<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1815-5928</journal-id>
<journal-title><![CDATA[Ingeniería Electrónica, Automática y Comunicaciones]]></journal-title>
<abbrev-journal-title><![CDATA[EAC]]></abbrev-journal-title>
<issn>1815-5928</issn>
<publisher>
<publisher-name><![CDATA[Universidad Tecnológica de La Habana José Antonio Echeverría, Cujae]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1815-59282023000200014</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Sistema para la supervisión de indicadores productivos y tecnológicos en la Planta Cloro-Sosa ELQUIM]]></article-title>
<article-title xml:lang="en"><![CDATA[System for the supervision of productive and technological indicators in the ELQUIM Chlorine-Soda Plant]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Mesa Martínez]]></surname>
<given-names><![CDATA[Marcel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sojo Hernández]]></surname>
<given-names><![CDATA[Miguel Luis]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ámbar Pérez]]></surname>
<given-names><![CDATA[Guillermo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Santana Ching]]></surname>
<given-names><![CDATA[Ivan]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Empresa de Tecnología e información para la defensa  ]]></institution>
<addr-line><![CDATA[Habana ]]></addr-line>
<country>Cuba</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Central Marta Abreu de Las Villas  ]]></institution>
<addr-line><![CDATA[Villa Clara ]]></addr-line>
<country>Cuba</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2023</year>
</pub-date>
<volume>44</volume>
<numero>2</numero>
<fpage>14</fpage>
<lpage>23</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S1815-59282023000200014&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S1815-59282023000200014&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S1815-59282023000200014&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Tradicionalmente, los Sistemas de Control Industrial han estado aislados en redes privadas y altamente seguras. Sin embargo, en los últimos años ha surgido una tendencia hacia la integración de estos sistemas con Internet, buscando facilitar el intercambio de datos fundamentales para la gestión empresarial y la toma de decisiones precisas en el ámbito de la producción. Este movimiento hacia la convergencia con Internet plantea desafíos significativos en el ámbito de la ciberseguridad. La empresa Electroquímica (ELQUIM) de Sagua la Grande implementó recientemente una nueva planta más productiva y segura. Un Sistema de Control Industrial supervisa y controla los parámetros productivos y tecnológicos de la planta, sin embargo, no existía un mecanismo de recolección y almacenamiento de los mismos desde la zona empresarial. Se diseñó un sistema para la adquisición de forma segura de los datos de la zona de procesos y colocarlos disposición de los especialistas y tecnólogos en la zona empresarial. A través de esta información los tecnólogos pueden detectar un mal funcionamiento de la planta, así como mejorar los procesos productivos de la misma. Como software de supervisión fue utilizado el SCADA ErosXD diseñado y programado por las empresas SERCONI y XETID.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Traditionally, Industrial Control Systems have been isolated in private and highly secure networks. However, in recent years a trend has emerged towards the integration of these systems with the Internet, seeking to facilitate the exchange of fundamental data for business management and making precise decisions in the field of production. This movement towards convergence with the Internet poses significant challenges in the field of cybersecurity. The Electrochemical company (ELQUIM) of Sagua la Grande recently implemented a new, more productive and safer plant. An Industrial Control System supervises and controls the productive and technological parameters of the plant, however, there was no mechanism for collecting and storing them from the business area. A system was designed to securely acquire data from the process area and place it at the disposal of specialists and technologists in the business area. Through this information, technologists can detect malfunctions in the plant, as well as improve its production processes. The SCADA ErosXD designed and programmed by the companies SERCONI and XETID was used as supervision software.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Sistemas de Control Industrial (ICS)]]></kwd>
<kwd lng="es"><![CDATA[Cortafuegos]]></kwd>
<kwd lng="es"><![CDATA[SCADA]]></kwd>
<kwd lng="es"><![CDATA[Supervisión]]></kwd>
<kwd lng="es"><![CDATA[Ciberseguridad]]></kwd>
<kwd lng="en"><![CDATA[Industrial Control System (ICS)]]></kwd>
<kwd lng="en"><![CDATA[Firewall]]></kwd>
<kwd lng="en"><![CDATA[SCADA]]></kwd>
<kwd lng="en"><![CDATA[Supervision]]></kwd>
<kwd lng="en"><![CDATA[Cybersecurity]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Plamowski]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perspectives of DCS and SCADA Systems in High-energy Physics Experiments]]></article-title>
<source><![CDATA[Acta Phys Polon Supp.]]></source>
<year>2018</year>
<volume>11</volume>
<page-range>681-4</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lakhoua]]></surname>
<given-names><![CDATA[NM.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Review on SCADA Cybersecurity for Critical Infrastructures]]></article-title>
