Improving Water and Wastewater SCADA Cyber Security

Size: px
Start display at page:

Download "Improving Water and Wastewater SCADA Cyber Security"

Transcription

1 Improving Water and Wastewater SCADA Cyber Security Standards Certification Education & Training Publishing Conferences & Exhibits Speakers: Bill Phillips and Norman Anderson 2012 ISA Water & Wastewater and Automatic Controls Symposium August 7-9, 2012 Orlando, Florida, USA

2 Presenter Bill Phillips, PE: Bill specializes in delivery of secure and reliable process control and SCADA network and communications systems, cyber security vulnerability assessment, and facility automation and information system planning and implementation. Bill has over 30 years of process control and SCADA system experience and has focused on control system network and communications cyber security for the last decade. Bill has a BSEE from Clemson University. Aug 7-9, 2012 Orlando, Florida, USA 2

3 Presenter Norman Anderson, PE: Norman has over 5 years experience in the design and commissioning of Process Control Systems for the Water Sector. Norman has provided secure and reliable PLC, SCADA, and Network hardware and software architecture designs and provided control system automation solutions for a range of facilities. Norman has an M.S. in EE from Iowa State University and an M.S. in Physics from the University of Florida. Aug 7-9, 2012 Orlando, Florida, USA 3

4 Presentation Outline Need to secure control systems Continuing increase in Cyber Attacks Notable Cyber Attacks Available Guidance and Resources Standards Design Guides Assessment/Design/Implementation/Operation Determining Risk factors and mitigation techniques Our Experience and Examples Summary Aug 7-9, 2012 Orlando, Florida, USA 4

5 General Increase In Cyber Attacks Number of Vulnerabilities 9,000 8,000 7,000 6,000 5,000 4,000 3,000 2,000 1,000 0 CERT Cataloged Vulnerabilities Year General Trend of increase in incidents and vulnerabilities. CERT stopped incident monitoring in *Source: CERT Statistics Incidents Reported Vulnerabilities Aug 7-9, 2012 Orlando, Florida, USA Year 5 0 CERT Reported Incidents Incidents

6 Reported Incidents by Infrastructure Sector Water/Wastewater is #4 on the list and has twice the incident rate of most commercial facilities. *Source: Summarized by Infrastructure Sector (RISI, 2010) Aug 7-9, 2012 Orlando, Florida, USA 6

7 Industrial Security Incident Attack Points of Entry Many attacks are through local business networks and via remote access. These are two common connections to industrial networks to allow for machines having and internet access to connect to SCADA networks and to allow remote vendors to connect to SCADA networks for maintenance. *Source: Summarized by Points of Entry (RISI, 2010) Aug 7-9, 2012 Orlando, Florida, USA 7

8 Financial Impacts Approximately 23% of the industrial security incidents resulted in damages greater than one million dollars per incident. *Source: Reported in the U.S. (RISI, 2010) Aug 7-9, 2012 Orlando, Florida, USA 8

9 Media Coverage Pump destroyed at water plant Springfield, IL o Believed to be due to cyberattack (not confirmed by DHS). o Story covered by news media such as the Washington Post, Fox News, CNN, and MSNBC o Even though unconfirmed, the utility was in the national spotlight for weeks Texas SCADA system hacked and screenshots of HMI released o Response to DHS downplay of IL incident o Again carried by major news media o Used a virtual network connection with the internet with simple password to access network Aug 7-9, 2012 Orlando, Florida, USA 9

10 More Infamous Attacks Maroochy Shire Sewage Treatment Plant in Queensland, Australia. o Attack resulted in approximately 212,000 gallons of raw sewage to spill out into local parks, rivers, and a nearby hotel. o The attack was perpetrated by a disgruntled insider and former Contractor, Vitek Boden, that previously installed the radio-controlled SCADA equipment for the plant. o During the attack period, Boden used a laptop computer and stolen radio on at least 46 occasions to issue unauthorized radio commands to the SCADA System (Abrams and Weiss, 2008) Aug 7-9, 2012 Orlando, Florida, USA 10

11 More Infamous Attacks, Continued Stuxnet High sophisticated WORM to target Siemens PLCs Used to destroy centrifuges used for uranium enrichment Deployed using USB flash media devices (thumb drives) o No external connections does not equal safety Showed the weaknesses of Industrial Control Systems Native Code Code with virus Duqu (Stuxnet Variant) Discovered by Symantec and appears to be a variant of Stuxnet Not intended to destroy industrial control systems but to steal information from them Aug 7-9, 2012 Orlando, Florida, USA 11

12 Common Vulnerabilities Denial of Service (DoS): Attempt to make computer network unavailable Would slow or shutdown the communications SCADA network Mitigation techniques include Firewalls, ACLs, Intrusion Prevention Systems SQL Injection Attacks SQL databases using vulnerabilities in websites Can steal database information or destroy data Mitigation techniques include effective patch management, Intrusion Prevention Systems DCOM Most notable are RPC DCOM and Blaster attacks Can take control of computer and install programs, view, delete, etc. Mitigation includes use of intrusion detection, packet filtering, and network segmentation, and port blocking Aug 7-9, 2012 Orlando, Florida, USA 12

13 Example Control System Attack Animation Explains Control System Attack By Remote Attacker Aug 7-9, 2012 Orlando, Florida, USA 13

14 Importance of Security Why Security is Important at a Water or Wastewater Facility: Critical Infrastructure and Public Safety o Critical resources o Downtime can affect life safety Operational Reliability and Availability o Attacks can lead to significant downtime Financial Impacts o Loss of revenue for utility and its customers o Mitigation and legal costs Media Attention o Loss of public confidence ostaff intimidation Aug 7-9, 2012 Orlando, Florida, USA 14

15 Available Guidance AWWA Roadmap to Secure Control Systems in the Water Sector published in 2008 o Goal is in 10 years to have no loss in critical function due to cyber attack o Develops a roadmap with goals at the 1, 3, and 10 year marks. Currently in year 4 (mid-term) of program ANSI/ISA Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program o Builds upon global standards ISO/IEC and ISO/IEC and addresses the difference needed for industrial security o Defines procedures for implementing and assessing secure industrial control systems Aug 7-9, 2012 Orlando, Florida, USA 15

16 Available Guidance, Continued NIST SP o Final Version Published: o Goal is to provide a guideline for critical infrastructures to secure their control systems with the idea to maintain systems online and operating unlike traditional IT systems. NERC Critical Infrastructure Protection (CIP) o Numbers CIP through CIP (18 standards) related to Cyber security implementation plans o Covers implementation of management controls as well as operating procedures for personnel Aug 7-9, 2012 Orlando, Florida, USA 16

17 Available Guidance, Continued Cisco/Rockwell Automation Converged Plantwide Ethernet (CPwE) Design and Implementation Guide oprovides design and implementation guidelines for industrial control systems based on the manufacturing industry ogoal is to provide less downtime, higher security, and optimization of Industrial Ethernet networks o Guide provides real network architecture examples, security methods, and implementation methods Aug 7-9, 2012 Orlando, Florida, USA 17

18 Securing Networks Securing networks requires proper planning to ensure successful implementation. There are four basic stages of planning and implementation for network security: 1. Assessment Determine Risks and Mitigation techniques Risk impact versus cost of mitigation 2. Design Develop appropriate network architecture and segmentation (NOTE : Taylor to selected HMI suite TCP/UDP port requirements) Choose necessary hardware and software 3. Implementation Qualified and certified installers and designers 4. Operation and Maintenance Develop operational procedures for staff Maintain network, hardware, and software Aug 7-9, 2012 Orlando, Florida, USA 18

19 Assessment The Critical Starting Point First step for proper network security Past Assessments were largely based on RAM-W This method was not very specific or comprehensive Limited guidance was available at the time US-CERT Cyber Security Evaluation Tool (CSET) Developed by DHS to assist in protecting key assets with assistance from NIST Available free from the US-CERT website: [training from Control System Security Program (CSSP) also provided] Uses 4 major steps and generates a report based on current industry standards Assessment is then used to plan and prioritize mitigation solutions Aug 7-9, 2012 Orlando, Florida, USA 19

20 Typical Large Utility Control System Network Aug 7-9, 2012 Orlando, Florida, USA 20

21 Typical Small Utility Control System Network Aug 7-9, 2012 Orlando, Florida, USA 21

22 Typical Small Remote Systems No matter the size of the network there are still critical systems to protect. Process control networks are inherently different than IT business networks even though many components are similar. Aug 7-9, 2012 Orlando, Florida, USA 22

23 Wastewater Utility Control System Design Example Includes redundant WAN connections Internet connection for WAN extension to remote facilities & mobile remote access Compact resilient core network Uses VLANs and firewall subinterfaces to tailor network architecture to SCADA HMI applications suite requirements and to securely support business network access Aug 7-9, 2012 Orlando, Florida, USA 23

24 Network Segmentation Using VLANs Network organization secures and helps maintain networks. Virtual LANs (VLANs) - Useful for SCADA systems because VLANs define broadcast domains that can be widely separated (i.e. not on the same network segment) Can reduce costs, by allowing host on different networks to share layer 2 switches. Use 802.1q VLAN encapsulation protocol Layer 3 device required to route between VLANs, some Layer 2 devices will support VLANs to some extent. VLAN Approach: o VLAN Range: (normal) & (extended) o Don t Use VLAN 1 (Native VLAN) o Verify VLAN capabilities of network switches & routers o Use logical approach o Incorporate VLAN designations into IP Addresses Aug 7-9, 2012 Orlando, Florida, USA 24

25 Network Segmentation Using VLANs (Example) Example: VLAN 10 Network Management VLAN 20 SCADA DMZ VLAN 30 SCADA VLAN 40 Security (Video) VLAN 50 Remote User (DMZ) VLAN 100 Public Media WAN (Inter Facility VPNs) VLAN 110 Backup Public Media WAN Extensions: (For shared media) VLAN 60 Business VLAN 70 Business Remote User (DMZ) Aug 7-9, 2012 Orlando, Florida, USA 25

26 Network IP Addressing Approach: Use private network Class A for primary VLANs Use private Class Cs for routed links Incorporate facility & VLAN numbers into IP addresses Limit broadcast domains to a single facility Primary VLAN Example: 10.VLAN.Facility.Host/X or 10.Facility.VLAN.Host/X X = Subnet Mask bit count X (between 24 &30) based on anticipated host count WAN Example: Y/X X = Subnet Mask bit count (between 24 & 30) based on number of nodes Y (between 0 & 252) = Network Number Aug 7-9, 2012 Orlando, Florida, USA 26

27 Example Firewall Configuration Specification Security Levels - Implicit Deny Lower-to-Higher level Interfaces Typically 3-4 for small to medium size firewalls Sub-interfaces can extend that number Stateful Inspection Can drop otherwise legitimate packets that are not part of an active connection Holds in memory variables defining the state of each connection State variables include things like source and destination addresses, port numbers, packet sequence numbers Access Control Lists Used to apply access control rules at interfaces Format: access-list-number {permit deny} protocol source {sourcemask} destination {destination-mask} [eq destination-port] Aug 7-9, 2012 Orlando, Florida, USA 27

28 Example Firewall Configuration Specification Security Levels Each Interface & Sub-interface Inside 100 (Most trusted) Outside 0 (Least trusted) DMZ 50 Access Control Lists Permit DMZ to-inside SCADA specific traffic such as web server, terminal server and historian traffic. Permit VPN LAN-to-DMZ authenticated remote user traffic such as web server, terminal server and historian traffic. Remote PLC Connections: Consider a Remote PLC DMZ to avoid direct connections between Internet connected PLCs and the SCADA network Consider dual Ethernet DMZ PLC interfaces (i.e. separate VLANs) to increase separation. Aug 7-9, 2012 Orlando, Florida, USA 28

29 Domain Controller Implementation Use group policies to manage role based access Separate controllers required for each domain Domain Controller and Active Directory Traffic Uses Remote Procedure Calls (RPC) and Distributed Component Object Model (DCOM) which introduce numerous vulnerabilities. Should not be permitted across firewall boundaries (i.e. don t extend the corporate domain into the SCADA DMZ) Exception When a Read-only Domain Controller (drastically reducing port requirements) is used with an IPSec VPN tunnel connection to extend the SCADA domain into the SCADA DMZ Generally worth the trouble to ease implementation & maintenance of role based access & remote access using RADIUS authentication Aug 7-9, 2012 Orlando, Florida, USA 29

30 Remote VPN Connections VPNs can securely extend WANs using public media & provide secure remote access to mobile staff Remote Facility Connections Using IPSec Site-to-Site VPNs Used to interconnect two or more facility LANs Encrypts entire IP packet including endpoint private IP addresses Provides, confidentiality, data integrity, origin authentication and replay protection Mobile Remote User Connections TLS/SSL VPNs Uses browser interface to connect mobile remote clients to servers Operate at the session level to provide secure client/server connections Uses certificates to authenticate servers & clients. Uses symmetric keys to provide confidentiality and data integrity Aug 7-9, 2012 Orlando, Florida, USA 30

31 VPN Tunnel with Encryption Aug 7-9, 2012 Orlando, Florida, USA 31

32 Remote Access VPNs Aug 7-9, 2012 Orlando, Florida, USA 32

33 Firewalls for Network Security and Routing Aug 7-9, 2012 Orlando, Florida, USA 33

34 Converged Plantwide Ethernet (CPwE) Design & Implementation Guide (DIG) LAN resilience alternatives shown & performance comparisons. L2&3 QoS settings recommendations DMZ Example tailored to SCADA CPwE DIG Developed by Cisco Systems & Rockwell Automation Provides detailed guidance & includes LAN configuration alternative testing results These figures from the DIG are from the LAN and DMZ design chapters Aug 7-9, 2012 Orlando, Florida, USA 34

35 Designing and Implementation Roadblocks Conflicts faced by utilities Lack of regulatory driver Many competing needs Losing sleep each time another event makes the news. What to do? Utility staffs are a resourceful bunch and they find a way to address their concerns Some are able to get funding to specifically address cyber security. Others have to be more creative. Utilities often lack resources to self-perform SCADA security assessments & improvements planning, design and implementation, as mentioned before, there is help. Aug 7-9, 2012 Orlando, Florida, USA 35

36 Designing and Implementation Roadblocks, Continued Our experience Some utilities, usually bigger ones, have adopted appropriate standards and established internal policies, procedures and standards that they apply to each project More commonly, the utility hasn t established comprehensive standards and isn t aware of the vulnerabilities in their existing systems; but would like to make progress as part of each project. Sometimes it s a grass roots or replacement project which means that they are open to a comprehensive solution but do have budgetary constraints. Other times it more like what can we shoehorn into this small incremental project. Aug 7-9, 2012 Orlando, Florida, USA 36

