powerIndian Women in power
Indian Women in power
 
ANN load forecasting
ANN load forecastingANN load forecasting
ANN load forecasting
 
Energy Meters
Energy Meters Energy Meters
Energy Meters
 
Akt tl design01
Akt tl design01Akt tl design01
Akt tl design01
 
Heffron phillips model
Heffron phillips modelHeffron phillips model
Heffron phillips model
 

Recently uploaded

General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Recently uploaded (20)

General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Information Security in Electrical Power Distribution

  • 1.  Dr. Vivek Chandra, Head IT vivekchandra123@gmail.com  Dr. Ashok Kumar Tiwari, EE (RAPDRP) ashokktiwari@gmail.com MPPKVVCL Jabalpur 1 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 2. S. No. Particulars 1 East Discom in MP as a typical Indian Power Distribution Utility & prevailing IT systems prior to R-APDRP. 2 Launch of R-APDRP & ERP in the Discom. 3 Network Architecture Post R-APDRP & ERP 4 Vulnerability of the new system and Potential Threats to Security. 5 Security Measures adopted at various levels. 6 Conclusion 2 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 3. 3 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 4.  MP East Discom was formed after the unbundling of erstwhile MP State Electricity Board in July’02. 4 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 5. The major applications deployed included:  Consumer Bill Generation System  Financial Accounting System  Stores Management System  Payroll System. 5 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 6. 6 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 7. S. No. Name of Application Architecture Office where deployed No. of locations. 1. Billing System (HT) Distributed RAO 6 Nos. 2. Billing System (LT) Distributed Circle/Dn 29 Nos. 3. Stores Management System Distributed Area Stores 5 Nos. 4. Financial Accounting System Distributed RAO 6 Nos. 5. Payroll System Distributed RAO 6 Nos. 7 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 8. 8 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 9.  Power Sector in the country suffers a loss of over 35% on account of AT&C losses.  To curtail these losses R-APDRP scheme was launched by GoI to reform Distribution Sector during XITH plan.  The scheme intends to cover urban areas i.e. towns and cities with population above 30,000 (10,000 in case of special category states). Projects under the scheme is in Two Parts.  Part-A covered IT applications in distribution sector  Part-B covered System improvement, strengthening and augmentation etc. 9 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 10. Establishment of IT Infrastructure for determination of baseline data of AT&C losses. Reduction of AT&C losses Focus on system reliability and customer satisfaction Achieve operational efficiency through IT enablement 10 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 11. 11 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 12.  Creation of Centralized Consumer Care Centre.  Setup of Data Centre at Jabalpur.  Setup of a Centralized Control Centre at Jabalpur.  Setup of Data Recovery Centre at Bhopal.  All offices located in select 27 towns connected through MPLS network . 12 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 13.  Considering the limited modules coverage under R- APDRP the Company decided to procure the same through ERP .    It was decided to implement the solution across all offices up the level of Distribution Centres.  The Project has been launched in 2011. R-APDRP ERP 1 Metering, Billing & Collection Procurement & Material Management 2 Maintenance Management Project Systems 3 Asset Management Human Resource Management 4 Email Solution Financial Accounting 13 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 14. Particulars R-APDRP ERP 1. Extent 27 towns having population above 30,000. All offices up to distribution Centres i.e 500+ locations. 2. Connectivity through MPLS Through MPLS Network only (Primary as well as secondary) Through MPLS Network 3. Connectivity Through Internet Not provisioned Yes, The VPN Users(Around 500 No. who have been provided the firewall authentication (VPN username and password) shall be able to access the entire MPLS network. Normal Internet users shall access the application through Reverse Proxy. 14 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 15. 3. Network Architecture Post R-APDRP & ERP 15 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 16. 16 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 17.  DMZ stands for "demilitarized zone“.  The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN).  An external attacker only has access to equipment in the DMZ, rather than any other part of the network.  A DMZ configuration typically provides security from external attacks. 17 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 18.  The VPN Users who have been provided the firewall authentication (VPN username and password) can access the entire MPLS network.  Normal Internet users shall access the application through Reverse Proxy. Reverse proxy fetches the information from internal network. These users shall require login and passwords of application. As per requirements only some forms/reports are exposed to internet. 18 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 19. 19 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 20. Proxy: A proxy takes requests from an internal network and forwards them to the Internet To keep machines behind it anonymous, mainly for Security. Reverse Proxy receives requests from the Internet and forwards them to servers in the internal network. This is for Security of Internal Network. 20 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 21. 21 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 22. 22 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 23. 23 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 24. 24 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 25. 25 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 26.  Creation of sizable amount of IT Infrastructure.  Built of great amount of data.  Convergence of GIS, AMR , SCADA and CCC networks to a single network.  Creation of numerous interface points between heterogeneous networks which could prove potential weak links.  Creation of a very large Intranet exposed to internet. 26 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 27. 27 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 28.  Introduction of malicious code such as viruses, Trojan horses, and worms.  Interception and tampering of data.  Denial of service attacks.  Web hacking.  SQL Injection.  Input Validation attacks. 28 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 29. 5. Security Measures adopted at various levels. 29 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 30. 30 Physical Security Fire & Smoke Redundant Power Supply Data Backup Closed Circuit Cameras Smoke Detectors Redundant Power Supply SAN Storage Permanent Security Guards Fire Extinguishers Backup power consists of power from two feeders, battery banks, and diesel generators Tape Library Use of Identity Access Cards Water Leakage Detectors To prevent single points of failure, all elements of the electrical systems, including backup systems, are typically fully duplicated. Replication of Data at SAN in Data Recovery Site. Use of Biometric Devices like Finger Print Recognition © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 31.  Network virtualization is a method of combining the available resources in a network by splitting up the available bandwidth into channels.  Each resource is independent from the other and each of which can be assigned (or reassigned) to a particular server or device in real time.  Each channel is independently secured.  Every subscriber has shared access to all the resources on the network from a single computer. 31 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 32.  Identity Access Management  Blocking use of CD Drives and Pen Drives  Anti-virus software is installed and enabled on all workstations.  Anti-virus definition are updated through Antivirus server at Data Centre rather than individual machine getting updated through internet. 32 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 33.  Role based Access Control.  Audit trail and Real time Monitoring Logs.  Administrator and operator logs.  Communication through Asymmetric/ symmetric key Cryptography  Role Based Access Control  Single Sign-on functionality 33 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 34.  Internet access is given to users who have legitimate need. Following kind of access can be provided to users to restrict misuse of internet:  Use of Web Filter for Filtration of undesired web content.  Throttling of bandwidth (to restrict the download speed)  Use of Spam Filter for blocking of junk mails. 34 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 35. 6. Conclusion. 35 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 36.  As technology advances, so does the associated threats and risks.  There is no panacea against all potential threats.  It is for the utility to identify the treats, prioritize them and identify the mitigation actions according to the risk involved and its affordability. 36 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur
  • 37. 37 © vivek chandra and ashok kumar tiwari MPPKVVCL Jabalpur