This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


Cliquez ici pour obtenir de l'aide :

  • pc

    Ransomware Protection Storage in the Electric Power Industry

    Build the last line of defense for power data security.

Power Data Security Is Fundamental

From generation, transmission, and transformation to distribution, consumption, and dispatching, today's electric power enterprises are in the business of data. Indeed, data has become the core asset of the industry, only heightening the threat of data blackmail to the security and stability of power grids.

Energy Safety
Tampering with key data — from monitoring and warning information to the operational instructions of key nodes — can causepower system faults or major security incidents.
Reputational Damage
The exposure of sensitive information causes damage to an enterprise's reputation.
Economic Loss
According to an IBM report in 2020, the average cost of data breaches in the energy industry is US$6.39 million each incident.
Service Interruption
Malicious encryption of a database paralyzes power company services.

Ransomware Attacks in the Electric Power Industry

Electric power enterprises and infrastructure are the focus of attacks.

The double extortion model increases the risk of data breach.

Ransomware as a Service (RaaS).

The supply chain becomes the main entry point for extortion attacks.

Advanced Persistent Threat (APT)-like ransomware attacks.

The new normal of insecure data.

Four Layers of Protection

From primary storage to backup, Huawei's Ransomware Protection Storage Solution provides four layers of protection, better securing the data assets of electric power customers.

Key Technologies

The Huawei Ransomware Protection Storage Solution covers Storage Area Network (SAN), Network-Attached Storage (NAS), and backup storage scenarios. Key technologies — including storage encryption, air gap, secure snapshot, and WORM — are used to implement data anti-tampering, security detection, and secure recovery.

  • E2E Data Encryption

    Protocol-layer encryption NFS, CIFS/SMB.

    Advanced Encryption Standard (AES)-256 encryption of production and backup data.

    Encryption during air gap replication.

    Encryption during remote replication of data and copies.

  • Air Gap Replication

    By setting the replication Service Level Agreement (SLA), data copies are automatically and periodically replicated from the production or backup storage to the isolation environment. The replication link is active only during replication, which ensures data copies are offline most of the time, reducing the possibility of attacks.
  • File System WORM and Secure Snapshot

    A protection period can be set for production or backup data to prevent data modification or deletion during this time range.

    Secure snapshots ensure storage data is read-only and cannot be modified or deleted within a specified time range.

  • Ransomware Detection

    A baseline model is established based on historical data to check for any abnormalities in the changed feature values of the metadata of copies.

    Abnormal copies are further compared to determine file size changes, entropy values, and similarities.

    The Machine Learning (ML) model is used to determine whether file changes are caused by ransomware encryption, flagging them accordingly.


How Does It Work?

With secure snapshot, WORM, air gap, and ransomware detection technologies, the solution prevents data tampering while ensuring data detection and recovery.

Stop Ransomware Attacks

In the event of an attack, time matters and speed counts. The solution helps enterprises effectively defend against ransomware attacks, ensuring information security and operational stability.