SlideShare a Scribd company logo
Improving Power Plant
Monitoring
An essential step in improving
power plant efficiency and
operational performance
Trends for Equipment Monitoring
For over a decade a wide range of equipment in
power plants have been connected to specialist
maintenance engineers at equipment suppliers by
the Internet and other communication networks.
Monitoring equipment located throughout the plant
is linked to the power plant’s operating systems -
continually monitoring the performance and status
of the equipment.
Extract from GE Brochure of
Power Plant Monitoring
When equipment starts to deviate from normal
and efficient operating parameters a warning will
be displayed in the power plant’s control room –
and in many cases an email or other alert
containing data is dispatched to the appropriate
maintenance staff [who may be working with the
equipment suppliers].
The maintenance engineers and equipment
suppliers could be based in different countries or
other global regions.
These alerts could prompt immediate action and
maintenance – which could avoid an unplanned
outage of the equipment [and possibly the while
plant].
These new systems have led to
improvements in plant operational efficiency
and performance – and should be considered
as an essential component of a clean coal
technology strategy.
Monitoring and IT Systems evolve
New and evolving networks and software can
allow far greater degrees of integration of:
• Plant databases,
• Real-time equipment operating performance
data,
• Enterprise social networks (including online
chats and/or voice mail on desktop and mobile
systems],
• As well as many other bespoke features (such
as specialist Apps).
An example of these new evolving systems is
Chatter – developed by the IT company
Salesforce.com
These interactive systems can allow significant
improvements in plant efficiency and operating
performance.
Chatter and other similar systems are being
rapidly adopted by many thousands of companies
each year.
But linking all these features via the Internet also
creates a new potential threat for power plant and
grid system operators – Cyber Security.
Cyber Security
A key issue for all power
plants and grid systems
Hackers at work?
Hackers can be based in
any country. They can
have several goals –
such as causing
malicious damage to
computer systems or they
attempt to steal valuable
intellectual property [IP].
Are your plant and
networks vulnerable to
a cyber attack?
A computer virus attacked a turbine control
system at a US power company when a
technician unknowingly inserted an infected USB
computer drive into the network, keeping a plant
off-line for three weeks, according to a report
posted on a US government website.
The [US] Department of Homeland Security
[DHS] report did not identify the plant but said
criminal software, which is used to conduct
financial crimes such as identity theft, was behind
the incident.
It was introduced by an employee of a third-
party contractor that does business with the
utility, according to the agency.
October 2012 US Power
Plant Incident
The DHS reported the incident on its
website, which occurred in October 2012 - along
with a second incident which involved a more
sophisticated virus.
This report was released to coincide with a high-
profile cyber crime conference held in Miami [S4]
to review emerging threats against power
plants, water utilities and critical infrastructure.
In addition to not identifying the plants, the DHS
declined to say where they are located.
The report did not say who the DHS believed
was behind the sophisticated virus or if it was
capable of sabotage.
The DHS uses the term "sophisticated" to
describe a wide variety of malicious software
that is designed to do things besides commit
routine cyber-crimes. They include viruses
capable of espionage and sabotage.
It is worth noting that the infamous Stuxnet virus
was delivered to its target in Iran via a USB drive.
Attackers use that technique to place malicious
software on computer systems that are "air
gapped" or cut off from the public Internet.
Antiquated Software
and Aging Systems
Recent surveys have also highlighted the fact
that many critical infrastructure control systems
run on Windows XP and Windows 2000 -
operating systems that were designed more than
a decade ago.
Some Internet-linked equipment still has no
cyber protection at all.
Many systems still have "auto run" features –
which are enabled by default. This makes them
an easy target for infection - because malicious
software loads as soon as a USB is plugged into
the system unless operators have changed that
setting.
Shodan
The search engine Shodan [Sentient Hyper-
Optimized Data Access Network] has been
developed to identify a huge range of devises
linked to the web and their vulnerability
See: http://www.shodanhq.com/
US To Take More Action
Press Release from:
[US] Federal Energy Regulatory Commission
https://www.ferc.gov/
FERC Proposes to Adopt New Cyber Security
Standards
18th April 2013
The Federal Energy Regulatory Commission
(FERC) moved to strengthen the cyber
security of the bulk electric system today with
a proposed rule that would extend the scope
of the systems that are protected by cyber
security standards.
The proposal, submitted in January 2013 by the
North American Electric Reliability Corporation
(NERC), constitutes version 5 of the Critical
Infrastructure Protection Reliability Standards, or
CIP standards. The proposal is intended to
improve the security posture of responsible
entities and represents an improvement in the
CIP standards.
The proposal includes 12 requirements with
new cyber security controls that address
Electronic Security Perimeters, Systems Security
Management, Incident Reporting and Response
Planning, Recovery Plans for BES Cyber
Systems, and Configuration Change
Management and Vulnerability Assessments.
It also would use a new, tiered approach to
identifying and classifying bulk electric system
cyber assets that is a step toward applying CIP
protections more comprehensively to better
assure protection of the bulk electric system.
The Commission is seeking comment on certain
language in the proposed CIP version 5
Standards to alleviate concerns regarding the
potential ambiguity and, ultimately, enforceability
of the proposed Standards.
NERC is the FERC-certified Electric Reliability
Organization for the bulk electric system.
Comments on the proposed rule are due 60 days
after publication in the Federal Register.
Are your power plants and
networks safe?

More Related Content

PDF
Utilization of Encryption for Security in SCADA Networks
PDF
Viewfinity Application Control and Monitoring 2015
PDF
Medical Device Cybersecurity : A Regulatory Perspective
PPTX
IoT Threat Intel - Steppa
PDF
Critical Infrastructure Protection against targeted attacks on cyber-physical...
PDF
New technologies security threats (Brussels 2014)
PDF
World best web apps security and Active detection of malicious link
PPTX
CYBER THREAT ASSESSMENT
Utilization of Encryption for Security in SCADA Networks
Viewfinity Application Control and Monitoring 2015
Medical Device Cybersecurity : A Regulatory Perspective
IoT Threat Intel - Steppa
Critical Infrastructure Protection against targeted attacks on cyber-physical...
New technologies security threats (Brussels 2014)
World best web apps security and Active detection of malicious link
CYBER THREAT ASSESSMENT

What's hot (20)

PDF
Application security Best Practices Framework
DOCX
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
PPT
Managing System Security
PDF
Wireless security trends
PPTX
20170112 Working Group Assessment Mandate Presentation DRAFT V1[2]
PPTX
Securing Industrial Control Systems
PPTX
Security Issues in SCADA based Industrial Control Systems
PPT
386sum08ch8
PPT
Securing information systems
PDF
Analytics for Smart Grid Cyber security
PDF
IRJET-Managing Security of Systems by Data Collection
PDF
Healthcare_Security_White_Paper
PDF
YUDU - Managing a Breach (LDSC Cyber Themed Evening)
PPTX
Back to the Office: Privacy and Security Solutions to Compliance Issues for 2...
PPTX
Presentation1 160729072733
PDF
Indexing Building Evaluation Criteria
PPTX
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
PPTX
Security and Control Issues in Information System
PPT
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
PPTX
SeaCat: and SDN End-to-end Application Containment ArchitecTure
Application security Best Practices Framework
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
Managing System Security
Wireless security trends
20170112 Working Group Assessment Mandate Presentation DRAFT V1[2]
Securing Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
386sum08ch8
Securing information systems
Analytics for Smart Grid Cyber security
IRJET-Managing Security of Systems by Data Collection
Healthcare_Security_White_Paper
YUDU - Managing a Breach (LDSC Cyber Themed Evening)
Back to the Office: Privacy and Security Solutions to Compliance Issues for 2...
Presentation1 160729072733
Indexing Building Evaluation Criteria
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
Security and Control Issues in Information System
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
SeaCat: and SDN End-to-end Application Containment ArchitecTure
Ad

Viewers also liked (20)

PDF
Zigbee based parameter monitoring and controlling system for induction machine
DOCX
Power plant parameters monitoring & controlling using x beezig bee
PDF
Bi directional speed control of dc motor and stepper motor through mat lab us...
PDF
Nokia_Sub-station_Automation_White_Paper_EN
PPTX
Presentation on electrical and automation system of cgl plant (CRM-2) JSW KR.
PPT
Voltage & frequency monitoring through lcd
PDF
Power Plant Performance Monitoring and Trend Analysis
PPTX
Substation monitoring1
PDF
Using Kittiwake Oil Test Center in Oil Analysis Laboratory
DOCX
BHELreport
PDF
Automation- Metering, Sub Station & Industrial Automation
PPTX
Power system automation
DOC
SCADA PROJECTS ABSTRACT-Scada for power station substation monitoring and aut...
PPT
Stepper motor
PPTX
Stepper motor
PPT
slide on stepper motor
PPT
Steper Motor Control Through Wireless
PPT
AUTOMATIC IRRIGATION SYSTEM USING ARDUINO UNO
DOCX
automatic plant irrigation using aurdino and gsm technology
PPTX
Stepper motor control
Zigbee based parameter monitoring and controlling system for induction machine
Power plant parameters monitoring & controlling using x beezig bee
Bi directional speed control of dc motor and stepper motor through mat lab us...
Nokia_Sub-station_Automation_White_Paper_EN
Presentation on electrical and automation system of cgl plant (CRM-2) JSW KR.
Voltage & frequency monitoring through lcd
Power Plant Performance Monitoring and Trend Analysis
Substation monitoring1
Using Kittiwake Oil Test Center in Oil Analysis Laboratory
BHELreport
Automation- Metering, Sub Station & Industrial Automation
Power system automation
SCADA PROJECTS ABSTRACT-Scada for power station substation monitoring and aut...
Stepper motor
Stepper motor
slide on stepper motor
Steper Motor Control Through Wireless
AUTOMATIC IRRIGATION SYSTEM USING ARDUINO UNO
automatic plant irrigation using aurdino and gsm technology
Stepper motor control
Ad

Similar to Power station monitoring and cyber security (20)

PDF
David Blanco ISHM 8280-2016
PDF
Industrial Control Security USA Sacramento California Oct 13/14
PDF
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
PDF
Need for Improved Critical Industrial Infrastructure Protection
PDF
Industrial Control Systems Security and Resiliency Practice and Theory Craig ...
PPTX
Defending against industrial malware
PDF
Standards based security for energy utilities
PDF
Digital danger zone tackling cyber security
PDF
Digital danger zone tackling cyber security
PDF
Cyber security white paper final PMD 12_28_16
PDF
SCADA White Paper March2012
PDF
Industrial Control Systems Security and Resiliency Practice and Theory Craig ...
PDF
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
PDF
115.pdf
DOCX
The efficacy and challenges of scada and smart grid integration
PDF
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
PDF
Cyber-Defensive Architecture for Networked Industrial Control Systems
PDF
Cyber security regulation strictly regulated by nrc feb 2013
PDF
Conférence ENGIE ACSS 2018
David Blanco ISHM 8280-2016
Industrial Control Security USA Sacramento California Oct 13/14
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Need for Improved Critical Industrial Infrastructure Protection
Industrial Control Systems Security and Resiliency Practice and Theory Craig ...
Defending against industrial malware
Standards based security for energy utilities
Digital danger zone tackling cyber security
Digital danger zone tackling cyber security
Cyber security white paper final PMD 12_28_16
SCADA White Paper March2012
Industrial Control Systems Security and Resiliency Practice and Theory Craig ...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
115.pdf
The efficacy and challenges of scada and smart grid integration
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber security regulation strictly regulated by nrc feb 2013
Conférence ENGIE ACSS 2018

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Understanding_Digital_Forensics_Presentation.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
20250228 LYD VKU AI Blended-Learning.pptx