37 Example - Incremental Implementation IPSec VPN Tunnel 10 BaseTX 100 BaseTX 100 BaseFX mu Layer 3 Switch W/ EIGRP /2611 W/ EIGRP100 Tx/Fx Layer 2 Switch ASA 5510 WasteWater- SCADA-SERVER PLANT 1 MOSCAD MTU Modbus WASTEWATER- MODBUS-IP- SCADA-VIEW CONVERTER P1Switch Plant1-SCADA-2960TT-1 Fa0/0 PLANT 2 Industrial Park PLC WW-SCADA-SRVR1 WW-SCADA-SRVR2 Plant2-SCADA-2960TC-1 MTU PLC PLC1A HP JetDirect Lift Station 14.2 Plant2-WW-L14_ PLC1B Switch Westside Blvd SE SERVER PLC Cabinet OIU PLC PLC (Redundant Quantum) PLC Box PLC WELL BASE-TX/100BASE-FX Media Converter 54mbps Plant1-SCADA Tank 15 Well15-SCADA LS8 PLC LS 8 Modbus Serial 54mbps Esteem Access Point MODBUS-IP- CONVERTER MODBUS-IP- CONVERTER Esteem Access Point Plant3-SCADA-2960TT-1 PLANT 3 Address? Modbus Modbus+ P3 PLC LS13 PLC LS21 PLC 1536Kb/s (CIR) 58/KDFN/103677/TWCS Plant2-SCADA Kb/s (CIR) 58/KDFN/103674/TWCS Plant 6 SCADA VIEW 1536Kb/s (CIR) 58/KDFN/103608/TWCS Plant6-SCADA Plant6-SCADA-2960TT-1 Remote Connections Point-to-Point Connection to Well 12 Esteem AP Bridge Esteem AP Bridge Exalt AP Bridge 54mbps Proxima AP Bridge 54mbps Remote VPN User Remote VPN User Remote VPN User Plant3-SCADA Kb/s (CIR) 58/KDFN/10367?/TWCS TW Telecom Metro Ethernet (ILAN) Layer-2 (Bridged) 1536Kb/s (CIR) 58/KDFN/103608/TWCS Remote Connection to BPS Kb/s (CIR) Exalt AP Bridge Proxima AP Bridge CITY CENTER 58/KDFN/103610/TWCS 1536Kb/s (CIR) CityCenter-SCADA TW Telecom Internet 58/KDFN/103609/TWCS W DMZ Well10CC-SCADA_DMZ-2960TT-1 WWTP1SCADA3 (HIST) 6Mb/s (CIR) 58/KDFN/103600/TWCS WW DMZ SCADA-ASA: 5510s in HA 20Mb/s (CIR) 58/KDFN/103604/TWCS WELL 10 (Control Center) Well10-WATER-2960TC-1 RX3I Well 10A Building Control Panel 54mbps Proxima AP Bridge Esteem AP Bridge Remote Connections W-SCADA-WIN911 WW-SCADA-HIST Well10-WATER WELL 8 Proxima AP Bridge W-SCADA-TS W_SCADA_CLIENT2 Well10CC-SCADA Well 10 Control Center WW-SCADA-WIN Redhill Place Well10-WATER W-SCADA-2960TT-1 Dell 2700 OIT BPS WWTP12850 ( ) WW-SCADA-TS WW-SCADA-2960TT-1 W-SCADA-2960TT-1 PLC Well8-SCADA SHARED DMZ [FUTURE] SCADA-DMZ-RODC01 SCADA-DMZ-RODC02 (DC, NTP, Anti-virus, WSUS) WW-SCADA-CLNT W-SCADA-CLIENT1 (WATER VIEW) W-SCADA-DEV-1 W-SCADA-SERVER1 (Z400) RX3I SHARED SCADA SCADA-DCSEC SCADA-DCPRI Well 10 Booster ATF OIT PLC Esteem AP Bridge Remote Connections Aug 7-9, 2012 Orlando, Florida, USA 37

38 Example Incremental Installation Initial installation can be done using a single Ethernet switch and no remote connections. Remote connections can be added in the future when they can be secured correctly. Design supports adding disaster recovery elements as budgets allow Initial equipment can be upgraded in the future through firmware to add required additional services such as high availability. Aug 7-9, 2012 Orlando, Florida, USA 38

39 Example - Single Implementation by Phased and Sequenced Construction Aug 7-9, 2012 Orlando, Florida, USA 39

40 Keys to Successful Implementation (Abbreviated Version of a Long List) Use equipment with a long useful lifetime and low risk of becoming completely obsolete in the short term. Have a budget in mind and idea of the risk/reward of network connected systems and equipment. Be aware that equipment cost is not an indication of work costs. A $1000 router could cost as much to configure as a $15,000 industrial router. Are staff or service contracts in place to maintain and troubleshoot systems? Systems are only as good as the maintenance done. Make sure that good system documentation and training will be delivered with the improvements. Set up a secure backup configuration storage mechanism & keep a copy of all addressing, configurations, settings, and software. Use qualified integrators having the proper certifications where appropriate. Aug 7-9, 2012 Orlando, Florida, USA 40

