Atenção: Todas as denúncias são sigilosas e sua identidade será preservada.
Os campos nome e e-mail são de preenchimento opcional
Metadados | Descrição | Idioma |
---|---|---|
???dc.contributor.advisor???: dc.contributor.advisor | Neves Junior, Flávio | - |
Autor(es): dc.contributor.author | Strehl, Luiz Costa | - |
Data de aceite: dc.date.accessioned | 2014-03-18T20:23:18Z | - |
Data de aceite: dc.date.accessioned | 2017-03-17T14:38:11Z | - |
Data de disponibilização: dc.date.available | 2014-03-18T20:23:18Z | - |
Data de disponibilização: dc.date.available | 2017-03-17T14:38:11Z | - |
Data de envio: dc.date.issued | 2014-03-18 | - |
Fonte completa do material: dc.identifier | http://repositorio.roca.utfpr.edu.br/jspui/handle/1/1905 | - |
???dc.identifier.citation???: dc.identifier.citation | STREHL, Luiz Costa. Prospecção de tecnologias para aumentar a segurança em sistemas SCADA. 2012. 63 f. Trabalho de Conclusão de Curso (Especialização) – Universidade Tecnológica Federal do Paraná, Curitiba, 2012. | pt_BR |
Fonte: dc.identifier.uri | http://www.educapes.capes.gov.br/handlecapes/169914 | - |
Resumo: dc.description.abstract | Essential services for people such as electricity, transport, water supply, food and others are controlled by systems of supervision and control. Most people may not know the importance of such systems, but monitoring and guarantee of perfect performance take us the welfare, safety and good life. The use of supervisory and control systems in industrial environments began from the 60s and has since followed the growth and modernization achieved by computer technology. The changes undergone have evolved to open protocols and systems, COTS products and widespread use of internet communications. Then, it was created an environment with considerable possibilities of attacks on these systems, making them vulnerable to the same threats and risks of these new technologies. However, as the environment of Automation priorities are not the same an environment of Information Technology, one must understand the technologies, the pros and cons before implementing them. The theme of this dissertation is to explore technologies to increase the safety system of control and supervision. As a result of the research, a set of technologies is selected for use in any industrial network, regardless of the area of operations of the company. The understanding of what would be the supervisory and data acquisition and its evolution, the main regulations to the subject of Information Security and key differences between the environments of Industrial Automation and IT are addressed in this work. The major threats and vulnerabilities that affect the systems and key technologies and countermeasures are explained on the basis of literature. With the goal of providing a practical use for this research, a questionnaire was prepared and, considering the selected technologies and countermeasures, also provides inputs for the company, to get a security assessment of your industrial automation environment. The questionnaire was applied in 10 industrial units and obtained, as a result, a current view of system security control of each of these units. | pt_BR |
Palavras-chave: dc.subject | Segurança de sistemas | pt_BR |
Palavras-chave: dc.subject | Sistemas de controle digital | pt_BR |
Palavras-chave: dc.subject | Sistemas de controle supervisório | pt_BR |
Palavras-chave: dc.subject | System safety | pt_BR |
Palavras-chave: dc.subject | Digital control systems | pt_BR |
Palavras-chave: dc.subject | Supervisory control systems | pt_BR |
Título: dc.title | Prospecção de tecnologias para aumentar a segurança em sistemas SCADA | pt_BR |
Tipo de arquivo: dc.type | outro | pt_BR |
Aparece nas coleções: | Repositorio Institucional da UTFPR - RIUT |
O Portal eduCAPES é oferecido ao usuário, condicionado à aceitação dos termos, condições e avisos contidos aqui e sem modificações. A CAPES poderá modificar o conteúdo ou formato deste site ou acabar com a sua operação ou suas ferramentas a seu critério único e sem aviso prévio. Ao acessar este portal, você, usuário pessoa física ou jurídica, se declara compreender e aceitar as condições aqui estabelecidas, da seguinte forma: