Skip to main content

Implementation of a Security Policy in Distributed Safety Related I&C Systems

A Case Study

  • Conference paper
Safe Comp 96
  • 111 Accesses

Abstract

Today’s I&C Systems usually are distributed computer systems with interfaces to sensors and actuators for process control. Once someone has access to a any part of this distributed system he possibly is in control of part of the process. Networks of distributed I&C systems provide an ideal infrastructure for remote, quiet and inconspicuous hacking attacks against process computers in I&C systems. It is vital for safe process operation to avoid any subversion of the security of the I&C system jeopardizing it’s integrity, availability and confidentiality. This paper starts from a rather generic model of a distributed computerized safety system, identifies important information-storage, -flow and -processing, gives an example of how to set up a security policy and finally discusses the implementation of this policy including service and maintenance issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. J. Case, M. Fedor, M. Schoffstall, J. Davin. A simple network protocol (SNMP). RFC 1157, May 1990

    Google Scholar 

  2. J. Galvin, K. McCloghrie, J. Davin. SNMP Security Protocols. RFC 1352, July 1992

    Google Scholar 

  3. William R. Cheswick, Steven M. Bellovin. Firewalls and Internet Security: repelling the wily hacker. Addison Wesley, 1994

    MATH  Google Scholar 

  4. Colin Smythe, Internetworking: designing the right architectures. Addison Wesley, 1994

    Google Scholar 

  5. Deborah Russel, G.T. Gangemi Sr.. Computer Security Basics. O’Reilly & Associates, 1991

    Google Scholar 

  6. Simson Garfinkel, Gene Spafford. Practical Unix Security. O’Reilly & Associates, 1991

    Google Scholar 

  7. Arthur E. Hutt (editor). Computer Security Handbook. John Wiley & Sons, 1995

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag London Limited

About this paper

Cite this paper

Dafelmair, F.J. (1997). Implementation of a Security Policy in Distributed Safety Related I&C Systems. In: Schoitsch, E. (eds) Safe Comp 96. Springer, London. https://doi.org/10.1007/978-1-4471-0937-2_39

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-0937-2_39

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-76070-2

  • Online ISBN: 978-1-4471-0937-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics