Cybersecurity for Centralized and Distributed Power Generation at ISAGEN

This paper presents the answer to the cybersecurity challenges faced by the centralization of the electric power generation control in the second company of this type in Colombia. Likewise, it describes the main cybersecurity practices that were investigated, analyzed and implemented to establish an...

Full description

Autores:
Zuluaga, Diego
Tipo de recurso:
Fecha de publicación:
2020
Institución:
Universidad EAFIT
Repositorio:
Repositorio EAFIT
Idioma:
spa
OAI Identifier:
oai:repository.eafit.edu.co:10784/25810
Acceso en línea:
http://hdl.handle.net/10784/25810
Palabra clave:
Cybersecurity
centralize electric power control
power generation cybersecurity
industrial cybersecurity
critical infrastructure cybersecurity
ISO/IEC 27002
Rights
openAccess
License
Copyright © 2020 Diego Zuluaga
id REPOEAFIT2_dbbb9df25ae60225e8d29ff4fc36aa71
oai_identifier_str oai:repository.eafit.edu.co:10784/25810
network_acronym_str REPOEAFIT2
network_name_str Repositorio EAFIT
repository_id_str
dc.title.eng.fl_str_mv Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
dc.title.spa.fl_str_mv Ciberseguridad para la operacióncentralizada y distribuida de generación deenergía eléctrica en ISAGEN
title Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
spellingShingle Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
Cybersecurity
centralize electric power control
power generation cybersecurity
industrial cybersecurity
critical infrastructure cybersecurity
ISO/IEC 27002
title_short Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
title_full Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
title_fullStr Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
title_full_unstemmed Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
title_sort Cybersecurity for Centralized and Distributed Power Generation at ISAGEN
dc.creator.fl_str_mv Zuluaga, Diego
dc.contributor.author.spa.fl_str_mv Zuluaga, Diego
dc.contributor.affiliation.spa.fl_str_mv ISAGEN
dc.subject.keyword.eng.fl_str_mv Cybersecurity
centralize electric power control
power generation cybersecurity
industrial cybersecurity
critical infrastructure cybersecurity
ISO/IEC 27002
topic Cybersecurity
centralize electric power control
power generation cybersecurity
industrial cybersecurity
critical infrastructure cybersecurity
ISO/IEC 27002
description This paper presents the answer to the cybersecurity challenges faced by the centralization of the electric power generation control in the second company of this type in Colombia. Likewise, it describes the main cybersecurity practices that were investigated, analyzed and implemented to establish and maintain a safe environment for operations, which allow facing the risks of cyberattacks on this essential service to the society. It presents the methodologies and technical measures that should have been considered in the different stages of the project to prevent cyberattacks from being effective, to identify them in a timely manner and to achieve the resilience of the supervision and control systems that were used and tested in this environment. It also shows how these results were used as a contribution to the evolution of Colombian national electric sector regulations on the subject and how they can serve as a basis for improvements to regulation and cybersecurity for other agents in the electricity sector in the country and the region.This paper presents the answer to the cybersecurity challenges faced by the centralization of the electric power generation control in the second company of this type in Colombia. Likewise, it describes the main cybersecurity practices that were investigated, analyzed and implemented to establish and maintain a safe environment for operations, which allow facing the risks of cyberattacks on this essential service to the society. It presents the methodologies and technical measures that should have been considered in the different stages of the project to prevent cyberattacks from being effective, to identify them in a timely manner and to achieve the resilience of the supervision and control systems that were used and tested in this environment. It also shows how these results were used as a contribution to the evolution of Colombian national electric sector regulations on the subject and how they can serve as a basis for improvements to regulation and cybersecurity for other agents in the electricity sector in the country and the region.
publishDate 2020
dc.date.issued.none.fl_str_mv 2020-11-11
dc.date.available.none.fl_str_mv 2021-02-19T16:41:44Z
dc.date.accessioned.none.fl_str_mv 2021-02-19T16:41:44Z
dc.date.none.fl_str_mv 2020-11-11
dc.type.eng.fl_str_mv article
info:eu-repo/semantics/article
publishedVersion
info:eu-repo/semantics/publishedVersion
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_6501
http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.local.spa.fl_str_mv Artículo
status_str publishedVersion
dc.identifier.issn.none.fl_str_mv 1794-9165
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/10784/25810
identifier_str_mv 1794-9165
url http://hdl.handle.net/10784/25810
dc.language.iso.none.fl_str_mv spa
language spa
dc.relation.isversionof.none.fl_str_mv https://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/6282/5066
dc.relation.uri.none.fl_str_mv https://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/6282/5066
dc.rights.eng.fl_str_mv Copyright © 2020 Diego Zuluaga
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.accessrights.eng.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.local.spa.fl_str_mv Acceso abierto
rights_invalid_str_mv Copyright © 2020 Diego Zuluaga
Acceso abierto
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.coverage.spatial.none.fl_str_mv Medellín de: Lat: 06 15 00 N degrees minutes Lat: 6.2500 decimal degrees Long: 075 36 00 W degrees minutes Long: -75.6000 decimal degrees
