Please use this identifier to cite or link to this item: http://hdl.handle.net/10609/148151
Title: Ciberseguridad en sistemas industriales: auditorías de seguridad, monitorización y securización de los entornos de operación
Author: Teruel Carrera, David
Tutor: Farràs Ballabriga, Gerard  
Others: Isern-Deya, Andreu Pere  
Abstract: In the current context of continuous and rapid expansion of connected systems, the TFG shows different attacks and threats that an industrial installation in a real industrial laboratory may face and how we could protect these systems.
The growing expansion of information technologies has allowed industrial environments and control systems to benefit from having their operation systems connected as well. Nuclear power plants, power plants, hydroelectric power plants, oil plants, water supply plants, among others, have found extraordinary advantages in being able to remotely control their systems. But not everything is an advantage. This connectivity in industrial environments also implies exposing them to possible attackers and threats, given that obsolete devices with known vulnerabilities can be found in the industrial world. It is difficult and costly to keep systems updated in industrial environments due to the possible impact that a system shutdown may have, especially when dealing with critical industrial systems. This work aims to explain possible attacks and threats that an industrial system may face and how we could detect possible threats affecting the system in order to remedy them, through a passive monitoring system that does not impact or interrupt the operation service but alerts us to this activity so that necessary actions can be taken to ensure the cybersecurity of the operation systems. For the development of the project, we deemed it appropriate to deploy an Operating Systems laboratory where we can: • Understand the main components of industrial systems, control systems, SCADA/PLC, and industrial protocols. • Perform technical security audits that show us the threats to which these control systems are exposed. • Secure and apply best cybersecurity practices in the systems that allow us to detect possible attacks and defend ourselves against these threats.
Keywords: hacking
ICS
IOT
pentesting
Document type: info:eu-repo/semantics/bachelorThesis
Issue Date: Jun-2023
Publication license: http://creativecommons.org/licenses/by-nc-nd/3.0/es/  
Appears in Collections:Trabajos finales de carrera, trabajos de investigación, etc.

Files in This Item:
File Description SizeFormat 
davidtc14TFG0623memoria.pdf7,59 MBAdobe PDFThumbnail
View/Open
Share:
Export:
View statistics

This item is licensed under aCreative Commons License Creative Commons