41 Defense in Depth A strategy for layering protection mechanisms to reduce the impact of a single mechanism failure In addition to the technical and operational controls that can be applied to SCADA systems, defense in depth requires long term organizational management and operations commitment to security for: Developing security policies, procedures and educational materials that apply directly to SCADA Conducting periodic security awareness, incident response and disaster recovery training Ongoing maintenance and upgrade of SCADA security throughout its lifecycle Restricting physical access to SCADA infrastructure Aug 7-9, 2012 Orlando, Florida, USA 41

42 User Access Require login credentials with secure passwords and auto logouts Use USB security where ports are available Simple user interface. Do not allow access to the start menu or other nonessential programs Do not allow access to the computer Aug 7-9, 2012 Orlando, Florida, USA 42

43 Summary The jury is in, the threat is real and utilities need to act Adequate guidance is available to support standards based cyber security improvements The DHS CSET tool and INL assessment support team provide a SCADA focused tool for conducting selfassessments Without a regulatory driver, funding continues to be a problem. Proper planning, implementation, and maintenance is key for a successful system. Systems cannot be installed and forgotten. Utilities are finding a way to make meaningful progress with both funding and solutions. Aug 7-9, 2012 Orlando, Florida, USA 43

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations

More information

Preventing Cyber Security Attacks Against the Water Industry

Preventing Cyber Security Attacks Against the Water Industry Preventing Cyber Security Attacks Against the Water Industry Presented by Michael Karl October 2012 Acknowledgements Infracri5cal SCADA Security Newsgroup CH2M HILL, Automa5on Cyber- Security Prac5ce Team

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access

More information

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Security for. Industrial. Automation. Considering the PROFINET Security Guideline Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures

More information

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi etieghi@visionautomation.

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi etieghi@visionautomation. Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems Enzo M. Tieghi etieghi@visionautomation.it Security IT & Control System Security: where are we?

More information

Designing a security policy to protect your automation solution

Designing a security policy to protect your automation solution Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...

More information

Session 14: Functional Security in a Process Environment

Session 14: Functional Security in a Process Environment Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Are you prepared to be next? Invensys Cyber Security

Are you prepared to be next? Invensys Cyber Security Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber

More information

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric Challenges What challenges are there for Cyber Security in Industrial

More information

OPC & Security Agenda

OPC & Security Agenda OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information

More information

The Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015

The Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 The Internet of Things (IoT) and Industrial Networks Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 Increasingly Everything will be interconnected 50 Billion Smart Objects

More information

Computer System Security Updates

Computer System Security Updates Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

SCADA Cyber Security

SCADA Cyber Security SCADA Cyber Security Information on Securing SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com

More information

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005 SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information

Cisco SR 520-T1 Secure Router

Cisco SR 520-T1 Secure Router Secure, High-Bandwidth Connectivity for Your Small Business Part of the Cisco Small Business Pro Series Connections -- between employees, customers, partners, and suppliers -- are essential to the success

More information

Industrial Security Solutions

Industrial Security Solutions Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats

More information

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco Secure Access into Industrial Automation and Systems Industry Best Practice and Trends Serhii Konovalov Venkat Pothamsetty Cisco Vendor offers a remote firmware update and PLC programming. Contractor asks

More information

DeltaV System Cyber-Security

DeltaV System Cyber-Security January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

13 Ways Through A Firewall

13 Ways Through A Firewall Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright

More information

High Performance, Secure VPN Servers for Remote Utility, Industrial Automation Systems:

High Performance, Secure VPN Servers for Remote Utility, Industrial Automation Systems: High Performance, Secure VPN Servers for Remote Utility, Industrial Automation Systems: Water Pumping Station Security Case Study Industrial Network Security: New Threats The convergence of IT and industrial

More information

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc. Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Networking Devices Part 2 Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course

More information

Dr. György Kálmán gyorgy@mnemonic.no

Dr. György Kálmán gyorgy@mnemonic.no COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán gyorgy@mnemonic.no Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats

More information

Decrease your HMI/SCADA risk

Decrease your HMI/SCADA risk Decrease your HMI/SCADA risk Key steps to minimize unplanned downtime and protect your organization. Are you running your plant operations with serious risk? Most industrial applications lack recommended

More information

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

Resilient and Secure Solutions for the Water/Wastewater Industry

Resilient and Secure Solutions for the Water/Wastewater Industry Insert Photo Here Resilient and Secure Solutions for the Water/Wastewater Industry Ron Allen DA/Central and Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Cyber Security IT People Geeks How

More information

Three Simple Steps to SCADA Systems Security

Three Simple Steps to SCADA Systems Security Three Simple Steps to SCADA Systems Security Presented by: Gabe Shones, PE / Gilbert Kwan, PE Insert Photo Here Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011 Chicago, IL

More information

Verve Security Center

Verve Security Center Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution

More information

13 Ways Through A Firewall What you don t know will hurt you

13 Ways Through A Firewall What you don t know will hurt you Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

Securing the Connected Enterprise

Securing the Connected Enterprise Securing the Connected Enterprise ABID ALI, Network and Security Consultant. Why Infrastructure Matters Rapidly Growing Markets Global Network Infrastructure and Security Markets 13.7% CAGR over the next

More information

Logical & Physical Security

Logical & Physical Security Building a Secure Ethernet Environment By Frank Prendergast Manager, Network Certification Services Schneider Electric s Automation Business North Andover, MA The trend toward using Ethernet as the sole

More information

Securing EtherNet/IP Using DPI Firewall Technology

Securing EtherNet/IP Using DPI Firewall Technology Securing EtherNet/IP Using DPI Firewall Technology www.odva.org Technical Track About Us Erik Schweigert Leads device firmware development at Tofino Security BSc in Computer Science from VIU Michael Thomas

More information

Innovative Defense Strategies for Securing SCADA & Control Systems

Innovative Defense Strategies for Securing SCADA & Control Systems 1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: info@plantdata.com Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

Effective Defense in Depth Strategies

Effective Defense in Depth Strategies Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

- Introduction to PIX/ASA Firewalls -

- Introduction to PIX/ASA Firewalls - 1 Cisco Security Appliances - Introduction to PIX/ASA Firewalls - Both Cisco routers and multilayer switches support the IOS firewall set, which provides security functionality. Additionally, Cisco offers

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

IT Security and OT Security. Understanding the Challenges

IT Security and OT Security. Understanding the Challenges IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

Using ISA/IEC 62443 Standards to Improve Control System Security

Using ISA/IEC 62443 Standards to Improve Control System Security Tofino Security White Paper Version 1.2 Published May 2014 Using ISA/IEC 62443 Standards to Improve Control System Security Contents 1. Executive Summary... 1 2. What s New in this Version... 1 3. Why

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

ISACA rudens konference

ISACA rudens konference ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial

More information

a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng.

a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng. SCADA and CIP Security in a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng. CTO, Byres Security Inc. What is Stuxnet? The Stuxnet Worm July, 2010: Stuxnet worm was

More information

Secure SCADA Network Technology and Methods

Secure SCADA Network Technology and Methods Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea sntdvl@yahoo.com, taihoonn@paran.com Abstract: The overall

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

Security Testing in Critical Systems

Security Testing in Critical Systems Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base

More information

Cyber Security Where Do I Begin?

Cyber Security Where Do I Begin? ISPE Automation Forum Cyber Security Where Do I Begin? Don Dickinson Project Engineer Phoenix Contact ..50% more infected Web pages Click in the on one last and three you months won t of notice 2008 than

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

AUP28. Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS)

AUP28. Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS) AUP28 Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS) Clive Barwise, Rockwell Automation European Product Manager Networks and Security

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia

Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Marshall D. Abrams, The MITRE Corporation Joe Weiss, Applied Control Solutions, LLC Annual Computer Security

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport

More information

Resilient and Secure Solutions for the Water/Wastewater Industry

Resilient and Secure Solutions for the Water/Wastewater Industry Insert Photo Here Resilient and Secure Solutions for the Water/Wastewater Industry Ron Allen DA/Central and Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Your slides here Copyright 2011

More information

Redesigning automation network security

Redesigning automation network security White Paper WP152006EN Redesigning automation network security Presented at Power and Energy Automation Conference (PEAC), Spokane, WA, March 2014 Jacques Benoit Eaton s Cooper Power Systems Abstract The

More information

Industrial Security in the Connected Enterprise

Industrial Security in the Connected Enterprise Industrial Security in the Connected Enterprise Presented by Rockwell Automation 2008 Cisco Systems, Inc. and Rockwell Automation, Inc. All rights reserved. THE CONNECTED ENTERPRISE Optimized for Rapid

More information

640-816: Interconnecting Cisco Networking Devices Part 2 v1.1

640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions

More information

CCNA Security v1.0 Scope and Sequence

CCNA Security v1.0 Scope and Sequence CCNA Security v1.0 Scope and Sequence Last updated April 7, 2011 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

E-Commerce Security Perimeter (ESP) Identification and Access Control Process

E-Commerce Security Perimeter (ESP) Identification and Access Control Process Electronic Security Perimeter (ESP) Identification and Access Control Process 1. Introduction. A. This document outlines a multi-step process for identifying and protecting ESPs pursuant to the North American

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

CCNA Security 2.0 Scope and Sequence

CCNA Security 2.0 Scope and Sequence CCNA Security 2.0 Scope and Sequence Last Updated August 26, 2015 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security

More information

Secure Access into Industrial Automation and Control Systems Best Practice and Trends

Secure Access into Industrial Automation and Control Systems Best Practice and Trends Secure Access into Industrial Automation and Systems Best Practice and Trends Serhii Konovalov Venkat Pothamsetty Cisco Collaborating to Advance System Security Vendor offers a remote firmware update and

More information

CYBER SECURITY. Is your Industrial Control System prepared?

CYBER SECURITY. Is your Industrial Control System prepared? CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect Operation & Optimization Software Activity Schneider-Electric Challenges What challenges are there

More information

T46 - Integrated Architecture Tools for Securing Your Control System

T46 - Integrated Architecture Tools for Securing Your Control System T46 - Integrated Architecture Tools for Securing Your Control System PUBLIC PUBLIC - 5058-CO900G Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. The Connected Enterprise PUBLIC Copyright

More information

Building Secure Networks for the Industrial World

Building Secure Networks for the Industrial World Building Secure Networks for the Industrial World Anders Felling Vice President, International Sales Westermo Group Managing Director Westermo Data Communication AB 1 Westermo What do we do? Robust data

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

REFERENCE ARCHITECTURES FOR MANUFACTURING

REFERENCE ARCHITECTURES FOR MANUFACTURING Synopsis Industry adoption of EtherNet/IP TM for control and information resulted in the wide deployment of standard Ethernet in manufacturing. This deployment acts as the technology enabler for the convergence

More information

Securing Manufacturing Control Networks. Alan J. Raveling, CISSP November 2 nd 5 th Pack Expo 2014

Securing Manufacturing Control Networks. Alan J. Raveling, CISSP November 2 nd 5 th Pack Expo 2014 Securing Manufacturing Control Networks Alan J. Raveling, CISSP November 2 nd 5 th Pack Expo 2014 As Internet-enabled technologies such as cloud and mobility grow, the need to understand the potential

More information

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer

More information

Protecting Critical Infrastructure. Secure Fashion. Kevin McPoland GarrettCom

Protecting Critical Infrastructure. Secure Fashion. Kevin McPoland GarrettCom Protecting Critical Infrastructure Leveraging Ethernet in a Secure Fashion Kevin McPoland GarrettCom Environment Today Multiple networks/ owners Operations Legacy serial, SCADA, building automation Physical

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

AUP28 - Implementing Security and IP Protection

AUP28 - Implementing Security and IP Protection AUP28 - Implementing Security and IP Protection Features in the Integrated Architecture Mads Laier DK Commercial Engineer Logix & Networks Rev 5058-CO900E Agenda Why IACS Security Now! Defense in depth

More information

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order

More information