Integrated On-Line Risk Prediction: Think Globally and Act Locally. Dr. Chiara Foglietta,

Size: px
Start display at page:

Download "Integrated On-Line Risk Prediction: Think Globally and Act Locally. Dr. Chiara Foglietta, chiara.foglietta@uniroma3.it"

Transcription

1 Integrated On-Line Risk Prediction: Think Globally and Act Locally Dr. Chiara Foglietta, Final Workshop Rome, December 16th, 2014

2 Motivation and Background

3 Power Grid Operating States Normal State Secure or Insecure Blackouts Restorative State Violated Operational Limits Emergency State

4 Vulnerability Sources for Power Grids Natural calamities Component failures Protection and control failures Faults Human errors Inadequate security margin Gaming in the market Missing or uncertain information Sabotage or cyber-intrusion

5 Vulnerability Sources for Power Grids Natural calamities Component failures Protection and control failures Faults Human errors Inadequate security margin Gaming in the market Missing or uncertain information Sabotage or cyber-intrusion

6 The Reality Blackouts will occur again in the future Our power grid is too complex to make it fail-safe! The challenge is: To prevent the cascading, uncontrolled spread of an initiating blackout! To restore power to affected customers ASAP!

7 IRP inside CockpitCI system

8 IRP & Detection Layer & Secure Mediation GW SCADA REMOTE IRP SMGW SMGW IRP Honeypot & IDS Detection Layer FUSION OF ALL RISK ALERTS

9 FROM HOLISTIC ASSESSMENT TO COMBINED IMPACT EVALUATION CYBER DETECTION CYBER DETECTION SCADA Operator CYBER DETECTION SCADA HMI NATIONAL CERT OPERATIVE LEVEL TRANSLATION COMBINED IMPACT EVALUATION (CISIA) EXTENDED Situation Assessment RISK LEVEL SECURITY Operator OTHER CIs Cyber- Physical inferences REMOTE IRP NATIONAL CONTROL ROOM (CERT) Holistic estimation Reductionistic decomposition for cascading effects evaluation

10 QoS Assessment Security Factors Thanks to Matthieu Aubigny from itrust Consulting

11 QoS Assessment Security Factors Thanks to Matthieu Aubigny from itrust Consulting

12 THE MIXED HOLISTIC-REDUCTIONISTIC MODELLING PERSPECTIVE Behaviours (physical or logical or political) not emerging from Reductionistic layer Expressions of both holistic and reductionistic models Intra-Inter- Infrastructure homogeneous layer capturing interdependencies

13 CISIApro: an agent based simulator Reductionistic decomposition for cascading effects evaluation

14 CISIApro: an output of CockpitCI project Output Entity Maker Resources Faults & Variables

15 Medium Voltage Electric Grid Thanks to IEC (Israel Electric Corporation)

16 Interconnected telecommunication and SCADA network Thanks to IEC (Israel Electric Corporation)

17 PortScan attack Step 1

18 PortScan attack Step 2

19 PortScan attack Step 3

20 Syn Flood attack Step 1

21 Syn Flood attack Step 2

22 Syn Flood attack Step 3

23 Integrated Risk Prediction Aim Increase the situational awareness of the operator including information and data that usually are missing

24 Smart RTU and Reaction Strategies

25 SMART Industrial Control Systems Standard ICS SMART ICS Process optimization Monitor and manage information on all levels Identify the optimal response strategies in case of attack or contingency Perform (or suggest to the operator) automatic reactions at global level Coordinate automatic reactions at local level

26 Smart Extension and Smart RTU From/to other SE or IDS PLANT RTU Smart Extension From/to SCADA control Smart RTU The Smart Extension is an application level commands filter device, inserted in the SCADA communication channel. If the risk level of a cyber attack is increased, the Smart Extension may block inputs to the RTU (or reduce the accepted input messages to a minimum), in order to maintain a safe state.

