Skip to main content

Table 3 Analysis results with an attacker positioned at the Software/Hardware Vendor

From: Load balancing of renewable energy: a cyber security analysis

Variants

1st & 2nd RTUs

DER RTU

SCADA servers

Model variant A (no DMZ / less secure)

16 days

18 days

13 days

Model variant B (no DMZ / more secure)

21 days

22 days

15 days

Model variant C (DMZ / less secure)

57 days

60 days

53 days

Model variant D (DMZ / more secure)

87 days

85 days

73 days