Professional Documents
Culture Documents
This test forms a part in the complete examination of the course EH2741. The maximum score on
the test is 10 points, these points are cumulative with course points gained from Project Assign-
ments and the second voluntary test, the total amount of points gathered translates into a course
grade.
b) List and explain briefly two security flaws (general categories) that can undermine security
of SCADA systems, explain why they are dangerous and how an attacker can use them or
take advantage of them.
Some examples include poorly secured data communications; Unpatched software, Poor administration;,
Vendors not fixing vulnerabilities. For a complete list see section 10 in the paper by Nicholson refer-
enced during lecture on Cybersecurity.
c) List two preventative measures and explain how they make a positive difference against
security attacks.
Some examples include Security systems (firewalls, IDS/IPS, SIEMs...), War games and exercisies;,
Penetration testing and Honeypots/honeynets. For a complete list see section 11 in the paper by Nichol-
son referenced during lecture on Cybersecurity.
Topology processor – converts the bus-breaker model to a bus-brach model by analysing breaker
states.
Observability Analysis – analysis of rank of the gain matrix G or measurement placement and
topology to analyse whether the complete system is observable. If some area is unobservable, pseudo-
measurements or data from other systems can be inserted.
State estimation – determination of Voltage amplitude and phase angle using e.g. Weighted Least
square approximation.
Bad Data detection – analysis of the residuals of measurements to determine whether some values
stand-out which is an indication of measurement error.