GarrettCom Ethernet Networks and Web Management Switch User Manual


 
1
INTRODUCTION
This paper explores the state of network security options today at the Ethernet switch level and offers
an elementary roadmap for industrial operations to plan for and deploy secure communications
systems. Industrial systems need to take advantage of the advanced networking technologies that can
support greater efficiency, reliability, and security in plant and remote operations. As SCADA
systems, relays, and other industrial control, monitoring and management systems become more
intelligent, a rich supply of data is available for improving plant performance and remote maintenance
and management. However, as with all technology advances, there are challenges as well as
opportunities.
SECURITY OVERVIEW
In today’s uncertain world, security stands beside profitability, productivity, performance and control
as a key element for maintaining business activities in industrial facilities. Prevention of malicious
attacks against business infrastructure has become as vital to ongoing success as has the widespread
use of the computer systems which make such attacks so easy and so painful. It is no longer enough to
catch the perpetrator during or after the commission of a malicious act; considerable time and expense
is being consumed to address how to secure systems to prevent intrusion.
Repercussions from the 2003 power blackout in the Northeastern US were felt throughout the country.
Attacks such as the Zobot worm and Mytob bot software effectively shut down well protected
computers at CNN, the New York Times and many other places. Imagine how much worse a
concentrated and widespread act of industrial sabotage might be.
Until just recently, SCADA (Supervisory Control And Data Acquisition) environments were not
considered at risk for cyber attack because of the highly customized nature of these systems. In March
2002, articles were still being written that debunked the concern for more security of utility service
providers. Yet this viewpoint is compromised by documented cyber-related incidents, such as the
Slammer Worm infiltration of an Ohio Nuclear power plant, and the wireless attack on a sewage-
SCADA system in Queensland Australia.