Fig. 1. Structure diagram of DCS system
Fig. 2. Overview of the nuclear control system[9]
Fig. 3. Overview of industrial control system in electric power field
Fig. 4. Correlation of RTU and power system
Fig. 5. Mock correlation of RTU and power system
Table 1. Security standard from major infrastructure in the US[5]
Table 2. Examples of industrial control system infringement and corresponding threat agents and alternatives
Table 3. The properties and risks of major infrastructure
Table 4. Risk management for major infrastructure
Table 5. Matrix of risks for major infrastructure[12]
Table 6. Quantificational results for risks of major infrastructure[12]
Table 7. Quantificational results for weakness of major infrastructure[12]
Table 8. Calculation for interruption cost of power system[15]
Table 9. Results of risk estimation considering risk and weakness[12]
References
- HelloT. (2010). Control system publication and security issues. HelloT(Online). http://magazine.hellot.net/magz/article/articleDetail.do?flag=all&showType=showType1&articleId=ARTI_000000000035281&articleAllListSortType=sort_1&page=1&selectYearMonth=201009&subCtgId
- G. N. Ericsson. (2010). Cyber security and power system communication-essential parts of a smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3), 1501-1507. https://doi.org/10.1109/TPWRD.2010.2046654
- T. H. Woo. (2013). Systems thinking safety analysis: nuclear security assessment of physical protection system in nuclear power plants. Science and Technology of Nuclear Installations, 2013.
- Y. Zhang, L. Wang, Y. Xiang & C. W. Ten. (2015). Power system reliability evaluation with SCADA cybersecurity considerations. IEEE Transactions on Smart Grid, 6(4), 1707-1721. https://doi.org/10.1109/TSG.2015.2396994
- ICS-CERT. Assessments. CEST Cyber Security Evalutaion Tool. https://ics-certus-cert.gov/Assessments
- ICS-CERT. Downloading and Installing CSET. CEST Cyber Security Evalutaion Tool. https://ics-cert.us-cert.gov/Downloading-and-Installing-CSET.
- WIKIPEDIA. SCADA. https://en.wikipedia.org/wiki/SCADA
- NCS. (2004). Supervisory Control and Data Acquisition (SCADA) Systems.
- C. K. Lee. (2004). Design of an Integrated I&C System Daejeon : KAERI.
- Y. R. Choi. (2009). Development of IT-based Cyber Security Technology for Nuclear Power Plant. Daejeon: KAERI.
- Y. J. Kim, J. H. Lee & J. I. Lim. (2009). A Study on the Secure Plan of Security in SCADA Systems. Journal of the Korea Institute of Information Security & Cryptology, 19(6), 145-152.
- D. J. Kang, J. J. Lee, Y. Lee, I. S. Lee & H. K. Kim. (2013). Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry. Journal of the Korea Institute of Information Security & Cryptology, 23(3), 445-457. https://doi.org/10.13089/JKIISC.2013.23.3.445
- H. Kim. (2009). Analysis of Overseas System based Evaluation Cases and Technology. Naju: KISA.
- M. Negrete-Pincetic, F. Yoshida & G. Gross. (2009, July). Towards quantifying the impacts of cyber attacks in the competitive electricity market environment. In IEEE Power Tech Conference (pp. 1332-1336).
- Korea Electrotechnology Research Institute. (2008). A Study to investigate Industrial Customer Interruption Cost for Power System Planning. Seoul : Korea Electrotechnology Research Institute.