METHOD AND SYSTEM FOR CYBER SECURITY MANAGEMENT OF INDUSTRIAL CONTROL SYSTEMS
First Claim
1. A computer-implemented method for providing an integrated command and control user interface in a Supervisory Control And Data Acquisition (SCADA) to enhance situational awareness and cyber security management for industrial control systems, the method comprising:
- providing a centralized System Security Manager (SSM) program module executable by a processing device and integrated into a SCADA wherein the SSM collects security related data for the industrial control system;
displaying by the SSM program module an integrated command and control user interface comprising a system monitoring pane comprising security related data collected by the SSM, a system security status pane comprising a system security level, and a system security settings pane allowing for changing of system security settings for the industrial control system; and
wherein the integrated command and control user interface allows setting of the system security level based on the security related data collected and changes in operational state of the SCADA based on the security level to restrict use of system interfaces and system accesses.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for cyber security management of Supervisory Control And Data Acquisition (SCADA) systems is provided to enhance situational awareness and cyber security management for industrial control systems. A centralized System Security Manager (SSM) is integrated into a SCADA to collect security related data for the industrial control system and an integrated command and control user interface displays security related data, a system security level, and interfaces with a user to allows for changing of system security settings for the industrial control system based on the security related data collected and manages changes in operational state of the SCADA based on the security level to restrict use of system interfaces and system accesses.
128 Citations
20 Claims
-
1. A computer-implemented method for providing an integrated command and control user interface in a Supervisory Control And Data Acquisition (SCADA) to enhance situational awareness and cyber security management for industrial control systems, the method comprising:
-
providing a centralized System Security Manager (SSM) program module executable by a processing device and integrated into a SCADA wherein the SSM collects security related data for the industrial control system; displaying by the SSM program module an integrated command and control user interface comprising a system monitoring pane comprising security related data collected by the SSM, a system security status pane comprising a system security level, and a system security settings pane allowing for changing of system security settings for the industrial control system; and wherein the integrated command and control user interface allows setting of the system security level based on the security related data collected and changes in operational state of the SCADA based on the security level to restrict use of system interfaces and system accesses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 20)
-
-
18. A system for providing an integrated command and control user interface in a Supervisory Control And Data Acquisition (SCADA) to enhance situational awareness and cyber security management for industrial control systems, comprising:
-
a centralized System Security Manager (SSM) program module executable by a processing device and integrated into a SCADA wherein the SSM collects security related data for the industrial control system; and an integrated command and control user interface for displaying security related data collected by the SSM, a system security level, system security settings, wherein the user interface provides for changing of system security settings for the industrial control system and setting of the system security level based on the security related data collected and changing operational state of the SCADA based on the security level to restrict use of system interfaces and system accesses. - View Dependent Claims (19)
-
Specification