ImageVerifierCode 换一换
格式:PDF , 页数:50 ,大小:1,022KB ,
资源ID:1238043      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1238043.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(IEC TR 62210-2003 Power system control and associated communications - Data and communication security《动力系统控制和相关通信.数据和通信安全》.pdf)为本站会员(tireattitude366)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

IEC TR 62210-2003 Power system control and associated communications - Data and communication security《动力系统控制和相关通信.数据和通信安全》.pdf

1、TECHNICAL REPORT IECTR 62210 First edition 2003-05 Power system control and associated communications Data and communication security Reference number IEC/TR 62210:2003(E)Publication numbering As from 1 January 1997 all IEC publications are issued with a designation in the 60000 series. For example,

2、 IEC 34-1 is now referred to as IEC 60034-1. Consolidated editions The IEC is now publishing consolidated versions of its publications. For example, edition numbers 1.0, 1.1 and 1.2 refer, respectively, to the base publication, the base publication incorporating amendment 1 and the base publication

3、incorporating amendments 1 and 2. Further information on IEC publications The technical content of IEC publications is kept under constant review by the IEC, thus ensuring that the content reflects current technology. Information relating to this publication, including its validity, is available in

4、the IEC Catalogue of publications (see below) in addition to new editions, amendments and corrigenda. Information on the subjects under consideration and work in progress undertaken by the technical committee which has prepared this publication, as well as the list of publications issued, is also av

5、ailable from the following: IEC Web Site (www.iec.ch) Catalogue of IEC publications The on-line catalogue on the IEC web site (http:/www.iec.ch/searchpub/cur_fut.htm) enables you to search by a variety of criteria including text searches, technical committees and date of publication. On-line informa

6、tion is also available on recently issued publications, withdrawn and replaced publications, as well as corrigenda. IEC Just Published This summary of recently issued publications (http:/www.iec.ch/online_news/ justpub/jp_entry.htm) is also available by email. Please contact the Customer Service Cen

7、tre (see below) for further information. Customer Service Centre If you have any questions regarding this publication or need further assistance, please contact the Customer Service Centre: Email: custserviec.ch Tel: +41 22 919 02 11 Fax: +41 22 919 03 00TECHNICAL REPORT IEC TR 62210 First edition 2

8、003-05 Power system control and associated communications Data and communication security PRICE CODE IEC 2003 Copyright - all rights reserved No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without

9、 permission in writing from the publisher. International Electrotechnical Commission, 3, rue de Varemb, PO Box 131, CH-1211 Geneva 20, Switzerland Telephone: +41 22 919 02 11 Telefax: +41 22 919 03 00 E-mail: inmailiec.ch Web: www.iec.ch X For price, see current catalogue Commission Electrotechnique

10、 Internationale International Electrotechnical Commission 2 TR 62210 IEC:2003(E) CONTENTS FOREWORD 4 1 Scope and object. 5 2 Overview . 5 3 Reference documents 6 4 Terms, definitions and abbreviations 6 4.1 Terms and definitions . 6 4.2 Abbreviations.10 5 Introduction to security11 5.1 How to use th

11、is report11 6 The security analysis process .12 6.1 Network topologies 14 6.2 User consequence based analysis.16 6.2.1 Stakeholders16 6.3 Consequences to be considered18 6.3.1 Financial18 6.3.2 Asset destruction/degradation19 6.3.3 Inability to restore service20 6.4 Consequences and security threats

12、 .20 7 Focus of security work within this report .22 7.1 Justification of application level security focus.22 7.2 Security analysis technique .23 7.2.1 Security objectives.23 7.2.2 General threats24 7.2.3 Specific threats to be considered in PP24 8 Vulnerabilities.27 8.1 Threats to topologies .27 8.

13、2 Current IEC Technical Committee 57 protocols29 8.2.1 TASE.1 29 8.2.2 TASE.2 30 8.2.3 IEC 60870-5 30 8.2.4 IEC 6133430 8.2.5 IEC 6185031 9 Recommendations for future IEC Technical Committee 57 security work 32 Annex A (informative) What is a protection profile? 35 Annex B (informative) Protection p

14、rofile for TASE.2 .37 Annex C (Informative) Example of consequence diagrams .43 Figure 1 Normal corporate security process .12 Figure 2 Business information flow.14 Figure 3 General communication topology16 Figure 4 Consequence diagram: inability to restore service21TR 62210 IEC:2003(E) 3 Figure 5 W

15、AN/LAN topology.27 Figure 6 Levels of vulnerability.28 Table 1 Matrix to determine business process importance17 Table 2 Asset to business process relationships 20 Table 3 Communication model security matrix22 4 TR 62210 IEC:2003(E) INTERNATIONAL ELECTROTECHNICAL COMMISSION _ POWER SYSTEM CONTROL AN

16、D ASSOCIATED COMMUNICATIONS Data and communication security FOREWORD 1) The IEC (International Electrotechnical Commission) is a worldwide organization for standardization comprising all national electrotechnical committees (IEC National Committees). The object of the IEC is to promote international

17、 co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and in addition to other activities, the IEC publishes International Standards. Their preparation is entrusted to technical committees; any IEC National Committee interested in the subject

18、dealt with may participate in this preparatory work. International, governmental and non-governmental organizations liaising with the IEC also participate in this preparation. The IEC collaborates closely with the International Organization for Standardization (ISO) in accordance with conditions det

19、ermined by agreement between the two organizations. 2) The formal decisions or agreements of the IEC on technical matters express, as nearly as possible, an international consensus of opinion on the relevant subjects since each technical committee has representation from all interested National Comm

20、ittees. 3) The documents produced have the form of recommendations for international use and are published in the form of standards, technical specifications, technical reports or guides and they are accepted by the National Committees in that sense. 4) In order to promote international unification,

21、 IEC National Committees undertake to apply IEC International Standards transparently to the maximum extent possible in their national and regional standards. Any divergence between the IEC Standard and the corresponding national or regional standard shall be clearly indicated in the latter. 5) The

22、IEC provides no marking procedure to indicate its approval and cannot be rendered responsible for any equipment declared to be in conformity with one of its standards. 6) Attention is drawn to the possibility that some of the elements of this technical report may be the subject of patent rights. The

23、 IEC shall not be held responsible for identifying any or all such patent rights. The main task of IEC technical committees is to prepare International Standards. However, a technical committee may propose the publication of a technical report when it has collected data of a different kind from that

24、 which is normally published as an International Standard, for example “state of the art”. IEC 62210, which is a technical report, has been prepared by IEC technical committee 57: Power system control and associated communications. The text of this technical report is based on the following document

25、s: Enquiry draft Report on voting 57/613/DTR 57/630/RVC Full information on the voting for the approval of this technical report can be found in the report on voting indicated in the above table. This publication has been drafted in accordance with the ISO/IEC Directives, Part 2. The committee has d

26、ecided that the contents of this publication will remain unchanged until 2006. At this date, the publication will be reconfirmed; withdrawn; replaced by a revised edition, or amended. A bilingual version of this technical report may be issued at a later date.TR 62210 IEC:2003(E) 5 POWER SYSTEM CONTR

27、OL AND ASSOCIATED COMMUNICATIONS Data and communication security 1 Scope and object This Technical Report applies to computerised supervision, control, metering, and protection systems in electrical utilities. It deals with security aspects related to communication protocols used within and between

28、such systems, the access to, and use of the systems. NOTE This report does not include recommendations or criteria development associated with physical security issues. Realistic threats to the system and its operation are discussed. The vulnerability and the consequences of intrusion are exemplifie

29、d. Actions and countermeasures to improve the current situation are discussed but solutions are to be considered issues for future work items. 2 Overview Safety, security, and reliability have always been important issues in the design and operation of systems in electrical utilities. Supervision, p

30、rotection, and control system have been designed with the highest possible level of safety, security, and reliability. The communication protocols have been developed with a residual error rate approaching zero. All these measures have been taken to minimise the risk of danger for personnel and equi

31、pment and to promote an efficient operation of the power network. Physical threats on vulnerable objects have been handled in the classical ways by locked buildings, fences and guards but the quite possible terrorist threat of tripping a critical breaker by a faked SCADA command on a tapped communic

32、ation link has been neglected. There is no function in the currently used protocols that ensure that the control command comes from an authorised source. The deregulated electricity market has imposed new threats: knowledge of the assets of a competitor and the operation of his system can be benefic

33、ial and acquisition of such information is a possible reality. The communication protocols and systems need protection from advertent and inadvertent intruders, the more the protocols are open and standardised and the more the communication system is integrated in the corporate and world-wide commun

34、ication network. This Technical Report discusses the security process of the electrical utility. The security process involves the corporate security policy, the communication network security, and the (end-to-end) application security. The security of the total system depends on secure network devi

35、ces, i.e. the security of any device that can communicate. A secure network device has to be capable of performing safe communication and of authenticating the access level of the user. Intrusive attacks have to be efficiently detected, recorded and prosecuted as part of an active audit system. The

36、threats are analysed based on possible consequences to a system, i.e. what is the worst that could happen if an illicit intruder has ambition and resources? The vulnerability of a utility and its assets are analysed together with the threats. 6 TR 62210 IEC:2003(E) Having shown that there exists thr

37、eats to vulnerable points in the systems of electrical utilities the countermeasures are discussed with special focus on the communication protocols defined by IEC Technical Committee 57: the IEC 60870-5 series, the IEC 61334 series, the IEC 60870-6 series and the IEC 61850 series. Proposals on new

38、work items to include security aspects in these protocols are given. 3 Reference documents The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced doc

39、ument (including any amendments) applies. IEC 60870-5 (all parts), Telecontrol equipment and systems Part 5: Transmission protocols IEC 60870-6 (all parts), Telecontrol equipment and systems Part 6: Telecontrol protocols compatible with ISO standards and ITU-T recommendations IEC 61334 (all parts),

40、Distribution automation using distribution line carrier systems IEC 61850 (all parts), Communication networks and systems in substations ISO/IEC 7498-1, Information technology Open Systems Interconnection Basic Reference Model: The Basic Model ISO 7498-2:1989, Information processing systems Open Sys

41、tems Interconnection Basic Reference Model Part 2: Security Architecture ISO/IEC 10181-1:1996, Information technology Open Systems Interconnection Security frameworks for open systems: Overview ISO/IEC 10181-7:1996, Information technology Open Systems Interconnection Security frameworks for open sys

42、tems: Security audit and alarms framework ISO/IEC 15408-1, Information technology Security techniques Evaluation criteria for IT Security Part 1: Introduction and general model ISO/IEC 15408-2, Information technology Security techniques Evaluation criteria for IT Security Part 2: Security functional

43、 requirements ISO/IEC 15408-3, Information technology Security techniques Evaluation criteria for IT Security Part 3: Security assurance requirements 4 Terms, definitions and abbreviations 4.1 Terms and definitions 4.1.1 accountability property that ensures that the actions of an entity may be trace

44、d uniquely to the entity 4.1.2 asset Anything that has value to the organisation ISO/IEC TR 13335-1:1997TR 62210 IEC:2003(E) 7 4.1.3 authenticity property that ensures that the identity of a subject or resource is the one claimed. Authenticity applies to entities such as users, processes, systems an

45、d information 4.1.4 authorisation violation entity authorised to use a system for one purpose uses it for another, unauthorised purpose 4.1.5 availability property of being accessible and usable upon demand by an authorised entity ISO 7498-2: 1989 4.1.6 baseline controls minimum set of safeguards es

46、tablished for a system or organisation ISO/IEC TR 13335-1:1997 4.1.7 confidentiality property that information is not made available or disclosed to unauthorised individuals, entities, or processes ISO 7498-2:1989 4.1.8 data integrity property that data has not been altered or destroyed in an unauth

47、orised manner ISO 7498-2:1989 4.1.9 denial of service authorised communications flow is intentionally impeded 4.1.10 eavesdropping information is revealed to an unauthorised person monitoring communication traffic 4.1.11 hack threat that may be a combination of one or more of the following threats:

48、authorisation violation; information leakage; integrity violation; and masquerade 4.1.12 hash function (mathematical) function that maps values from a (possibly very) large set of values into a smaller range of values 4.1.13 information leakage unauthorised entity obtains secure/restricted informati

49、on 4.1.14 integrity violation information is created or modified by an unauthorised entity 8 TR 62210 IEC:2003(E) 4.1.15 intercept/alter communication packet is intercepted, modified, and then forwarded as if it were the original packet 4.1.16 masquerade unauthorised entity attempts to assume the identity of a trusted party 4.1.17 reliability property of consistent intended behaviour and resul

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1