Abstract

The article provides an overview of several typical problems of information security of critical infrastructure objects. The story is based on several real examples from the practice of setting up, operating and maintaining process automation systems in the electric power industry and the experience of designing, developing and implementing information security systems for technological segments of enterprises in different countries. The examples are described from a technical point of view with regard to the standards and methods used in the industry. Behind each of the examples given in the article is a real story of adjustment, implementation or study of an anomalous situation by the authors of the article. According to the authors, the imposed information security tools in production can, if used skillfully, help in detecting, and in some cases compensating for the shortcomings of control systems.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.