Cyber Security for the Smart Grid: A R&D Perspective

Size: px
Start display at page:

Download "Cyber Security for the Smart Grid: A R&D Perspective"

Transcription

1 NATO Advanced Institute on Energy Security Antalya, Turkey, October 4-11, 2015 Cyber Security for the Smart Grid: A R&D Perspective Manimaran Govindarasu Dept. of Electrical and Computer Engineering Iowa State University [email protected] 1

2 Outline Basics of cyber security concepts Cyber Security of WAMPAC - overview Cyber Risk Assessment - overview Cyber Security Testbeds - overview Cyber Security Standards & Best practices AMI Security & Privacy Conclusion 2

3 Smart Grid: A Cyber-Physical System Source: NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0, February

4 Smart Grid: A Cyber-Physical System Source: 4

5 SCADA Control Network 5

6 Cyber Threats Landscape (DOE/NERC HILF Report) 6

7 Cyber Threats to Critical Infrastructures Cyber-Based Attacks Protocol Attacks Routing Attacks Intrusions Worms / Spyware/ Malware Denial of Service (DoS) Insider Threats [General Accounting Office, CIP Reports, 2004 to 2010]; [NSA Perfect Citizen, 2010]: Recognizes that critical infrastructures are vulnerable to cyber attacks from numerous sources, including hostile governments, terrorist groups, disgruntled employees, and other malicious intruders. 7

8 Power Grid Cyber Security Roadblocks Legacy systems Geographically disperse Insecure remote connections Long system deployments Limited physical protections Adoption of standardized technologies with known vulnerabilities Connectivity of control systems to other networks No fail-closed security mechanisms Widespread availability of technical info 8

9 Securing system is difficult Open and interoperable protocols Security vs. performance tradeoff Security vs. usability tradeoff Security is expensive Attackers enjoy breaking into a system Security had been not a design criteria Threat landscape is dynamic and continuously evolving. 9

10 1.3 Information & Network Security concepts 10

11 Confidentiality: Security Properties Message content should be accessed by authorized users only Achieved by using encryption Integrity: Making sure that message was not altered (in transit, or later) without detection Achieved by using hashing Availability: services must be accessible and available to authorized users Authentication: Sender, receiver want to confirm identity of each other Achieved by using digital signatures Non-Repudiation: The actual sender can not claim that he did not send the message Achieved by using digital signature 11

12 Symmetric Key Encryption 12

13 Asymmetric Key Encryption 13

14 Authentication Digital Signatures 14

15 Security Properties Priorities Traditional IT Systems Industrial Control Systems Confidentiality Availability/Integrity Integrity Integrity/Availability Availability Confidentiality Power Grid Applications Sample Cyber Security Requirements Power Grid Applications Information & Infrastructure Security Application Security AMI I, AT, C I, N DMS I, A, AT I, AT EMS I, A, AT I, AT WAMPAC I, A, AT, C I, A Power Markets I, A, AT, C I, N Confidentiality (C), Integrity (I), Availability (A), Authentication (AT), Non-repudiation (N) 15

16 Network Security Firewalls Firewalls control flows of network traffic between networks or hosts based on security policies. Recommendations for improving effectiveness and security of firewalls Create firewall policies that specifies how firewalls should handle inbound and outbound network traffic. Create rule sets that implement the organization s firewall policy while supporting firewall performance. Identify all requirements that should be considered when determining which firewall to implement. Manage firewall architecture, policies, software, and other components throughout the life of the firewall solutions. Source: Guidelines on Firewalls and Firewall Policy, NIST Special Publication , September

17 Network Security Firewalls Firewall Technologies Packet Filtering Stateful Inspection Application Firewalls Application-Proxy Gateways Dedicated Proxy Servers Virtual Private Networking Network Access Control Unified Threat Management Web Application Firewalls Firewalls for Virtual Infrastructures Firewall Policies Policies based on IP Addresses and Protocols IP addresses and IP characteristics IPv6 TCP and UDP ICMP IPsec protocols Policies based on Applications Policies based on User Identity Policies based on Network Activity Source: Guidelines on Firewalls and Firewall Policy, NIST Special Publication , September

18 Network Security IDS Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents. Intrusion prevention is the process for performing intrusion detection and attempting to stop detected possible incidents. Types of Intrusion Detection and Prevention Systems Network-Based monitors network traffic for suspicious activity Wireless monitors wireless network traffic for suspicious activity Network Behavior Analysis examines traffic to identify threats that generate unusual traffic flows, e.g. DDoS attacks, malware, policy violations Detection Methodologies Signature-Based Detection Anomaly-Based Detection Stateful Protocol Analysis Host-Based monitors characteristic of a single host and events occurring for suspicious activity Source: Guide to Intrusion Detection and Prevention Systems (IDPS), NIST Special Publication , February

19 Network Security IDS A robust IDPS solution can be achieved using a combination of these 4 IDPS technologies. Source: Guide to Intrusion Detection and Prevention Systems (IDPS), NIST Special Publication , February

20 Network Security WLAN Security WLAN s are extensions to wired LAN s based on IEEE standard. Fundamental architecture of WLAN consists of Access Points (AP), client devices, and Distribution Systems (DS) that connect to wired LAN s. Steps to minimize risk: 1. Password Policies & management 1. Encrypt data using standards like WPA2 1. Restrict access using security controls 1. Mac address filtering 2. Disable appropriate network interfaces, bridging traffic 1. Configure host-based network security tools like firewalls, IDS Source: Guidelines for Securing Wireless Local Area Networks (WLANs), NIST Special Publication , February

21 Smart Security = Info + Infra + System Information Security Infrastructure Security Control Systems Security N E E D S Information Protection Message Confidentiality Message Integrity Message Authenticity Infrastructure protection Routers DNS servers Links Internet protocols Service availability Generation control apps. Transmission control apps. Distribution control apps. Real-Time Energy Markets M E A N S Encryption/Decryption Digital signature Message Auth.Codes Public Key Infrastructure Traffic Monitoring Statistical analysis Authentication Protocols Secure Protocols Secure Servers Attack-Resilient Control Algos Model-based Algorithms - Anomaly detection - Intrusion Tolerance - Bad data elimination Risk modeling and mitigation Cyber Attacks: Deter, Prevent, Detect, Mitigate, be Resilient, Attribution 21

22 Summary SCADA and automation concepts Cyber Threat landscape, Coordinated attacks on WAMPAC, and consequences Information security concepts Symmetric and asymmetric key cryptography, digital signatures Network security concepts Firewalls, IDS, WLAN Security 22

23 Overview of WAMPAC Security 23

24 Control Systems Attack Model Generic Control System Model Control Signal Cyber System Physical System Sensing Signal Types of Attacks Data integrity Replay Denial of service De-synchronization and timing-based Signal Integrity Attack DoS Attack Yu-Hu. Huang, Alvaro A. Cardenas, S. Amin, S-Z. Lin, H-Y. Tsai, and S. Sastry, Understanding the Physical and Economic Consequences of Attacks on Control Systems, International Journal of Critical Infrastructure Protection, 2(3):72-83, October

25 Cyber attack classification Timing attacks Denial of Service attacks e.g. flood communication network and affect command information flow Data integrity attacks Attacks on measurements or controls e.g., block instead of trip, VAR increase instead of decrease. Coordinated attacks Attacks coordinated in space, and/or time e.g. attack on SPS of major transmission line followed by attack on sub-transmission and distribution feeders 25

26 Attacks-Cyber-Control-Physical 26

27 Beyond IT Security Why? Legacy Infrastructure Limited encryption capabilities Poor patch management Software bugs Security not design criteria Encrypted comm. can also be tampered Replay attacks Denial Of Service attacks Timing attacks E.g., Heartbleed bug Evolving Vulnerability and Threat landscape Secure system today Vulnerable system tomorrow Information and infrastructure security secure the entry points Application security identifies anomalies in data when IT and infrastructure security fails 27

28 Smart Security = Info + Infra + System Information Security Infrastructure Security Control Systems Security N E E D S Information Protection Message Confidentiality Message Integrity Message Authenticity Infrastructure protection Routers DNS servers Links Internet protocols Service availability Generation control apps. Transmission control apps. Distribution control apps. Real-Time Energy Markets M E A N S Encryption/Decryption Digital signature Message Auth.Codes Public Key Infrastructure Traffic Monitoring Statistical analysis Authentication Protocols Secure Protocols Secure Servers Attack-Resilient Control Algos Model-based Algorithms - Anomaly detection - Intrusion Tolerance - Bad data elimination Risk modeling and mitigation Cyber Attacks: Deter, Prevent, Detect, Mitigate, be Resilient, Attribution 28

29 WAMPAC Applications Wide-Area Measurements (SCADA and PMU network) Monitoring Control Protection State Estimation (SE) Automatic Generation Control (AGC) Remedial Action Schemes (RAS) Situational Awareness Generation/Load balance Prevent system instability 29

30 Cyber physical security of WAMPAC 1 Research areas Vulnerability Assessment R&D Methodology Attack model Attack classification Attack Impact metrics Impact analysis Mitigation development Experimental validation Attack vectors Impact Analysis Attack Mitigation Attack/Defense Evaluation 30

31 Synchrophasors Phasors Magnitude Angle Synchrophasors Common measurement time-stamp using GPS 31

32 SCADA data: Voltage & Current Magnitudes Data rate Every 2-4 seconds (per sample) SCADA vs. PMU data SCADA DATA PMU data: Voltage & Current Magnitudes Phase angles Frequency Rate of change of frequency Time synchronized (using GPS Satellite) Data rate samples per second PMU DATA 32

33 PMU deployment worldwide (2009) Source: Chakrabarti, Kyriakides, Bi, Cai and Terzija, Measurements Get Together, IEEE Power & Energy magazine, Jan/Feb

34 CPS Security Defense in Depth 34

35 Risk Assessment and Risk Management Process 35

36 Risk Assessment & Mitigation Risk = Threat x Vulnerability x Impacts 36

37 Risk Assessment Risk = Threat x Vulnerability x Impacts System Vulnerability System Vulnerability Scenario Vulnerability Scenario Vulnerability Access point Vulnerability Access Point Vulnerability Hierarchical Risk Modeling Real-Time Monitoring Threat & Vulnerability Analysis Impact Analysis low risk high risk Defense measures 37

38 Risk Management Process Source: Risk Management Guide, DOE Jan

39 Hierarchical Risk Management Model Source: ELECTRICITY SUBSECTOR CYBERSECURITY RISK MANAGEMENT PROCESS, DOE May

40 Qualitative Risk Analysis Matrix Combines the probability and consequence of a risk to identify a risk rating for each individual risk. Risk ratings Represents a judgment as to the relative risk to the project Categorizes each risk as Low Moderate High 40

41 Qualitative Risk Analysis Matrix Source: Risk Management Guide, DOE Jan

42 Risk Assessment - Quantitative Mitigation of Coordinated Attacks Offline: Risk Modeling and Mitigation Online: Alert Correlation and Mitigation Approach 1: Risk Modeling and Mitigation Cyber System Definition (Topology, Security) Attack Template Power System Definition (Control, Protection) Cyber System Modeling (Petri Nets) Power System Modeling (DIgSILENT, PSSE) Attack Probability risk Impact E.g. - Modify settings, Add security Offline Mitigation if risk > threshold E.g. - Increase transmission capacity 42

43 Qualitative vs. Quantitative Property Qualitative Quantitative To be viable Relies on Expert Knowledge Data sets, probabilities Benefit Coarse-grain analysis Fine-grain analysis Analyzability Subjective? Verifiable if assumptions hold Security investment High-level Detailed analysis Who uses Industry Academic Both are complimentary! Threat modeling is not well understood - more of an art than science Vulnerability assessment is subjective assumptions on cyber system Impact analysis is well understood physical/economic consequences 43

44 Mission Oriented Risk and Design Analysis (MORDA) 44

45 Attack Trees Attack Tree for HILF Coordinated Cyber Attack Source: NERC Cyber Attack Task Force report, May 2012 ( 45

46 NERC CATF Risk Mitigation Framework Source: NERC Cyber Attack Task Force report, May 2012 ( 46

47 Cyber-Physical Security Testbeds Adam Hahn, Aditya Ashok, Siddharth Sridhar, Manimaran Govindarasu, Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid, IEEE Transactions on Smart Grid, vol 4, no. 2, June

48 Need for Testbeds Vulnerability Analysis Impact Analysis Mitigation Research Cyber-Physical Metrics Data and Model Development Security Validation Interoperability Cyber Forensics Operator Training 48

49 CPS Testbed A Layered View EMS, SAS, RTUs, IEDs Routing infrastructure, Network protocols, Routers, Firewalls Defenses Information/Control Layer Communication Layer Cyber attacks Power System Simulators (RTDS, Power factory) Physical Layer Aditya Ashok, Adam Hahn, and Manimaran Govindarasu, A cyber-physical security testbed for smart grid: system architecture and studies, Proceedings of the Cyber Security and Information Intelligence Research (CSIIRW '11). 49

50 Cyber Security Testbeds National SCADA test bed Idaho National Lab Virtual Control System Sandia National Lab SCADA Security Pacific Northwest National Lab PowerCyber Security Iowa State University SCADA Security Washington State University, Pullman Virtual Power System test bed University of Illinois, Urbana Critical Infrastructure Security Mississippi State University CRUTIAL CESI RICERCA, Italy Cyber Security for the Smart Grid: A R&D Perspective

51 Iowa State s PowerCyber Testbed Adam Hahn, Aditya Ashok, Siddharth Sridhar, Manimaran Govindarasu, Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid, IEEE Transactions on Smart Grid, Vol. 4, June

52 CPS Testbed Federation for Security Experimentation USC/ISI DETER Testbed ISU PowerCyber Testbed Visualization 52

53 Cyber Security Compliance & Best practices 53

54 Cyber and Control Systems Security Standards for Electric Power Systems Organizations for Cyber Security Standards IEEE Institute of Electrical and Electronics Engineers IEC International Electro-technical Commission NERC North American Electric Reliability Council CIGRE International Council on Large Energy Systems FERC Federal Energy Regulatory Commission PSRC Power Systems Reliability Committee Protocol Scope IEEE 1402 Cyber Security Electric Standards Power Substation for Electric Physical Power and Systems Electronic Security IEC Data and Communication Security NERC 1300 FERC SSEMP NISTIR 7628 Cyber Security Standards (CIP Standards) [ Security Standards for Electric Market Participants Smart Grid Cyber Security 54

55 NISTIR 7628 Guidelines for Smart Grid Cybersecurity Vol. 1 Security Strategy, Architecture and High-Level Requirements Applicability of CIA in the smart grid environment Access control, Cryptography and key management Risk management and assessment Vol. 2 Privacy and the Smart Grid New privacy concerns and classification of privacy Laws and regulations with respect to privacy Vol. 3 Supportive Analysis and References Vulnerability definition and classification Bottom-up Security Analysis Security requirements Device security Cryptography and key management Network security System security architectures 55

56 NIST Smart Grid Interoperability Panel NIST Smart Grid Scope Research Standards Development Energy management and Metering Smart-grid Architecture and Operations Wide-Area Monitoring and control Communication protocols and cybersecurity Electric vehicles and storage Interoperability standards Cybersecurity standards [NISTIR 7628 Guidelines for Smart Grid Cyber Security] 56

57 NISTIR 7628 Smart Grid Cyber Security Strategy 1. Use case analysis Top-down analysis (inter-component/domain) Bottom-up analysis (vulnerability classes) 2. Risk Assessment Identify assets Vulnerabilities Threats Impacts Privacy Assessment 3. High-level security requirements 4a. Security Architecture 4b. Smart Grid Standards Assessment Existing standards (IEEE, CIP, etc.) 5. Conformity Assessment 57

58 NERC Critical Infrastructure Protection (CIP) Objective: Physical, cyber and operational security for bulk power system Identify vulnerabilities and countermeasures Vulnerability and risk assessment Cyber and physical countermeasures Threat response NERC CIP Scope Communications Support operation and protection Facility and field equipment Physical security Protecting sensitive data IT/Cyber security Deterrence, prevention, detection and correction Production, storage, transmission and disposal 58

59 CIP NERC CIP Standards (Version 5) BES Cyber System Categorization Security Management Controls CIP CIP Personnel & Training Electronic Security Perimeter(s) CIP CIP Physical Security of BES Cyber Systems CIP CIP Systems Security Management Incident Reporting and Response Planning Recovery Plans for BES Cyber Systems Configuration Change Management and Vulnerability Assessments Information Protection CIP CIP CIP

60 Cyber security Best Practices Defense in Depth approach Protect network boundaries Protect computing environment Firewalls Limit inbound and outbound connections Authorize appropriate outbound connections Filter malicious traffic Intrusion Detection Systems Analyze network traffic in near real-time Based on signatures, anomaly based Regular OS patching and updating OS Hardening Periodic Anti-virus updates Use of Host based Firewalls Routine Vulnerability Scanning Use of Proxy servers and Web content filters attachment filtering Monitoring logs Authorize devices on LAN Source: Malware Threats and Mitigation Strategies, US-CERT Informational Whitepaper, May

61 ICS-CERT best practices Minimize network exposure for all control system devices. Firewall and isolate control network Secure remote access using VPN s Account lockout policies Password management policies Access control management policies Patch management policies Source: 61

62 Vulnerability Lifecycle Vendor mistake in design/development process (Vendor/Coordinator/Rese archer) disclose the vulnerability to utilities and/or general public Utilities/System integrators work on testing, deploying patch Creation Discovery Notification Mitigation Released Mitigation Applied Vulnerability discovered by (Vendor/ Utility/Security Researcher/Attacker) Vendor provides patch and/or configuration strategy to mitigate the issue 62

63 Vulnerability Assessment Inspect weaknesses in industry standards, software platforms, network protocols and configurations Common activities include Vulnerability Scanning Cryptography Analysis Software fuzz testing Common tools Nmap a security scanner to discover hosts and services on a network Wireshark a network packet sniffer & analyzer tool Intrusion Process Footprinting Scanning Enumerating Exploit! Nessus a comprehensive vulnerability scanning program 10/6/15 63 Cyber Security for the Smart Grid: A R&D Perspective

64 Multiple layers & Multiple vendors Heterogeneous environment with both industryspecific and traditional IT software Application Traditional IT Web Database Industry SCADA EMS WAMS SPS Network Infrastructure Ethernet TCP/IP SSL NTP DNP3 IEC-TC57 Modbus Operating System Microsoft Unix Linux IOS VXworks Embedded Must be able to flexibly manage vulnerabilities discovered in both domains 64

65 Vulnerability Disclosure ICS-CERT Advisory An ICS-CERT Advisory is intended to provide awareness or solicit feedback from critical infrastructure owners and operators concerning ongoing cyber events or activity with the potential to impact critical infrastructure computing networks. ( NERC ES-ISAC Facilitates sharing of information pertaining to physical and cyber threats, vulnerabilities, incidents, potential protective measures, and practices. ( 65

66 ICS CERT Advisory A typical ICS-CERT Advisory contains: Affected products Impact Background Vulnerability Characterization Vulnerability Overview Vulnerability Details Exploitability Existence of Exploit Difficulty Mitigation 66

67 AMI Security and Privacy 67

68 Need for Advanced Metering Infrastructure (AMI) System Operation Benefits Customer Service Benefits Financial Benefits Reduction in peak loads Billing accuracy and flexible billing cycle Reduced equipment and maintenance costs Improved Monitoring and control Time based rate options Reduced support expenses Improved efficiency and reliability Custom energy profiles for Energy Efficiency Faster outage restoration Cost reduction Demand Response Improved inventory management 68

69 Advanced Metering Infrastructure Digital hardware and software Interval data measurement capability Two-way remote communications 69

70 AMI in Modern Grid vision Advanced Metering Infrastructure, National Energy Technology Laboratory, U.S Department of Energy, Office of Electricity Delivery and Energy Reliability, February

71 Basic AMI architecture Customer Data Collection Communication Network Utility/ Third Party Data Reception and Management Electricity Meter Gas Meter Data Transmission Network (BPL,PLC, RF, Public Networks) AMI Host server Meter Data Management System (MDMS) Water Meter Source: 71

72 AMI communication architecture Advanced Metering Infrastructure, National Energy Technology Laboratory, U.S Department of Energy, Office of Electricity Delivery and Energy Reliability, February

73 AMI security issues Cleveland, F.M.;, "Cyber security issues for Advanced Metering Infrastructure (AMI)," Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, vol., no., pp.1-5, July

74 Conclusion Cyber-Physical Security of Power Grid is a national priority Smart Grid Security = Info Sec + Infra Sec + Application Security Defense-in-Depth & End-to-end Security & Attack-resilient Systems Cyber-Physical Security Testbeds & Experimentations Standards development and Industry adoption are critical Education and workforce development are very important Synergistic collaboration between Industry-University-National Labs International Collaboration is important! 74

75 THANK YOU Acknowledgements: U.S. National Science Foundation (NSF) U.S. Department of Homeland Security (DHS) U.S. Department of Energy (DOE) U.S. NSF IU/CRC Power Engr. Research Center (PSERC) Iowa State Univ., Electric Power Research Center (EPRC) Graduate Students: Aditya Ashok (ISU) Collaborators: Prof. Chen-Ching Liu, Washington State University (WSU) Prof. Venkat Ajjarapu, Iowa State University (ISU) Dr. Adam Hahn, MITRE Dr. Jianhui Wang, PNNL Dr. C. W. Ten, Michigan Tech. Professional: IEEE PES - PSACE CAMS Cyber Security Task Force 75

Cyber Security and Privacy - Program 183

Cyber Security and Privacy - Program 183 Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology

More information

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What

More information

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Panel Session: Lessons Learned in Smart Grid Cybersecurity PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Cyber-Physical Systems Security for Smart Grid

Cyber-Physical Systems Security for Smart Grid Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems Engineering Research Center Empowering Minds to Engineer the Future Electric Energy System Cyber-Physical

More information

Cyber Security. Smart Grid

Cyber Security. Smart Grid Cyber Security for the Smart Grid Peter David Vickery Executive Vice President N-Dimension Solutions Inc. APPA National Conference June 21, 2010 Cyber Security Solutions For Cyber Security

More information

Secure SCADA Network Technology and Methods

Secure SCADA Network Technology and Methods Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall

More information

Facilitated Self-Evaluation v1.0

Facilitated Self-Evaluation v1.0 Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used

More information

Securing Distribution Automation

Securing Distribution Automation Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Overview Assurance & Evaluation Security Testing Approaches

More information

Cyber Security of the Power Grid

Cyber Security of the Power Grid Cyber Security of the Power Grid Chen-Ching Ching Liu Professor of Power Systems University College Dublin Research for Ireland s Future Ireland -Country of natural beauty -Quality of life ranked among

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

Description: Objective: Attending students will learn:

Description: Objective: Attending students will learn: Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847

IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847 IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847 Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid Adam Hahn, Student Member, IEEE, Aditya Ashok, Student

More information

An Evaluation of Security Posture Assessment Tools on a SCADA Environment

An Evaluation of Security Posture Assessment Tools on a SCADA Environment An Evaluation of Security Posture Assessment Tools on a SCADA Environment Shahir Majed 1, Suhaimi Ibrahim 1, Mohamed Shaaban 2 1 Advance Informatics School, Universiti Teknologi Malaysia, International

More information

TRIPWIRE NERC SOLUTION SUITE

TRIPWIRE NERC SOLUTION SUITE CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Cyber Security for NERC CIP Version 5 Compliance

Cyber Security for NERC CIP Version 5 Compliance GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...

More information

IEEE-Northwest Energy Systems Symposium (NWESS)

IEEE-Northwest Energy Systems Symposium (NWESS) IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation

More information

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014

More information

Design Document. Team Members: Tony Gedwillo James Parrott David Ryan. Faculty Advisor: Dr. Manimaran Govindarasu

Design Document. Team Members: Tony Gedwillo James Parrott David Ryan. Faculty Advisor: Dr. Manimaran Govindarasu 12/6/2010 SDMAY11-11 CYBER SECURITY OF SCADA SYSTEMS TEST BED Design Document Team Members: Tony Gedwillo James Parrott David Ryan Faculty Advisor: Dr. Manimaran Govindarasu Design Document Tony Gedwillo

More information

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

Cybersecurity for Electric Power Control and Automation Systems

Cybersecurity for Electric Power Control and Automation Systems Cybersecurity for Electric Power Control and Automation Systems Chee-Wooi Ten, Student Member, IEEE, Manimaran Govindarasu, Member, IEEE, and Chen-Ching Liu, Fellow, IEEE Abstract Disruption of electric

More information

SCADA System Overview

SCADA System Overview Introduction SCADA systems are critical to the control and monitoring of complex cyber-physical systems. Now with advanced computer and communications technologies, SCADA systems are connected to networks

More information

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191 Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

!! "# $%!& $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565

!! # $%!& $!$ +) * ', -./01.//1233/ 4, -./01.//12223 *, 565 !! "# $%!& '(!)**+* $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565 1 Content CRUTIAL testbeds - objectives The Telecontrol Testbed platform Critical scenarios - plotted demo Experimental results The

More information

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Safe Network Integration

Safe Network Integration UNIDIRECTIONAL SECURITY GATEWAYS Safe Network Integration Stronger than Firewalls Shaul Pescovsky, Sales Director Waterfall Security Solutions [email protected] Proprietary Information -- Copyright

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations

Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations Leveraging Configuration and Vulnerability Analysis for Critical Assets and Infrastructure May 2015 (Revision 2) Table of

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings

More information

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005 SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A. 21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale

More information

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in

More information

future data and infrastructure

future data and infrastructure White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal

More information

Fundamentals of a Windows Server Infrastructure MOC 10967

Fundamentals of a Windows Server Infrastructure MOC 10967 Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

RuggedCom Solutions for

RuggedCom Solutions for RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application

More information

DeltaV System Cyber-Security

DeltaV System Cyber-Security January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

Effective Defense in Depth Strategies

Effective Defense in Depth Strategies Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

Cybersecurity considerations for electrical distribution systems

Cybersecurity considerations for electrical distribution systems White Paper WP152002EN Supersedes January 2014 electrical distribution systems Authors Max Wandera, Brent Jonasson, Jacques Benoit, James Formea, Tim Thompson, Zwicks Tang, Dennis Grinberg, Andrew Sowada,

More information

Protecting Critical Infrastructure

Protecting Critical Infrastructure Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The

More information

Jort Kollerie SonicWALL

Jort Kollerie SonicWALL Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential

More information

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014

More information

Cyber Physical System Security for the Electric Power Grid

Cyber Physical System Security for the Electric Power Grid INVITED PAPER Cyber Physical System Security for the Electric Power Grid Control in power systems that may be vulnerable to security attacks is discussed in this paper as are control loop vulnerabilities,

More information

Patching & Malicious Software Prevention CIP-007 R3 & R4

Patching & Malicious Software Prevention CIP-007 R3 & R4 Patching & Malicious Software Prevention CIP-007 R3 & R4 Scope Compliance Assessment Summary Introspection & Analysis Program-In Review Maturity Model review Control Design review Process Components of

More information

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton

More information

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13 COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security

More information

Securing the Electric Grid with Common Cyber Security Services Jeff Gooding

Securing the Electric Grid with Common Cyber Security Services Jeff Gooding Securing the Electric Grid with Common Cyber Security Services Jeff Gooding TCIPG Seminar April 4, 2014 Southern California Edison (SCE) is committed to safely providing reliable and affordable electricity

More information

CYBER SECURITY OF SUBSTATION AUTOMATION SYSTEMS

CYBER SECURITY OF SUBSTATION AUTOMATION SYSTEMS CYBER SECURITY OF SUBSTATION AUTOMATION SYSTEMS By JUNHO HONG A dissertation submitted in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY WASHINGTON STATE UNIVERSITY School

More information

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc. Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background: 1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus

More information

SCADA/Business Network Separation: Securing an Integrated SCADA System

SCADA/Business Network Separation: Securing an Integrated SCADA System SCADA/Business Network Separation: Securing an Integrated SCADA System This white paper is based on a utility example but applies to any SCADA installation from power generation and distribution to water/wastewater

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page

More information

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved

More information

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information