• Title/Summary/Keyword: 산업제어시스템 보안요구사항

Search Result 16, Processing Time 0.027 seconds

A Study on Application Method of Crypto-module for Industrial Control System (산업제어시스템(ICS) 암호모듈 적용방안 연구)

  • Seok, Byoungjin;Kim, Yeog;Lee, Changhoon
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.1001-1008
    • /
    • 2017
  • Because cyber attacks on industrial control systems can lead to massive financial loss or loss of lives, the standardization and the research on cyber security of industrial control systems are actively under way. As a related system, the industrial control system of social infrastructures must be equipped with the verified cryptographic module according to the e-government law and appropriate security control should be implemented in accordance with the security requirements of the industrial control system. However, the industrial control system consisting of the operation layer, the control layer, and the field device layer may cause a problem in performing the main function in each layer due to the security control implementation. In this paper, we propose things to check when performing security control in accordance with the security control requirements for each layer of the industrial control system and proper application.

A Study on Cyber Security Threat and Security Requirements for Industrial Wireless Communication Devices (산업용 무선통신기기 사이버 보안위협 및 보안요구사항에 관한 연구)

  • Lee, Jiseop;Park, Kyungmi;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.757-770
    • /
    • 2020
  • Industrial Control System(ICS) is a system that measures, monitors, and controls various distributed assets, and is used in industrial facilities such as energy, chemical, transportation, water treatment, and manufacturing plants or critial infrastructure. Because ICS system errors and interruptions can cause serious problem and asset damage, research on prevention and minimization of security threats in industrial control systems has been carried out. Previously wireless communication was applied in limited fields to minimize security risks, but the demand for industrial wireless communication devices is increasing due to ease of maintenance and cost advantages. In this paper, we analyzed the security threats of industrial wireless communication devices supporting WirelessHART and ISA100.11a. Based on the analysis results, we proposed the security requirements for adopting and operating industrial wireless communication devices. We expect that the proposed requirements can mitigate security threats of industrial wireless devices in ICS.

산업제어시스템에서의 SSL VPN 가용성 분석 연구

  • Wi, Hansaem;Lee, Jaehoon;Jang, Chankuk;Yi, Okyeon
    • Review of KIISC
    • /
    • v.29 no.2
    • /
    • pp.23-28
    • /
    • 2019
  • 산업제어시스템은 물리적인 현장장치의 상태를 기반으로 시스템과 시스템 내부의 프로세스들을 제어, 유지하는 CPS(Cyber Physica System)으로 볼 수 있다. 하지만 IT 시스템의 유입과 더불어 IT 시스템이 보유하고 있는 보안위협 또한 상속되었고 그에 따라 IT 시스템에서 사용하는 보안 대응책을 산업제어시스템에도 적용해야 한다. 본 논문에서는 산업제어시스템과 유사한 CPS인 교통신호제어시스템의 표준규격서에 통신보안으로 규격화 되어있는 SSL VPN을 산업제어시스템에 적용할 때 만족하는 보안요구사항을 살펴보고, 더불어 산업제어시스템에서의 보안 적용 시 반드시 고려해야 하는 가용성과 관련한 성능측정 결과를 보이고 결과분석을 수행한다.

산업제어시스템 보안성 평가.인증 동향 분석

  • Son, Kyung Ho
    • Review of KIISC
    • /
    • v.24 no.5
    • /
    • pp.15-25
    • /
    • 2014
  • 본 논문에서는 전력, 가스, 수도, 교통 시스템 등의 국가주요기반시설 및 산업분야에 널리 사용되는 산업제어시스템(ICS;Industrial Control System)에 대한 보안표준 및 보안요구사항을 살펴보고, 이를 충분히 만족하고 정확하게 구현되었음을 시험 평가를 통해 인증하는 평가 인증 체계에 대해 살펴본다. 특히 미국을 중심으로 활발히 진행 중인 ISASecure(R)EDSA 인증 프로그램에 대해 상세히 분석하고, 국내에 이를 적용하기 위한 방안에 대해 제안하고자 한다.

A study on Communication Robustness Testing for Industrial Control Devices (산업용 제어기기의 통신 견고성 시험 방안 연구)

  • Park, Kyungmi;Shin, Donghoon;Kim, WooNyon;Kim, SinKyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1099-1116
    • /
    • 2019
  • Industrial control systems(ICS) are widely used in various industrial area and critical infrastructure. To mitigate security threats on ICS, the security assurance test for industrial control devices has been introduced and operating. The test includes testing of the security function of the device itself and testing of communication robustness. In this paper, we describe the security requirements of EDSA, Achilles, and Korea's TTA standard(security requirements for ICS). And also, we analyzed the characteristics of communication robustness test(CRT) of each certification. CRT verifies the device's operation of essential function while transmitting fuzzing and stress packets. Existing test methods are mostly focused on the embedded devices and are difficult to apply to various devices. We propose a method to test communication robustness which reflect the characteristics of control H/W, control S/W, field devices and network devices in ICS. In the future, we will apply the proposed communication robustness test to actual products and present solutions for arising issues.

