|Publisher||Society of Petroleum Engineers||Language||English|
|Content Type||Conference Paper|
|Title||Protecting the Digital Oil Field from Emerging Cyber Threats|
Ayman AL-Issa, Abu Dhabi Marine Operating Company (ADMA-OPCO)
Abu Dhabi International Petroleum Conference and Exhibition, 11-14 November 2012, Abu Dhabi, UAE
2012. Society of Petroleum Engineers
|2.4.3 Data and Communications Security
2.4.2 Security of Operating Facilities
2.4.1 Facility Vulnerability Assessment
Whilst best-in-class automation has been put place in industrial plants during the past few years, brought about by the developments in Industrial Control Systems (ICS), the industry has become vulnerable to new types of industrial risks. The Distributed Control Systems (DCS), Safety Instrumented Systems (SIS), Fire and Gas Systems (F&G), SCADA Systems, etc that were put in place are essentially computer systems and became the source of concern as these have become intentional targets to hackers, espionage and blackmailers. The cyber security threat to process control networks and systems was also increasing with successful industrial attacks taking place.
Integrated operations in exploration, drilling, processing, refining and almost all oil and gas process operations are using such systems. The Digital Oil Field (DOF) vision materialized as a result of the advances in the application of automation, remote control, real-time data acquisition, and the enablement of collaborative work environments. This vision essentially raised the need to integrate the process control systems with corporate business networks. This has led to the vital need to put in place a robust industrial cyber security infrastructure. This paper will discuss:
• A first of its kind cyber defense infrastructure design for protecting the
Digital Oil Fields and Critical Infrastructures from Cyber attacks.
“The Digital Oil Field & the Emerging Cyber Threats”
DOF wouldn’t have been a reality without the use of smart field devices, integrating industrial automation systems with each other, integrating the ICS with corporate networks/systems, and achieving real-time data acquisition.
Automation systems used within DOF are of a similar nature to the IT systems
used in enterprise networks, and also became subject to similar cyber threats
that target the enterprise systems. Today’s Cyber Security threats transformed
beyond the nature of simple virus spread, computer or data damage, and data
theft to the nature of ones that have the capabilities of changing the process
plant operations, for example :