Security for Substation Communications

Until recently the term “security,” when applied to SCADA communication systems, meant only the process of ensuring message integrity in the face of electrical noise and other disturbances to the communications. But, in fact, “security” also has a much broader meaning. Security, in the broader sense, is concerned with anything that threatens to interfere with the integrity of the business.

Our focus here will be to examine issues related more narrowly to SCADA security. In an earlier section we discussed the role of the OSI reference model (ISO 7498-1) in defining acommunications architecture. In similar fashion, ISO 7498-2, Information Processing Systems, Open Systems Interconnection, Basic Reference Model – Part 2: Security Architecture, issued in 1989, provides a general description of security services and related mechanisms that fit into the reference model, and it defines the positions within the reference model where they can be provided.

It also provides useful standard definitions for security terms.

For full article go to: http://electrical-engineering-portal.com/

 

Comments { 0 }

5 steps to secure mobile data

Mobile and wireless technology is revolutionizing how businesses use and profit from information. Employees outfitted with mobile devices, such as laptops and PDAs, can access valuable enterprise information when they’re away from the office, which improves productivity, streamlines operations, and creates new revenue sources. But security is lacking.

While mobility is a competitive advantage, it means your data can travel beyond your secure LAN firewall and over public networks. Your security strategy needs to address the managing and securing of pervasive mobile data from end to end: whether it’s stored on a mobile device, traveling over a wired or wireless network, or being sent back to the enterprise.

For full article go to: http://www.zdnet.com Read More…

Comments { 0 }