Abstract

The article provides an overview of several typical problems of information security of critical infrastructure objects. The story is based on several real examples from the practice of setting up, operating and maintaining process automation systems in the electric power industry and the experience of designing, developing and implementing information security systems for technological segments of enterprises in different countries. The examples are described from a technical point of view with regard to the standards and methods used in the industry. Behind each of the examples given in the article is a real story of adjustment, implementation or study of an anomalous situation by the authors of the article. According to the authors, the imposed information security tools in production can, if used skillfully, help in detecting, and in some cases compensating for the shortcomings of control systems.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call