Power station monitoring and cyber security

  • 1. Improving Power Plant Monitoring An essential step in improving power plant efficiency and operational performance
  • 2. Trends for Equipment Monitoring For over a decade a wide range of equipment in power plants have been connected to specialist maintenance engineers at equipment suppliers by the Internet and other communication networks. Monitoring equipment located throughout the plant is linked to the power plant’s operating systems - continually monitoring the performance and status of the equipment.
  • 3. Extract from GE Brochure of Power Plant Monitoring When equipment starts to deviate from normal and efficient operating parameters a warning will be displayed in the power plant’s control room – and in many cases an email or other alert containing data is dispatched to the appropriate maintenance staff [who may be working with the equipment suppliers]. The maintenance engineers and equipment suppliers could be based in different countries or other global regions.
  • 4. These alerts could prompt immediate action and maintenance – which could avoid an unplanned outage of the equipment [and possibly the while plant]. These new systems have led to improvements in plant operational efficiency and performance – and should be considered as an essential component of a clean coal technology strategy.
  • 5. Monitoring and IT Systems evolve New and evolving networks and software can allow far greater degrees of integration of: • Plant databases, • Real-time equipment operating performance data, • Enterprise social networks (including online chats and/or voice mail on desktop and mobile systems], • As well as many other bespoke features (such as specialist Apps).
  • 6. An example of these new evolving systems is Chatter – developed by the IT company Salesforce.com These interactive systems can allow significant improvements in plant efficiency and operating performance. Chatter and other similar systems are being rapidly adopted by many thousands of companies each year. But linking all these features via the Internet also creates a new potential threat for power plant and grid system operators – Cyber Security.
  • 7. Cyber Security A key issue for all power plants and grid systems
  • 8. Hackers at work? Hackers can be based in any country. They can have several goals – such as causing malicious damage to computer systems or they attempt to steal valuable intellectual property [IP]. Are your plant and networks vulnerable to a cyber attack?
  • 9. A computer virus attacked a turbine control system at a US power company when a technician unknowingly inserted an infected USB computer drive into the network, keeping a plant off-line for three weeks, according to a report posted on a US government website. The [US] Department of Homeland Security [DHS] report did not identify the plant but said criminal software, which is used to conduct financial crimes such as identity theft, was behind the incident. It was introduced by an employee of a third- party contractor that does business with the utility, according to the agency. October 2012 US Power Plant Incident
  • 10. The DHS reported the incident on its website, which occurred in October 2012 - along with a second incident which involved a more sophisticated virus. This report was released to coincide with a high- profile cyber crime conference held in Miami [S4] to review emerging threats against power plants, water utilities and critical infrastructure. In addition to not identifying the plants, the DHS declined to say where they are located. The report did not say who the DHS believed was behind the sophisticated virus or if it was capable of sabotage. The DHS uses the term "sophisticated" to describe a wide variety of malicious software that is designed to do things besides commit routine cyber-crimes. They include viruses capable of espionage and sabotage.
  • 11. It is worth noting that the infamous Stuxnet virus was delivered to its target in Iran via a USB drive. Attackers use that technique to place malicious software on computer systems that are "air gapped" or cut off from the public Internet.
  • 12. Antiquated Software and Aging Systems Recent surveys have also highlighted the fact that many critical infrastructure control systems run on Windows XP and Windows 2000 - operating systems that were designed more than a decade ago. Some Internet-linked equipment still has no cyber protection at all. Many systems still have "auto run" features – which are enabled by default. This makes them an easy target for infection - because malicious software loads as soon as a USB is plugged into the system unless operators have changed that setting.
  • 13. Shodan The search engine Shodan [Sentient Hyper- Optimized Data Access Network] has been developed to identify a huge range of devises linked to the web and their vulnerability See: http://www.shodanhq.com/
  • 14. US To Take More Action Press Release from: [US] Federal Energy Regulatory Commission https://www.ferc.gov/ FERC Proposes to Adopt New Cyber Security Standards 18th April 2013 The Federal Energy Regulatory Commission (FERC) moved to strengthen the cyber security of the bulk electric system today with a proposed rule that would extend the scope of the systems that are protected by cyber security standards. The proposal, submitted in January 2013 by the North American Electric Reliability Corporation (NERC), constitutes version 5 of the Critical Infrastructure Protection Reliability Standards, or CIP standards. The proposal is intended to improve the security posture of responsible entities and represents an improvement in the CIP standards.
  • 15. The proposal includes 12 requirements with new cyber security controls that address Electronic Security Perimeters, Systems Security Management, Incident Reporting and Response Planning, Recovery Plans for BES Cyber Systems, and Configuration Change Management and Vulnerability Assessments. It also would use a new, tiered approach to identifying and classifying bulk electric system cyber assets that is a step toward applying CIP protections more comprehensively to better assure protection of the bulk electric system. The Commission is seeking comment on certain language in the proposed CIP version 5 Standards to alleviate concerns regarding the potential ambiguity and, ultimately, enforceability of the proposed Standards. NERC is the FERC-certified Electric Reliability Organization for the bulk electric system. Comments on the proposed rule are due 60 days after publication in the Federal Register.
  • 16. Are your power plants and networks safe?