Professional Documents
Culture Documents
INTRODUCTION
Our increasing reliance on automated control systems, coupled with the rise in computer
intrusions and international terrorism, has magnified the risk of unauthorized hostile access to
electric utility control and protective systems. Electric power generation systems and
transmission and distribution utilities face an increased threat of sabotage and espionage via
“electronic intrusion” and “computer hacking.” The electric power industry must be aware of this
threat and must take steps to reduce its risk and mitigate vulnerabilities. Protection, integration,
and automation engineers should use mechanisms that minimize the likelihood that persons with
hostile intent can degrade or destroy electric power systems. Responding to this risk, Schweitzer
Engineering Laboratories is distributing a series of SEL Application Guides to help the electric
power industry assess vulnerability and take steps to implement and strengthen communication
security to and from IEDs, controllers, and SCADA systems. The three SEL Application Guides
in the series are:
1. Using Passwords to Secure Relays, Controllers, and SCADA Systems From Unauthorized
Access (this document).
2. Setting and Using Secure Dial-Back Modems With SEL Relays and Communications
Processors.
3. Low-Cost Authentication Devices for Secure Modem and Network Connections.
These guides are “how-to” documents intended to help you reduce the risk of unauthorized access
to your control and protective equipment. Traditional approaches for reducing vulnerability
include password protection, audit logging, multitiered access levels, alarm conditions, automated
IED configuration and authentication, redundant controllers, time-out communication settings,
virus protection, firewalls, and intrusion detection systems. For a more detailed discussion of the
increasing risks and corresponding mitigating technologies, see the following documents:
1. IEEE Guide for Electric Power Substation Physical and Electronic Security, IEEE
Standard 1402-2000, IEEE Power Engineering Society, New York, NY, April 4, 2000.
2. “Concerns About Intrusions Into Remotely Accessible IEDs, Controllers, and SCADA
Systems,” in Proceedings of the 27th Annual Western Protective Relay Conference, by
P. Oman, E. Schweitzer, and D. Frincke, Paper No. 4, (Oct. 23–25, Spokane, WA), 2000,
available at http://www.selinc.com.
1
Password cracking refers to automated programs that can try up to several hundred password
combinations per minute.
$&&
3DVVZRUG " %$'3$6
&20081,&$7,216 352&(6625 61 'DWH 7LPH
/HYHO
!$&
3DVVZRUG " 722(=<
&20081,&$7,216 352&(6625 61 'DWH 7LPH
/HYHO
!!
!!3$6
%$'3$6
722(=<
!!3$6 2W
6HW
!!3$6 7D
6HW
!!3$6
2W
7D
!!48,7
&20081,&$7,216 352&(6625 61 'DWH 7LPH
!!3$6
2W
%%NU
7D
!!48,7
$&&
3DVVFRGH " %$'3$6
All brand or product names appearing in this document are the trademark or registered trademark of their respective holders.
Schweitzer Engineering Laboratories, SELOGIC, Connectorized, Job Done, SEL-PROFILE, and are registered trademarks of Schweitzer
Engineering Laboratories.
Copyright © SEL 2001 (All rights reserved) Printed in USA.