Turbine Monitoring and Diagnostics eBook

Picture of Waterfall team

Waterfall team

Turbine Monitoring and Diagnostics whitepaper

A variety of turbines are used routinely in power generation: steam turbines, water turbines and combustion/gas turbines. Wind turbines are used as well, but tend to be smaller.

Regular monitoring, preemptive maintenance and comparatively small adjustments can often prevent otherwise costly, catastrophic failures which might even require the replacement of entire turbines. Many vendors provide remote services for turbine monitoring and diagnostics. These services are generally accomplished through remote access using firewalls, often with Virtual Private Network (VPN) and other security measures.

Persistent, targeted attacks 

In the last half decade, targeted attacks have emerged as a new pervasive threat. A targeted attack is an attack where a team of one or more professional-grade attackers assaults a specific site or organization on more or less a full time basis over a period of days, weeks, or months, using continuous, interactive remote control tools. Targeted attacks routinely defeat classic IT-style cyber protections, including anti-virus systems, security update programs, encryption, and firewalls. This class of attack was once attributed only to so-called “advanced persistent threats.” In recent years though, the attack techniques used in targeted attacks have been thoroughly documented.

In this eBook

  • Persistent, targeted attacks
    Attacks via remote turbine service centers
  • Conventional turbine monitoring & diagnostics vs. remote monitoring with  Unidirectional Security Gateways
  • Unidirectional Security Gateways
Share
About the author
Picture of Andrew Ginter, VP Industrial Security at Waterfall Security Solutions

Andrew Ginter, VP Industrial Security at Waterfall Security Solutions

At Waterfall, Andrew leads a team of experts who work with the world’s most secure industrial sites. He is author of two books on industrial security, a co-author of the Industrial Internet Consortium’s Security Framework, and the co-host of the Industrial Security Podcast. Andrew spent 35 years designing SCADA system products for Hewlett Packard, IT/OT connectivity products for Agilent Technologies, and OT/ICS security products for Industrial Defender and Waterfall Security Solutions.

Fill out the form and get it by email