Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
This paper presents the answer to the cybersecurity challenges faced by the centralization of the electric power generation control in the second company of this type in Colombia. Likewise, it describes the main cybersecurity practices that were investigated, analyzed and implemented to establish an...
- Autores:
-
Zuluaga, Diego
- Tipo de recurso:
- Fecha de publicación:
- 2020
- Institución:
- Universidad EAFIT
- Repositorio:
- Repositorio EAFIT
- Idioma:
- spa
- OAI Identifier:
- oai:repository.eafit.edu.co:10784/25810
- Acceso en línea:
- http://hdl.handle.net/10784/25810
- Palabra clave:
- Cybersecurity
centralize electric power control
power generation cybersecurity
industrial cybersecurity
critical infrastructure cybersecurity
ISO/IEC 27002
- Rights
- openAccess
- License
- Copyright © 2020 Diego Zuluaga
id |
REPOEAFIT2_dbbb9df25ae60225e8d29ff4fc36aa71 |
---|---|
oai_identifier_str |
oai:repository.eafit.edu.co:10784/25810 |
network_acronym_str |
REPOEAFIT2 |
network_name_str |
Repositorio EAFIT |
repository_id_str |
|
dc.title.eng.fl_str_mv |
Cybersecurity for Centralized and Distributed Power Generation at ISAGEN |
dc.title.spa.fl_str_mv |
Ciberseguridad para la operacióncentralizada y distribuida de generación deenergía eléctrica en ISAGEN |
title |
Cybersecurity for Centralized and Distributed Power Generation at ISAGEN |
spellingShingle |
Cybersecurity for Centralized and Distributed Power Generation at ISAGEN Cybersecurity centralize electric power control power generation cybersecurity industrial cybersecurity critical infrastructure cybersecurity ISO/IEC 27002 |
title_short |
Cybersecurity for Centralized and Distributed Power Generation at ISAGEN |
title_full |
Cybersecurity for Centralized and Distributed Power Generation at ISAGEN |
title_fullStr |
Cybersecurity for Centralized and Distributed Power Generation at ISAGEN |
title_full_unstemmed |
Cybersecurity for Centralized and Distributed Power Generation at ISAGEN |
title_sort |
Cybersecurity for Centralized and Distributed Power Generation at ISAGEN |
dc.creator.fl_str_mv |
Zuluaga, Diego |
dc.contributor.author.spa.fl_str_mv |
Zuluaga, Diego |
dc.contributor.affiliation.spa.fl_str_mv |
ISAGEN |
dc.subject.keyword.eng.fl_str_mv |
Cybersecurity centralize electric power control power generation cybersecurity industrial cybersecurity critical infrastructure cybersecurity ISO/IEC 27002 |
topic |
Cybersecurity centralize electric power control power generation cybersecurity industrial cybersecurity critical infrastructure cybersecurity ISO/IEC 27002 |
description |
This paper presents the answer to the cybersecurity challenges faced by the centralization of the electric power generation control in the second company of this type in Colombia. Likewise, it describes the main cybersecurity practices that were investigated, analyzed and implemented to establish and maintain a safe environment for operations, which allow facing the risks of cyberattacks on this essential service to the society. It presents the methodologies and technical measures that should have been considered in the different stages of the project to prevent cyberattacks from being effective, to identify them in a timely manner and to achieve the resilience of the supervision and control systems that were used and tested in this environment. It also shows how these results were used as a contribution to the evolution of Colombian national electric sector regulations on the subject and how they can serve as a basis for improvements to regulation and cybersecurity for other agents in the electricity sector in the country and the region.This paper presents the answer to the cybersecurity challenges faced by the centralization of the electric power generation control in the second company of this type in Colombia. Likewise, it describes the main cybersecurity practices that were investigated, analyzed and implemented to establish and maintain a safe environment for operations, which allow facing the risks of cyberattacks on this essential service to the society. It presents the methodologies and technical measures that should have been considered in the different stages of the project to prevent cyberattacks from being effective, to identify them in a timely manner and to achieve the resilience of the supervision and control systems that were used and tested in this environment. It also shows how these results were used as a contribution to the evolution of Colombian national electric sector regulations on the subject and how they can serve as a basis for improvements to regulation and cybersecurity for other agents in the electricity sector in the country and the region. |
publishDate |
2020 |
dc.date.issued.none.fl_str_mv |
2020-11-11 |
dc.date.available.none.fl_str_mv |
2021-02-19T16:41:44Z |
dc.date.accessioned.none.fl_str_mv |
2021-02-19T16:41:44Z |
dc.date.none.fl_str_mv |
2020-11-11 |
dc.type.eng.fl_str_mv |
article info:eu-repo/semantics/article publishedVersion info:eu-repo/semantics/publishedVersion |
dc.type.coarversion.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.local.spa.fl_str_mv |
Artículo |
status_str |
publishedVersion |
dc.identifier.issn.none.fl_str_mv |
1794-9165 |
dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/10784/25810 |
identifier_str_mv |
1794-9165 |
url |
http://hdl.handle.net/10784/25810 |
dc.language.iso.none.fl_str_mv |
spa |
language |
spa |
dc.relation.isversionof.none.fl_str_mv |
https://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/6282/5066 |
dc.relation.uri.none.fl_str_mv |
https://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/6282/5066 |
dc.rights.eng.fl_str_mv |
Copyright © 2020 Diego Zuluaga |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.accessrights.eng.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.local.spa.fl_str_mv |
Acceso abierto |
rights_invalid_str_mv |
Copyright © 2020 Diego Zuluaga Acceso abierto http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.coverage.spatial.none.fl_str_mv |
Medellín de: Lat: 06 15 00 N degrees minutes Lat: 6.2500 decimal degrees Long: 075 36 00 W degrees minutes Long: -75.6000 decimal degrees |
dc.publisher.spa.fl_str_mv |
Universidad EAFIT |
dc.source.spa.fl_str_mv |
Revista Ingeniería y Ciencias, Vol. 16 Núm. 32 (2020) |
institution |
Universidad EAFIT |
bitstream.url.fl_str_mv |
https://repository.eafit.edu.co/bitstreams/f802e8a4-3935-4d1a-a44c-3e064405734a/download https://repository.eafit.edu.co/bitstreams/2e855a45-60d3-4b4d-aa4b-f3c62a2ff240/download https://repository.eafit.edu.co/bitstreams/a008d710-3e98-4396-960b-d218beb76294/download |
bitstream.checksum.fl_str_mv |
da9b21a5c7e00c7f1127cef8e97035e0 a184597bb074e105f0c7571a23c74356 b171bfc1b7ec00488fdf986b253f2009 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad EAFIT |
repository.mail.fl_str_mv |
repositorio@eafit.edu.co |
_version_ |
1814110532586700800 |
spelling |
Medellín de: Lat: 06 15 00 N degrees minutes Lat: 6.2500 decimal degrees Long: 075 36 00 W degrees minutes Long: -75.6000 decimal degrees2020-11-112021-02-19T16:41:44Z2020-11-112021-02-19T16:41:44Z1794-9165http://hdl.handle.net/10784/25810This paper presents the answer to the cybersecurity challenges faced by the centralization of the electric power generation control in the second company of this type in Colombia. Likewise, it describes the main cybersecurity practices that were investigated, analyzed and implemented to establish and maintain a safe environment for operations, which allow facing the risks of cyberattacks on this essential service to the society. It presents the methodologies and technical measures that should have been considered in the different stages of the project to prevent cyberattacks from being effective, to identify them in a timely manner and to achieve the resilience of the supervision and control systems that were used and tested in this environment. It also shows how these results were used as a contribution to the evolution of Colombian national electric sector regulations on the subject and how they can serve as a basis for improvements to regulation and cybersecurity for other agents in the electricity sector in the country and the region.This paper presents the answer to the cybersecurity challenges faced by the centralization of the electric power generation control in the second company of this type in Colombia. Likewise, it describes the main cybersecurity practices that were investigated, analyzed and implemented to establish and maintain a safe environment for operations, which allow facing the risks of cyberattacks on this essential service to the society. It presents the methodologies and technical measures that should have been considered in the different stages of the project to prevent cyberattacks from being effective, to identify them in a timely manner and to achieve the resilience of the supervision and control systems that were used and tested in this environment. It also shows how these results were used as a contribution to the evolution of Colombian national electric sector regulations on the subject and how they can serve as a basis for improvements to regulation and cybersecurity for other agents in the electricity sector in the country and the region.Este artículo presenta repuesta a los retos de ciberseguridad enfrentadospara la centralización del control de generación de energía eléctrica enla segunda empresa de este tipo en Colombia. Así mismo, se describenlas principales prácticas de ciberseguridad que se investigaron, analizarone implementaron para establecer y mantener un entorno seguro deoperaciones, que permita solucionar los riesgos de ciberataques a esteservicio esencial para la sociedad; así como las metodologías y medidastécnicas que debieron tenerse en cuenta en las diferentes etapas delproyecto para evitar que los ciberataques sean efectivos, para identificarlosoportunamente y para lograr la resiliencia de los sistemas de supervisióny control que fueron empleados y probados en este entorno. También,muestra cómo estos resultados fueron usados para aportar a la evoluciónde la normatividad nacional en la materia y como podrán servir de basepara mejoras a la regulación y la ciberseguridad de otros agentes delsector eléctrico en el país y la región.application/pdfspaUniversidad EAFIThttps://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/6282/5066https://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/6282/5066Copyright © 2020 Diego Zuluagainfo:eu-repo/semantics/openAccessAcceso abiertohttp://purl.org/coar/access_right/c_abf2Revista Ingeniería y Ciencias, Vol. 16 Núm. 32 (2020)Cybersecurity for Centralized and Distributed Power Generation at ISAGENCiberseguridad para la operacióncentralizada y distribuida de generación deenergía eléctrica en ISAGENarticleinfo:eu-repo/semantics/articlepublishedVersioninfo:eu-repo/semantics/publishedVersionArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Cybersecuritycentralize electric power controlpower generation cybersecurityindustrial cybersecuritycritical infrastructure cybersecurityISO/IEC 27002Zuluaga, DiegoISAGENIngeniería y Ciencias1632171194THUMBNAILminaitura-ig_Mesa de trabajo 1.jpgminaitura-ig_Mesa de trabajo 1.jpgimage/jpeg265796https://repository.eafit.edu.co/bitstreams/f802e8a4-3935-4d1a-a44c-3e064405734a/downloadda9b21a5c7e00c7f1127cef8e97035e0MD51ORIGINALdocument - 2021-04-28T221443.208.pdfdocument - 2021-04-28T221443.208.pdfPDF Completoapplication/pdf554369https://repository.eafit.edu.co/bitstreams/2e855a45-60d3-4b4d-aa4b-f3c62a2ff240/downloada184597bb074e105f0c7571a23c74356MD52articulo - copia (8).htmlarticulo - copia (8).htmlHTML Completotext/html375https://repository.eafit.edu.co/bitstreams/a008d710-3e98-4396-960b-d218beb76294/downloadb171bfc1b7ec00488fdf986b253f2009MD5310784/25810oai:repository.eafit.edu.co:10784/258102021-04-28 22:18:07.296open.accesshttps://repository.eafit.edu.coRepositorio Institucional Universidad EAFITrepositorio@eafit.edu.co |