<source><![CDATA[Journal of Computer Science and Control Systems]]></source>
<year>2017</year>
<volume>10</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>15-8</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bhamare]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Zolanvari]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Erbad]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Jain]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Meskin]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity for industrial control systems: A survey]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2020</year>
<volume>89</volume>
</nlm-citation>
</ref>
<ref id="B4">
<label>4.</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brooks]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Chin]]></surname>
<given-names><![CDATA[S-K]]></given-names>
</name>
</person-group>
<source><![CDATA[Introduction to the Minitrack on Internet of Things Security: CyberAssurance for Edge, Software Defined, and Fog Computing Systems]]></source>
<year>2021</year>
<conf-name><![CDATA[ 54Hawaii International Conference on System Sciences]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B5">
<label>5.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alladi]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Chamola]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Zeadally]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Industrial Control Systems: Cyberattack trends and countermeasures]]></article-title>
<source><![CDATA[Computer Communications]]></source>
<year>2020</year>
<volume>155</volume>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6.</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Syed]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[T-H]]></given-names>
</name>
<name>
<surname><![CDATA[Svetinovic]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Rahwan]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Aung]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security for Complex Cyber-Physical and Industrial Control Systems]]></article-title>
<source><![CDATA[Current Trends, Limitations, and Challenges]]></source>
<year>2017</year>
<publisher-name><![CDATA[AIS eLibrary]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carter]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Sofio]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity Legislation and Critical Infrastructure Vulnerabilities]]></article-title>
<source><![CDATA[Foundations of Homeland Security: Law and Policy]]></source>
<year>2017</year>
<edition>2</edition>
<page-range>233-49</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sabillon]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Cavaller]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Cano]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[National Cyber Security Strategies: Global Trends in Cyberspace]]></article-title>
<source><![CDATA[International Journal of Computer Science and Software Engineering (IJCSSE)]]></source>
<year>2016</year>
<volume>5</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>67-81</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9.</label><nlm-citation citation-type="">
<collab>Ministerio de Comunicaciones</collab>
<source><![CDATA[Decreto-Ley No. 370/2018. Sobre la Informatización de la Sociedad en Cuba]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B10">
<label>10.</label><nlm-citation citation-type="">
<collab>Ministerio de Comunicaciones</collab>
<source><![CDATA[Decreto No. 360/2019. Sobre la Seguridad de las Tecnologías de la Información y la Comunicación y la Defensa del Ciberespacio Nacional]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B11">
<label>11.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Socarrás]]></surname>
<given-names><![CDATA[HE]]></given-names>
</name>
<name>
<surname><![CDATA[Santana]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberseguridad del Sistema de Control Industrial de la Planta Cloro-Sosa ELQUIM]]></article-title>
<source><![CDATA[RISTI - Revista Ibérica de Sistemas e Tecnologias de Informação]]></source>
<year>2019</year>
<page-range>83-96</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Robles-Durazno]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Moradpoor]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[McWhinnie]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Russell]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Porcel-Bustamante]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems]]></article-title>
<source><![CDATA[Symmetry]]></source>
<year>2021</year>
<volume>13</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>519-37</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Achievement of High Availability and Low Cost on Data Center Infrastructure]]></article-title>
<source><![CDATA[Transactions on Networks and Communications]]></source>
<year>2017</year>
<volume>5</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>24-38</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Benítez-Pina]]></surname>
<given-names><![CDATA[IF.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Diseño de un sistema de supervisión y control del centro de datos del Grupo Empresarial CUBANÍQUEL]]></article-title>
<source><![CDATA[LADEE]]></source>
<year>2022</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-24</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