dc.publisher.spa.fl_str_mv Universidad EAFIT
dc.source.spa.fl_str_mv Revista Ingeniería y Ciencias, Vol. 16 Núm. 32 (2020)
institution Universidad EAFIT
bitstream.url.fl_str_mv https://repository.eafit.edu.co/bitstreams/f802e8a4-3935-4d1a-a44c-3e064405734a/download
https://repository.eafit.edu.co/bitstreams/2e855a45-60d3-4b4d-aa4b-f3c62a2ff240/download
https://repository.eafit.edu.co/bitstreams/a008d710-3e98-4396-960b-d218beb76294/download
bitstream.checksum.fl_str_mv da9b21a5c7e00c7f1127cef8e97035e0
a184597bb074e105f0c7571a23c74356
b171bfc1b7ec00488fdf986b253f2009
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad EAFIT
repository.mail.fl_str_mv repositorio@eafit.edu.co
_version_ 1814110532586700800
spelling Medellín de: Lat: 06 15 00 N degrees minutes Lat: 6.2500 decimal degrees Long: 075 36 00 W degrees minutes Long: -75.6000 decimal degrees2020-11-112021-02-19T16:41:44Z2020-11-112021-02-19T16:41:44Z1794-9165http://hdl.handle.net/10784/25810This paper presents the answer to the cybersecurity challenges faced by the centralization of the electric power generation control in the second company of this type in Colombia. Likewise, it describes the main cybersecurity practices that were investigated, analyzed and implemented to establish and maintain a safe environment for operations, which allow facing the risks of cyberattacks on this essential service to the society. It presents the methodologies and technical measures that should have been considered in the different stages of the project to prevent cyberattacks from being effective, to identify them in a timely manner and to achieve the resilience of the supervision and control systems that were used and tested in this environment. It also shows how these results were used as a contribution to the evolution of Colombian national electric sector regulations on the subject and how they can serve as a basis for improvements to regulation and cybersecurity for other agents in the electricity sector in the country and the region.This paper presents the answer to the cybersecurity challenges faced by the centralization of the electric power generation control in the second company of this type in Colombia. Likewise, it describes the main cybersecurity practices that were investigated, analyzed and implemented to establish and maintain a safe environment for operations, which allow facing the risks of cyberattacks on this essential service to the society. It presents the methodologies and technical measures that should have been considered in the different stages of the project to prevent cyberattacks from being effective, to identify them in a timely manner and to achieve the resilience of the supervision and control systems that were used and tested in this environment. It also shows how these results were used as a contribution to the evolution of Colombian national electric sector regulations on the subject and how they can serve as a basis for improvements to regulation and cybersecurity for other agents in the electricity sector in the country and the region.Este artículo presenta repuesta a los retos de ciberseguridad enfrentadospara la centralización del control de generación de energía eléctrica enla segunda empresa de este tipo en Colombia. Así mismo, se describenlas principales prácticas de ciberseguridad que se investigaron, analizarone implementaron para establecer y mantener un entorno seguro deoperaciones, que permita solucionar los riesgos de ciberataques a esteservicio esencial para la sociedad; así como las metodologías y medidastécnicas que debieron tenerse en cuenta en las diferentes etapas delproyecto para evitar que los ciberataques sean efectivos, para identificarlosoportunamente y para lograr la resiliencia de los sistemas de supervisióny control que fueron empleados y probados en este entorno. También,muestra cómo estos resultados fueron usados para aportar a la evoluciónde la normatividad nacional en la materia y como podrán servir de basepara mejoras a la regulación y la ciberseguridad de otros agentes delsector eléctrico en el país y la región.application/pdfspaUniversidad EAFIThttps://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/6282/5066https://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/6282/5066Copyright © 2020 Diego Zuluagainfo:eu-repo/semantics/openAccessAcceso abiertohttp://purl.org/coar/access_right/c_abf2Revista Ingeniería y Ciencias, Vol. 16 Núm. 32 (2020)Cybersecurity for Centralized and Distributed Power Generation at ISAGENCiberseguridad para la operacióncentralizada y distribuida de generación deenergía eléctrica en ISAGENarticleinfo:eu-repo/semantics/articlepublishedVersioninfo:eu-repo/semantics/publishedVersionArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Cybersecuritycentralize electric power controlpower generation cybersecurityindustrial cybersecuritycritical infrastructure cybersecurityISO/IEC 27002Zuluaga, DiegoISAGENIngeniería y Ciencias1632171194THUMBNAILminaitura-ig_Mesa de trabajo 1.jpgminaitura-ig_Mesa de trabajo 1.jpgimage/jpeg265796https://repository.eafit.edu.co/bitstreams/f802e8a4-3935-4d1a-a44c-3e064405734a/downloadda9b21a5c7e00c7f1127cef8e97035e0MD51ORIGINALdocument - 2021-04-28T221443.208.pdfdocument - 2021-04-28T221443.208.pdfPDF Completoapplication/pdf554369https://repository.eafit.edu.co/bitstreams/2e855a45-60d3-4b4d-aa4b-f3c62a2ff240/downloada184597bb074e105f0c7571a23c74356MD52articulo - copia (8).htmlarticulo - copia (8).htmlHTML Completotext/html375https://repository.eafit.edu.co/bitstreams/a008d710-3e98-4396-960b-d218beb76294/downloadb171bfc1b7ec00488fdf986b253f2009MD5310784/25810oai:repository.eafit.edu.co:10784/258102021-04-28 22:18:07.296open.accesshttps://repository.eafit.edu.coRepositorio Institucional Universidad EAFITrepositorio@eafit.edu.co