23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

19-4 Industrial Communication Systems<br />

• How are the <strong>systems</strong> and tools selected to implement the security policy going to be used? There<br />

will be cryptographic defenses and no cryptographic ones and it will be important to know the<br />

different kinds of attacks and defenses.<br />

• How much money could the organization afford to implement the policy? This data item gives<br />

a great input to decide which way can be used to begin to implement the policy.<br />

Once the security policy (or at least the first operating version) is built, it is necessary to start the<br />

security process within the information security management system [7]. It can be structured in three<br />

continuous phases:<br />

1. Implementation phase: Every organizational measure of the policy must be activated, including<br />

all the configurations for servers, routers, switches, firewalls, etc.<br />

2. Monitoring phase: Audits and continuous monitoring of <strong>systems</strong> and networks must be done to<br />

assure that the security restrictions are working and to investigate possible new security problems,<br />

not previously detected or thought of.<br />

3. Security adulting phase: Vulnerability audits and security tests must be done, especially to sensible<br />

devices and servers, in order to get new possible technical or organizational vulnerabilities.<br />

Adding the results of phases 2 and 3, we get new directions for updating the security policy building, say,<br />

the operating version 2, that we must implement putting again in the first phase of the process, and so on.<br />

To finish this section, it is important to point out a number of committees and standards that can help<br />

to build a concrete security policy for a concrete <strong>industrial</strong> network:<br />

• IEEE 1402 [9], a security standard for substations, especially devoted to physical security.<br />

• Process Control Security Requirements Forum (PCSRF) [10], sponsorized by NIST. Its goal is to<br />

build a quality and security standards set for building new <strong>industrial</strong> process control <strong>systems</strong>. It<br />

has developed norms for DCS and SCADA <strong>systems</strong>, like the SCP-ICS (Industrial Control System<br />

Security Capabilities Profile) or the SPP-ICS (Industrial Control System Security Profile).<br />

• ISA SP99: The SP99 [11] committee of Instrumentation Systems and Automation (ISA) develops<br />

“guide-alike” documents for introducing information security in automatized control <strong>systems</strong>.<br />

• IEC TC65: Technical subcommittee 65C of the IEC is working since 2004 in security standards for<br />

field buses and other <strong>industrial</strong> <strong>communication</strong> networks.<br />

19.3 Quality of Service for IP Networks<br />

Traditionally, the term “quality of service” refers to a series of techniques [12] and methodologies [2,3]<br />

whose targets are to assign different priorities to different kinds of traffic in the IP network. Also refers<br />

to implement management policies to handle the latency, delay, and bandwidth. These techniques try<br />

to give a distinctive and preferential treatment to the traffic corresponding to the most critical applications<br />

in the network. This treatment must be homogeneous, the same treatment in all the areas in the<br />

network. The policy must allow the changes, must be dynamic because of the possible changing situations<br />

of the services in the network. Nowadays, they are an essential component to assure the correct<br />

performance of the applications in the network.<br />

Any network may experience any of these network availability problems:<br />

• Delay: Also named latency, is the amount of time that it takes a packet to reach the receiving<br />

endpoint after being transmitted from the sending endpoint. This period can be broken into<br />

two areas: fixed network delay and variable network delay. The fixed part includes encoding and<br />

decoding times (for voice and video, for example) as well as the amount of time required for the<br />

electrical and optical pulses to traverse the media to their destination. The variable part generally<br />

refers to network conditions, such as congestion, that is going to affect the overall time required<br />

for transit. For data networks it is usual to talk about packetization delay, the time that it takes to<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!