development plan of nuclear cyber security system (원전 사이버보안 체계 개발 방안에 대한 연구)

  • Han, Kyung-Soo;Lee, Gang-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.471-478
    • /
    • 2013
  • Industrial control system was designed mainly in the form of analog in early days. However, necessity of digital system engineering is increasing recently because systems become complicated. Consequently, stability of digital systems is improved so most industrial control systems are designed with digital. Because Using digital design of Industrial control system is expanded, various threatening possibilities such as penetration or destruction of systems are increasing enormously. Domestic and overseas researchers accordingly make a multilateral effort into risk analysis and preparing countermeasures. In this paper, this report chooses common security requirement in industrial control system and nuclear control system through relevant guidelines analysis. In addition, this report suggests the development plan of nuclear cyber security system which will be an essential ingredient of planning approvals.

Cyber Security Considerations for the NPP Digital I&C (원전 디지털 계측제어계통 사이버보안 방안 고찰)

  • Choi, Yoo-Rark;Lee, Jae-Cheol;Choi, Young-Soo;Hong, Seok-Boong
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.531-536
    • /
    • 2009
  • 원전 디지털 계측제어계통 통신망에서는 일반 산업체의 사이버보안과는 달리 안전성과 가용성, 그리고 경성실시간 조건을 매우 중시하면서도 일반 IT 분야에서 사용하고 있는 사이버보안 기술의 대부분을 수용할 것을 요구받고 있다. 사이버보안 활동은 원전 디지털 계측제어계통 통신망에서 요구하는 통신망의 성능 조건을 저해하지 않아야만 하는데, 이러한 요구 조건들은 서로 상충되는 측면들이 있다. 원전 디지털 계측제어계통 사이버보안을 위한 보안기술들이 계측제어시스템 및 이와 관련된 통신망에 적용될수록 이들의 성능은 저하될 수밖에 없기 때문이다. 사이버보안에 대한 위협이 일반 산업계는 물론 국가 핵심 기반 시설까지 확대되고 있는 현실에서 안전성이 가장 우선시되는 원전의 핵심 제어계통인 원전 디지털 계측제어계통에 대한 사이버보안 활동은 매우 주요하다. 본 논문에서는 원전 디지털 계측제어계통 사이버보안에 활동 수행에 필요한 고려사항들에 대하여 기술한다.

  • PDF

A Study on the Security Enhancement of the Industrial Control System through the Application of IEC 62443 Standards (IEC 62443 표준 적용을 통한 산업제어시스템 보안성 강화 연구)

  • Jin, Jungha;Kim, Juntae;Park, SangSeon;Han, Keunhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.280-283
    • /
    • 2021
  • SME(small and medium sized enterprise) 환경의 스마트공장 환경에서는 실제 제조라인에서 동작하는 센서(Sensor) 및 액추에이터(Actuator)와 이를 관리하는 PLC(Programmable Logic Controller), 더불어 그러한 PLC를 제어 및 관리하는 HMI(Human-Machine Interface), 그리고 다시 PLC와 HMI를 관리하는 OT(Operational Technology)서버로 구성되어 있으며, 제어자동화를 담당하는 PLC 및 HMI는 공장운영을 위한 응용시스템인 OT서버 및 현장 자동화를 위한 로봇, 생산설비와의 직접적인 연결을 수행하고 있어서 스마트공장 환경에서 보안 기술의 개발이 중점적으로 필요한 영역이다. 이러한 SME 환경의 스마트공장 보안 내재화를 이루기 위해서는, 스마트공장 SW 및 HW 개발 단계에서 IEC 62443-4-1 Secure Product Development Lifecycle에 따른 프로세스 정립 및 IEC 62443-4-2 Component 보안 요구사항과 IEC 62443-3-3 System 보안 요구사항에 적합한 개발 방법론의 도입이 필요하다.

Traffic Analysis Architecture for Secure Industrial Control System (안전한 제어시스템 환경을 위한 트래픽 분석망 설계)

  • Lee, Eun-Ji;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1223-1234
    • /
    • 2016
  • The Industrial control system is adopted by various industry field and national infrastructure, therefore if it received cyber attack, the serious security problems can be occured in the public sector. For this reason, security requirements of the industrial control system have been proposed, in accordance with the security guidelines of the electronic control system, and it is operated by separate from the external and the internal network. Nevertheless, cyber attack by malware (such as Stuxnet) targeting to control system have been occurred continuously, and also the real-time detection of untrusted traffic is very difficult because there are some difficulty of keeping up with quickly evolving the advent of new-variant malicious codes. In this paper, we propose the traffic analysis architecture for providing secure industrial control system based on the analyzed the security threats, the security requirements, and our proposed architecture.