IT in Manufacturing


Cyber security in utility ­communication networks

March 2016 IT in Manufacturing

Security concerns faced in the electrical substations of today stem from a variety of factors. The adoption of new technologies – such as transmission control protocol/Internet protocol (TCP/IP)-based technologies for both substation automation networks and wide area network (WAN) communications between substations – has opened these networks up to more cyber threats. A good cyber security policy, however, is a simple first step to maintaining the reliability and the safety of substation and grid operations.

Cyber security is often used to describe protection against online attacks, but a more holistic view of cyber security involves a collection of measures adopted to prevent unauthorised use, malicious use, denial of use, or modification of information, facts, data or resources. Cyber security not only refers to intentional attacks from outside the network, but also internal issues and unintentional modifications of information.

With both internal and external threat sources in mind, it is important to establish preventative processes for any issue that could lead to network downtime. These measures could include devices, configurations, internal security policies, and employee and contractor training. And since it’s not realistic to assume all threats can be prevented 100% of the time, recovery strategies after issues occur are also critical to protect network uptime.

Cyber security in utility communication networks

Historically, substation control networks were based on local connections and proprietary applications. Systems were designed for safety, reliability and ease of use, and security was not traditionally a concern of network managers or installers. But this approach is no longer valid.

Today’s communications networks are characterised by the use of:

• Commercial off-the-shelf technology.

• Ethernet and TCP/IP-based communications protocols.

• Open standards, IEC60870-5-104 and IEC61850.

• Integration of legacy industrial protocols (DNP3) and Modbus TCP.

• Remote connections (multiple devices and mobility).

• Interconnection with company IT systems.

• Use of public networks.

The complexity of power grids has increased over the years. As they have become interconnected with systems across countries, it has made failures and mistakes more likely – and their potential impact greater in scope and cost.

A thoughtful cyber security policy, combined with a well-designed network infrastructure, can help minimise or contain threats. Cyber security policies strive to meet three main objectives:

1. Confidentiality: preventing unauthorised access to information.

2. Integrity: preventing unauthorised modification or theft of information.

3. Availability: Preventing denial of service (DoS) and ensuring authorised access to information.

In IT networks, confidentiality is the main objective. However, in industrial networks, availability is the critical design parameter.

Analysis of threats

Most network security incidents are accidental instead of intentional. According to the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) vulnerability analysis, authentication flaws were the most abundant vulnerability type identified in 2013. This liability is of particular concern because an attacker with a minimal skill level could potentially gain administrator level access to devices that are accessible over the Internet. Other common vul­nerabilities identified in the analysis include factory hard-coded credentials and weak authentication keys.

Unintentional threats, such as equipment failures and employee carelessness, and deliberate threats, like cyber hackers and viruses, have different types of consequences.

They impact information systems, network infrastructure management and power system assets differently. Due to the critical role the communications network plays in the operation and protection of the high voltage and medium voltage grids, a DoS attack may lead to service disruption and financial losses, as a result of repairs and equipment replacement.

Cyber security is an iterative process – not static. As surrounding conditions or threat sources change, systems and policies may need to be updated to address those changes.

For a better understanding of this process, interested readers can download the full Belden white paper at: http://www.instrumentation.co.za/J667.pdf





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Data centre design powers up for AI, digital twins and adaptive liquid cooling
IT in Manufacturing
The Vertiv Frontiers report, which draws on expertise from across the organisation, details the technology trends driving current and future data centre innovation, from powering up for AI, to digital twins, to adaptive liquid cooling.

Read more...
How digital infrastructure design choices will decide who wins in AI
Schneider Electric South Africa IT in Manufacturing
As AI drives continues to disrupt industries across the world, the race is no longer just about smarter models or better data. It’s about building infrastructure powerful enough to support innovation at scale.

Read more...
How quantum computing and AI are driving the next wave of cyber defence innovation
IT in Manufacturing
We are standing at the edge of a new cybersecurity frontier, shaped by quantum computing, AI and the ever-expanding IIoT. To stay ahead of increasingly sophisticated threats, organisations must embrace a new paradigm that is proactive, integrated and rooted in zero-trust architectures.

Read more...
2026: The Year of AI execution for South African businesses
IT in Manufacturing
As we start 2026, artificial intelligence in South Africa is entering a new era defined not by experimentation, but by execution. Across the region, the conversation is shifting from “how do we build AI?” to “how do we power, govern and scale it responsibly?”

Read more...
AIoT drives transformation in manufacturing and energy industries
IT in Manufacturing
AIoT, the convergence of artificial intelligence and the Internet of Things, is enhancing efficiency, security and decision making at manufacturing, industrial and energy companies worldwide

Read more...
Today’s advanced safety system is but the beginning
Schneider Electric South Africa IT in Manufacturing
Industrial safety systems have come a long way since the days of hardwired emergency shutdowns. Today, safety systems are not just barriers against risk; they are enablers of safer operations.

Read more...
Siemens brings the industrial metaverse to life
Siemens South Africa IT in Manufacturing
Siemens has announced a new software solution that builds Industrial metaverse environments at scale, empowering organisations to apply industrial AI, simulation and real-time physical data to make decisions virtually, at speed and at scale.

Read more...
Five key insights we gained about AI in 2025
IT in Manufacturing
As 2025 draws to a close, African businesses can look back on one of the most pivotal years in AI adoption to date as organisations tested, deployed and learned from AI at pace. Some thrived and others stumbled. But the lessons that emerged are clear.

Read more...
South Africa’s AI development ranks 63rd in the world
IT in Manufacturing
The seventh edition of the Digital Quality of Life Index by cybersecurity company, Surfshark ranks South Africa 75th globally.

Read more...
Optimising MRO operations through artificial intelligence
RS South Africa IT in Manufacturing
AI is reshaping industrial operations at every level in the maintenance, repair and operations supply chain, where it is driving efficiency, predictive insight and smarter decision making.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved