Cyber Security for the Smart Grid: A R&D Perspective
|
|
|
- Amy Wilson
- 10 years ago
- Views:
Transcription
1 NATO Advanced Institute on Energy Security Antalya, Turkey, October 4-11, 2015 Cyber Security for the Smart Grid: A R&D Perspective Manimaran Govindarasu Dept. of Electrical and Computer Engineering Iowa State University [email protected] 1
2 Outline Basics of cyber security concepts Cyber Security of WAMPAC - overview Cyber Risk Assessment - overview Cyber Security Testbeds - overview Cyber Security Standards & Best practices AMI Security & Privacy Conclusion 2
3 Smart Grid: A Cyber-Physical System Source: NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0, February
4 Smart Grid: A Cyber-Physical System Source: 4
5 SCADA Control Network 5
6 Cyber Threats Landscape (DOE/NERC HILF Report) 6
7 Cyber Threats to Critical Infrastructures Cyber-Based Attacks Protocol Attacks Routing Attacks Intrusions Worms / Spyware/ Malware Denial of Service (DoS) Insider Threats [General Accounting Office, CIP Reports, 2004 to 2010]; [NSA Perfect Citizen, 2010]: Recognizes that critical infrastructures are vulnerable to cyber attacks from numerous sources, including hostile governments, terrorist groups, disgruntled employees, and other malicious intruders. 7
8 Power Grid Cyber Security Roadblocks Legacy systems Geographically disperse Insecure remote connections Long system deployments Limited physical protections Adoption of standardized technologies with known vulnerabilities Connectivity of control systems to other networks No fail-closed security mechanisms Widespread availability of technical info 8
9 Securing system is difficult Open and interoperable protocols Security vs. performance tradeoff Security vs. usability tradeoff Security is expensive Attackers enjoy breaking into a system Security had been not a design criteria Threat landscape is dynamic and continuously evolving. 9
10 1.3 Information & Network Security concepts 10
11 Confidentiality: Security Properties Message content should be accessed by authorized users only Achieved by using encryption Integrity: Making sure that message was not altered (in transit, or later) without detection Achieved by using hashing Availability: services must be accessible and available to authorized users Authentication: Sender, receiver want to confirm identity of each other Achieved by using digital signatures Non-Repudiation: The actual sender can not claim that he did not send the message Achieved by using digital signature 11
12 Symmetric Key Encryption 12
13 Asymmetric Key Encryption 13
14 Authentication Digital Signatures 14
15 Security Properties Priorities Traditional IT Systems Industrial Control Systems Confidentiality Availability/Integrity Integrity Integrity/Availability Availability Confidentiality Power Grid Applications Sample Cyber Security Requirements Power Grid Applications Information & Infrastructure Security Application Security AMI I, AT, C I, N DMS I, A, AT I, AT EMS I, A, AT I, AT WAMPAC I, A, AT, C I, A Power Markets I, A, AT, C I, N Confidentiality (C), Integrity (I), Availability (A), Authentication (AT), Non-repudiation (N) 15
16 Network Security Firewalls Firewalls control flows of network traffic between networks or hosts based on security policies. Recommendations for improving effectiveness and security of firewalls Create firewall policies that specifies how firewalls should handle inbound and outbound network traffic. Create rule sets that implement the organization s firewall policy while supporting firewall performance. Identify all requirements that should be considered when determining which firewall to implement. Manage firewall architecture, policies, software, and other components throughout the life of the firewall solutions. Source: Guidelines on Firewalls and Firewall Policy, NIST Special Publication , September
17 Network Security Firewalls Firewall Technologies Packet Filtering Stateful Inspection Application Firewalls Application-Proxy Gateways Dedicated Proxy Servers Virtual Private Networking Network Access Control Unified Threat Management Web Application Firewalls Firewalls for Virtual Infrastructures Firewall Policies Policies based on IP Addresses and Protocols IP addresses and IP characteristics IPv6 TCP and UDP ICMP IPsec protocols Policies based on Applications Policies based on User Identity Policies based on Network Activity Source: Guidelines on Firewalls and Firewall Policy, NIST Special Publication , September
18 Network Security IDS Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents. Intrusion prevention is the process for performing intrusion detection and attempting to stop detected possible incidents. Types of Intrusion Detection and Prevention Systems Network-Based monitors network traffic for suspicious activity Wireless monitors wireless network traffic for suspicious activity Network Behavior Analysis examines traffic to identify threats that generate unusual traffic flows, e.g. DDoS attacks, malware, policy violations Detection Methodologies Signature-Based Detection Anomaly-Based Detection Stateful Protocol Analysis Host-Based monitors characteristic of a single host and events occurring for suspicious activity Source: Guide to Intrusion Detection and Prevention Systems (IDPS), NIST Special Publication , February
19 Network Security IDS A robust IDPS solution can be achieved using a combination of these 4 IDPS technologies. Source: Guide to Intrusion Detection and Prevention Systems (IDPS), NIST Special Publication , February
20 Network Security WLAN Security WLAN s are extensions to wired LAN s based on IEEE standard. Fundamental architecture of WLAN consists of Access Points (AP), client devices, and Distribution Systems (DS) that connect to wired LAN s. Steps to minimize risk: 1. Password Policies & management 1. Encrypt data using standards like WPA2 1. Restrict access using security controls 1. Mac address filtering 2. Disable appropriate network interfaces, bridging traffic 1. Configure host-based network security tools like firewalls, IDS Source: Guidelines for Securing Wireless Local Area Networks (WLANs), NIST Special Publication , February
21 Smart Security = Info + Infra + System Information Security Infrastructure Security Control Systems Security N E E D S Information Protection Message Confidentiality Message Integrity Message Authenticity Infrastructure protection Routers DNS servers Links Internet protocols Service availability Generation control apps. Transmission control apps. Distribution control apps. Real-Time Energy Markets M E A N S Encryption/Decryption Digital signature Message Auth.Codes Public Key Infrastructure Traffic Monitoring Statistical analysis Authentication Protocols Secure Protocols Secure Servers Attack-Resilient Control Algos Model-based Algorithms - Anomaly detection - Intrusion Tolerance - Bad data elimination Risk modeling and mitigation Cyber Attacks: Deter, Prevent, Detect, Mitigate, be Resilient, Attribution 21
22 Summary SCADA and automation concepts Cyber Threat landscape, Coordinated attacks on WAMPAC, and consequences Information security concepts Symmetric and asymmetric key cryptography, digital signatures Network security concepts Firewalls, IDS, WLAN Security 22
23 Overview of WAMPAC Security 23
24 Control Systems Attack Model Generic Control System Model Control Signal Cyber System Physical System Sensing Signal Types of Attacks Data integrity Replay Denial of service De-synchronization and timing-based Signal Integrity Attack DoS Attack Yu-Hu. Huang, Alvaro A. Cardenas, S. Amin, S-Z. Lin, H-Y. Tsai, and S. Sastry, Understanding the Physical and Economic Consequences of Attacks on Control Systems, International Journal of Critical Infrastructure Protection, 2(3):72-83, October
25 Cyber attack classification Timing attacks Denial of Service attacks e.g. flood communication network and affect command information flow Data integrity attacks Attacks on measurements or controls e.g., block instead of trip, VAR increase instead of decrease. Coordinated attacks Attacks coordinated in space, and/or time e.g. attack on SPS of major transmission line followed by attack on sub-transmission and distribution feeders 25
26 Attacks-Cyber-Control-Physical 26
27 Beyond IT Security Why? Legacy Infrastructure Limited encryption capabilities Poor patch management Software bugs Security not design criteria Encrypted comm. can also be tampered Replay attacks Denial Of Service attacks Timing attacks E.g., Heartbleed bug Evolving Vulnerability and Threat landscape Secure system today Vulnerable system tomorrow Information and infrastructure security secure the entry points Application security identifies anomalies in data when IT and infrastructure security fails 27
28 Smart Security = Info + Infra + System Information Security Infrastructure Security Control Systems Security N E E D S Information Protection Message Confidentiality Message Integrity Message Authenticity Infrastructure protection Routers DNS servers Links Internet protocols Service availability Generation control apps. Transmission control apps. Distribution control apps. Real-Time Energy Markets M E A N S Encryption/Decryption Digital signature Message Auth.Codes Public Key Infrastructure Traffic Monitoring Statistical analysis Authentication Protocols Secure Protocols Secure Servers Attack-Resilient Control Algos Model-based Algorithms - Anomaly detection - Intrusion Tolerance - Bad data elimination Risk modeling and mitigation Cyber Attacks: Deter, Prevent, Detect, Mitigate, be Resilient, Attribution 28
29 WAMPAC Applications Wide-Area Measurements (SCADA and PMU network) Monitoring Control Protection State Estimation (SE) Automatic Generation Control (AGC) Remedial Action Schemes (RAS) Situational Awareness Generation/Load balance Prevent system instability 29
30 Cyber physical security of WAMPAC 1 Research areas Vulnerability Assessment R&D Methodology Attack model Attack classification Attack Impact metrics Impact analysis Mitigation development Experimental validation Attack vectors Impact Analysis Attack Mitigation Attack/Defense Evaluation 30
31 Synchrophasors Phasors Magnitude Angle Synchrophasors Common measurement time-stamp using GPS 31
32 SCADA data: Voltage & Current Magnitudes Data rate Every 2-4 seconds (per sample) SCADA vs. PMU data SCADA DATA PMU data: Voltage & Current Magnitudes Phase angles Frequency Rate of change of frequency Time synchronized (using GPS Satellite) Data rate samples per second PMU DATA 32
33 PMU deployment worldwide (2009) Source: Chakrabarti, Kyriakides, Bi, Cai and Terzija, Measurements Get Together, IEEE Power & Energy magazine, Jan/Feb
34 CPS Security Defense in Depth 34
35 Risk Assessment and Risk Management Process 35
36 Risk Assessment & Mitigation Risk = Threat x Vulnerability x Impacts 36
37 Risk Assessment Risk = Threat x Vulnerability x Impacts System Vulnerability System Vulnerability Scenario Vulnerability Scenario Vulnerability Access point Vulnerability Access Point Vulnerability Hierarchical Risk Modeling Real-Time Monitoring Threat & Vulnerability Analysis Impact Analysis low risk high risk Defense measures 37
38 Risk Management Process Source: Risk Management Guide, DOE Jan
39 Hierarchical Risk Management Model Source: ELECTRICITY SUBSECTOR CYBERSECURITY RISK MANAGEMENT PROCESS, DOE May
40 Qualitative Risk Analysis Matrix Combines the probability and consequence of a risk to identify a risk rating for each individual risk. Risk ratings Represents a judgment as to the relative risk to the project Categorizes each risk as Low Moderate High 40
41 Qualitative Risk Analysis Matrix Source: Risk Management Guide, DOE Jan
42 Risk Assessment - Quantitative Mitigation of Coordinated Attacks Offline: Risk Modeling and Mitigation Online: Alert Correlation and Mitigation Approach 1: Risk Modeling and Mitigation Cyber System Definition (Topology, Security) Attack Template Power System Definition (Control, Protection) Cyber System Modeling (Petri Nets) Power System Modeling (DIgSILENT, PSSE) Attack Probability risk Impact E.g. - Modify settings, Add security Offline Mitigation if risk > threshold E.g. - Increase transmission capacity 42
43 Qualitative vs. Quantitative Property Qualitative Quantitative To be viable Relies on Expert Knowledge Data sets, probabilities Benefit Coarse-grain analysis Fine-grain analysis Analyzability Subjective? Verifiable if assumptions hold Security investment High-level Detailed analysis Who uses Industry Academic Both are complimentary! Threat modeling is not well understood - more of an art than science Vulnerability assessment is subjective assumptions on cyber system Impact analysis is well understood physical/economic consequences 43
44 Mission Oriented Risk and Design Analysis (MORDA) 44
45 Attack Trees Attack Tree for HILF Coordinated Cyber Attack Source: NERC Cyber Attack Task Force report, May 2012 ( 45
46 NERC CATF Risk Mitigation Framework Source: NERC Cyber Attack Task Force report, May 2012 ( 46
47 Cyber-Physical Security Testbeds Adam Hahn, Aditya Ashok, Siddharth Sridhar, Manimaran Govindarasu, Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid, IEEE Transactions on Smart Grid, vol 4, no. 2, June
48 Need for Testbeds Vulnerability Analysis Impact Analysis Mitigation Research Cyber-Physical Metrics Data and Model Development Security Validation Interoperability Cyber Forensics Operator Training 48
49 CPS Testbed A Layered View EMS, SAS, RTUs, IEDs Routing infrastructure, Network protocols, Routers, Firewalls Defenses Information/Control Layer Communication Layer Cyber attacks Power System Simulators (RTDS, Power factory) Physical Layer Aditya Ashok, Adam Hahn, and Manimaran Govindarasu, A cyber-physical security testbed for smart grid: system architecture and studies, Proceedings of the Cyber Security and Information Intelligence Research (CSIIRW '11). 49
50 Cyber Security Testbeds National SCADA test bed Idaho National Lab Virtual Control System Sandia National Lab SCADA Security Pacific Northwest National Lab PowerCyber Security Iowa State University SCADA Security Washington State University, Pullman Virtual Power System test bed University of Illinois, Urbana Critical Infrastructure Security Mississippi State University CRUTIAL CESI RICERCA, Italy Cyber Security for the Smart Grid: A R&D Perspective
51 Iowa State s PowerCyber Testbed Adam Hahn, Aditya Ashok, Siddharth Sridhar, Manimaran Govindarasu, Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid, IEEE Transactions on Smart Grid, Vol. 4, June
52 CPS Testbed Federation for Security Experimentation USC/ISI DETER Testbed ISU PowerCyber Testbed Visualization 52
53 Cyber Security Compliance & Best practices 53
54 Cyber and Control Systems Security Standards for Electric Power Systems Organizations for Cyber Security Standards IEEE Institute of Electrical and Electronics Engineers IEC International Electro-technical Commission NERC North American Electric Reliability Council CIGRE International Council on Large Energy Systems FERC Federal Energy Regulatory Commission PSRC Power Systems Reliability Committee Protocol Scope IEEE 1402 Cyber Security Electric Standards Power Substation for Electric Physical Power and Systems Electronic Security IEC Data and Communication Security NERC 1300 FERC SSEMP NISTIR 7628 Cyber Security Standards (CIP Standards) [ Security Standards for Electric Market Participants Smart Grid Cyber Security 54
55 NISTIR 7628 Guidelines for Smart Grid Cybersecurity Vol. 1 Security Strategy, Architecture and High-Level Requirements Applicability of CIA in the smart grid environment Access control, Cryptography and key management Risk management and assessment Vol. 2 Privacy and the Smart Grid New privacy concerns and classification of privacy Laws and regulations with respect to privacy Vol. 3 Supportive Analysis and References Vulnerability definition and classification Bottom-up Security Analysis Security requirements Device security Cryptography and key management Network security System security architectures 55
56 NIST Smart Grid Interoperability Panel NIST Smart Grid Scope Research Standards Development Energy management and Metering Smart-grid Architecture and Operations Wide-Area Monitoring and control Communication protocols and cybersecurity Electric vehicles and storage Interoperability standards Cybersecurity standards [NISTIR 7628 Guidelines for Smart Grid Cyber Security] 56
57 NISTIR 7628 Smart Grid Cyber Security Strategy 1. Use case analysis Top-down analysis (inter-component/domain) Bottom-up analysis (vulnerability classes) 2. Risk Assessment Identify assets Vulnerabilities Threats Impacts Privacy Assessment 3. High-level security requirements 4a. Security Architecture 4b. Smart Grid Standards Assessment Existing standards (IEEE, CIP, etc.) 5. Conformity Assessment 57
58 NERC Critical Infrastructure Protection (CIP) Objective: Physical, cyber and operational security for bulk power system Identify vulnerabilities and countermeasures Vulnerability and risk assessment Cyber and physical countermeasures Threat response NERC CIP Scope Communications Support operation and protection Facility and field equipment Physical security Protecting sensitive data IT/Cyber security Deterrence, prevention, detection and correction Production, storage, transmission and disposal 58
59 CIP NERC CIP Standards (Version 5) BES Cyber System Categorization Security Management Controls CIP CIP Personnel & Training Electronic Security Perimeter(s) CIP CIP Physical Security of BES Cyber Systems CIP CIP Systems Security Management Incident Reporting and Response Planning Recovery Plans for BES Cyber Systems Configuration Change Management and Vulnerability Assessments Information Protection CIP CIP CIP
60 Cyber security Best Practices Defense in Depth approach Protect network boundaries Protect computing environment Firewalls Limit inbound and outbound connections Authorize appropriate outbound connections Filter malicious traffic Intrusion Detection Systems Analyze network traffic in near real-time Based on signatures, anomaly based Regular OS patching and updating OS Hardening Periodic Anti-virus updates Use of Host based Firewalls Routine Vulnerability Scanning Use of Proxy servers and Web content filters attachment filtering Monitoring logs Authorize devices on LAN Source: Malware Threats and Mitigation Strategies, US-CERT Informational Whitepaper, May
61 ICS-CERT best practices Minimize network exposure for all control system devices. Firewall and isolate control network Secure remote access using VPN s Account lockout policies Password management policies Access control management policies Patch management policies Source: 61
62 Vulnerability Lifecycle Vendor mistake in design/development process (Vendor/Coordinator/Rese archer) disclose the vulnerability to utilities and/or general public Utilities/System integrators work on testing, deploying patch Creation Discovery Notification Mitigation Released Mitigation Applied Vulnerability discovered by (Vendor/ Utility/Security Researcher/Attacker) Vendor provides patch and/or configuration strategy to mitigate the issue 62
63 Vulnerability Assessment Inspect weaknesses in industry standards, software platforms, network protocols and configurations Common activities include Vulnerability Scanning Cryptography Analysis Software fuzz testing Common tools Nmap a security scanner to discover hosts and services on a network Wireshark a network packet sniffer & analyzer tool Intrusion Process Footprinting Scanning Enumerating Exploit! Nessus a comprehensive vulnerability scanning program 10/6/15 63 Cyber Security for the Smart Grid: A R&D Perspective
64 Multiple layers & Multiple vendors Heterogeneous environment with both industryspecific and traditional IT software Application Traditional IT Web Database Industry SCADA EMS WAMS SPS Network Infrastructure Ethernet TCP/IP SSL NTP DNP3 IEC-TC57 Modbus Operating System Microsoft Unix Linux IOS VXworks Embedded Must be able to flexibly manage vulnerabilities discovered in both domains 64
65 Vulnerability Disclosure ICS-CERT Advisory An ICS-CERT Advisory is intended to provide awareness or solicit feedback from critical infrastructure owners and operators concerning ongoing cyber events or activity with the potential to impact critical infrastructure computing networks. ( NERC ES-ISAC Facilitates sharing of information pertaining to physical and cyber threats, vulnerabilities, incidents, potential protective measures, and practices. ( 65
66 ICS CERT Advisory A typical ICS-CERT Advisory contains: Affected products Impact Background Vulnerability Characterization Vulnerability Overview Vulnerability Details Exploitability Existence of Exploit Difficulty Mitigation 66
67 AMI Security and Privacy 67
68 Need for Advanced Metering Infrastructure (AMI) System Operation Benefits Customer Service Benefits Financial Benefits Reduction in peak loads Billing accuracy and flexible billing cycle Reduced equipment and maintenance costs Improved Monitoring and control Time based rate options Reduced support expenses Improved efficiency and reliability Custom energy profiles for Energy Efficiency Faster outage restoration Cost reduction Demand Response Improved inventory management 68
69 Advanced Metering Infrastructure Digital hardware and software Interval data measurement capability Two-way remote communications 69
70 AMI in Modern Grid vision Advanced Metering Infrastructure, National Energy Technology Laboratory, U.S Department of Energy, Office of Electricity Delivery and Energy Reliability, February
71 Basic AMI architecture Customer Data Collection Communication Network Utility/ Third Party Data Reception and Management Electricity Meter Gas Meter Data Transmission Network (BPL,PLC, RF, Public Networks) AMI Host server Meter Data Management System (MDMS) Water Meter Source: 71
72 AMI communication architecture Advanced Metering Infrastructure, National Energy Technology Laboratory, U.S Department of Energy, Office of Electricity Delivery and Energy Reliability, February
73 AMI security issues Cleveland, F.M.;, "Cyber security issues for Advanced Metering Infrastructure (AMI)," Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, vol., no., pp.1-5, July
74 Conclusion Cyber-Physical Security of Power Grid is a national priority Smart Grid Security = Info Sec + Infra Sec + Application Security Defense-in-Depth & End-to-end Security & Attack-resilient Systems Cyber-Physical Security Testbeds & Experimentations Standards development and Industry adoption are critical Education and workforce development are very important Synergistic collaboration between Industry-University-National Labs International Collaboration is important! 74
75 THANK YOU Acknowledgements: U.S. National Science Foundation (NSF) U.S. Department of Homeland Security (DHS) U.S. Department of Energy (DOE) U.S. NSF IU/CRC Power Engr. Research Center (PSERC) Iowa State Univ., Electric Power Research Center (EPRC) Graduate Students: Aditya Ashok (ISU) Collaborators: Prof. Chen-Ching Liu, Washington State University (WSU) Prof. Venkat Ajjarapu, Iowa State University (ISU) Dr. Adam Hahn, MITRE Dr. Jianhui Wang, PNNL Dr. C. W. Ten, Michigan Tech. Professional: IEEE PES - PSACE CAMS Cyber Security Task Force 75
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Cyber-Physical Systems Security for Smart Grid
Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems Engineering Research Center Empowering Minds to Engineer the Future Electric Energy System Cyber-Physical
Cyber Security. Smart Grid
Cyber Security for the Smart Grid Peter David Vickery Executive Vice President N-Dimension Solutions Inc. APPA National Conference June 21, 2010 Cyber Security Solutions For Cyber Security
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
Facilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn
Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Overview Assurance & Evaluation Security Testing Approaches
Cyber Security of the Power Grid
Cyber Security of the Power Grid Chen-Ching Ching Liu Professor of Power Systems University College Dublin Research for Ireland s Future Ireland -Country of natural beauty -Quality of life ranked among
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847
IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847 Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid Adam Hahn, Student Member, IEEE, Aditya Ashok, Student
An Evaluation of Security Posture Assessment Tools on a SCADA Environment
An Evaluation of Security Posture Assessment Tools on a SCADA Environment Shahir Majed 1, Suhaimi Ibrahim 1, Mohamed Shaaban 2 1 Advance Informatics School, Universiti Teknologi Malaysia, International
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Cyber Security for NERC CIP Version 5 Compliance
GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs
Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
Design Document. Team Members: Tony Gedwillo James Parrott David Ryan. Faculty Advisor: Dr. Manimaran Govindarasu
12/6/2010 SDMAY11-11 CYBER SECURITY OF SCADA SYSTEMS TEST BED Design Document Team Members: Tony Gedwillo James Parrott David Ryan Faculty Advisor: Dr. Manimaran Govindarasu Design Document Tony Gedwillo
Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit
Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
Cybersecurity for Electric Power Control and Automation Systems
Cybersecurity for Electric Power Control and Automation Systems Chee-Wooi Ten, Student Member, IEEE, Manimaran Govindarasu, Member, IEEE, and Chen-Ching Liu, Fellow, IEEE Abstract Disruption of electric
SCADA System Overview
Introduction SCADA systems are critical to the control and monitoring of complex cyber-physical systems. Now with advanced computer and communications technologies, SCADA systems are connected to networks
PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
!! "# $%!& $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565
!! "# $%!& '(!)**+* $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565 1 Content CRUTIAL testbeds - objectives The Telecontrol Testbed platform Critical scenarios - plotted demo Experimental results The
North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)
Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Safe Network Integration
UNIDIRECTIONAL SECURITY GATEWAYS Safe Network Integration Stronger than Firewalls Shaul Pescovsky, Sales Director Waterfall Security Solutions [email protected] Proprietary Information -- Copyright
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations
Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations Leveraging Configuration and Vulnerability Analysis for Critical Assets and Infrastructure May 2015 (Revision 2) Table of
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
Fundamentals of a Windows Server Infrastructure MOC 10967
Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
Implementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
Effective Defense in Depth Strategies
Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
Cybersecurity considerations for electrical distribution systems
White Paper WP152002EN Supersedes January 2014 electrical distribution systems Authors Max Wandera, Brent Jonasson, Jacques Benoit, James Formea, Tim Thompson, Zwicks Tang, Dennis Grinberg, Andrew Sowada,
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
Jort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends
Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014
Cyber Physical System Security for the Electric Power Grid
INVITED PAPER Cyber Physical System Security for the Electric Power Grid Control in power systems that may be vulnerable to security attacks is discussed in this paper as are control loop vulnerabilities,
Patching & Malicious Software Prevention CIP-007 R3 & R4
Patching & Malicious Software Prevention CIP-007 R3 & R4 Scope Compliance Assessment Summary Introspection & Analysis Program-In Review Maturity Model review Control Design review Process Components of
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13
COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security
Securing the Electric Grid with Common Cyber Security Services Jeff Gooding
Securing the Electric Grid with Common Cyber Security Services Jeff Gooding TCIPG Seminar April 4, 2014 Southern California Edison (SCE) is committed to safely providing reliable and affordable electricity
CYBER SECURITY OF SUBSTATION AUTOMATION SYSTEMS
CYBER SECURITY OF SUBSTATION AUTOMATION SYSTEMS By JUNHO HONG A dissertation submitted in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY WASHINGTON STATE UNIVERSITY School
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:
1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus
SCADA/Business Network Separation: Securing an Integrated SCADA System
SCADA/Business Network Separation: Securing an Integrated SCADA System This white paper is based on a utility example but applies to any SCADA installation from power generation and distribution to water/wastewater
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack
DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page
LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION
LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