27 Smart Ecosystem and Cluster Awareness Smart Cluster Local IDS & Honeypot SCADA Smart Extension Smart Extension Smart Extension IRP Smart Control Detection Layer

28 Smart RTU Extension Aim Put intelligence and logic reasoning at the RTU level increasing the reaction strategies in event of cyber attacks

29 Conclusions and Ongoing Works Refine the model of the power grid beyond the topology analysis and the load shedding procedures. Refine the model of the telecommunication network beyond the connectivity model. Integrate other CIs in CISIA software such as water distribution network and gas pipelines. Integrate other sources of data into the Integrated Risk Prediction Connect the Smart RTU to the Integrated Risk Prediction Standardize rules and countermeasures for the Smart RTU.

30 Any question? Dr. Chiara Foglietta,

31 Thank you for your attention

32 Thanks to Roma3 Team: Prof. Stefano Panzieri, Riccardo Santini, Giovanni Corbò, Cosimo Palazzo, Simone Palmieri, Antonio Di Pietro, bachelor students, master students and everyone I forget.

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks CIBSI 2013 Panama City, Panama, October 30 th, 2013 On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks Paulo Simões, Tiago Cruz, Jorge Gomes, Edmundo Monteiro psimoes@dei.uc.pt

More information

Small or Medium scale focused research project STREP MICIE

Small or Medium scale focused research project STREP MICIE FP7-ICT-SEC-2007.1.7 ICT-SEC 225353 - MICIE Small or Medium scale focused research project STREP MICIE Tool for systemic risk analysis and secure mediation of data exchanged across linked CI information

More information

La Gestione delle Infrastrutture Critiche. Prof. Roberto Setola Unità di Ricerca di AUTOMATICA Facoltà Dipartimentale di Ingegneria

La Gestione delle Infrastrutture Critiche. Prof. Roberto Setola Unità di Ricerca di AUTOMATICA Facoltà Dipartimentale di Ingegneria La Gestione delle Infrastrutture Critiche Prof. Roberto Setola Unità di Ricerca di AUTOMATICA Facoltà Dipartimentale di Ingegneria La Gestione delle Infrastrutture Critiche Modellazione Identificazione

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014

More information

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION

More information

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A. 21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale

More information

Valutazione e gestione del rischio nell'esercizio del sistema elettrico

Valutazione e gestione del rischio nell'esercizio del sistema elettrico Valutazione e gestione del rischio nell'esercizio del sistema elettrico Emanuele Ciapessoni, Diego Cirio, Andrea Pitto Workshop nazionale Simulazione del sistema energetico ENEA, Roma, 25 marzo 2015 Operational

More information

GENe Software Suite. GENe-at-a-glance. GE Energy Digital Energy

GENe Software Suite. GENe-at-a-glance. GE Energy Digital Energy GE Energy Digital Energy GENe Software Suite Today s utilities have complex requirements that need sophisticated solutions. GE Energy s GENe provides these solutions. Using the latest advances in technology,

More information

Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures

Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures FP7-SEC-2011-1 Project 285647 Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures D6.1 Validation Plan-Final General information Submission date 31/12/2013

More information

Airports and their SCADA Systems. Dr Leigh Armistead, CISSP. Peregrine Technical Solutions

Airports and their SCADA Systems. Dr Leigh Armistead, CISSP. Peregrine Technical Solutions Airports and their SCADA Systems Dr Leigh Armistead, CISSP Peregrine Technical Solutions What We May Face For an attack to be successful it only has to cause disruption not loss of life to a significant

More information

What Risk Managers need to know about ICS Cyber Security

What Risk Managers need to know about ICS Cyber Security What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 joe.weiss@realtimeacs.com ICSs What are they

More information

Progetti di ricerca internazionali

Progetti di ricerca internazionali Progetti di ricerca internazionali 2014 URANIUM - Unified Risk Assessment Negotiation via Interoperability Using Multi-sensor data Prevention Preparedness and Consequence Management of Terrorism and other

More information

ICS, SCADA, and Non-Traditional Incident Response. Kyle Wilhoit Threat Researcher, Trend Micro

ICS, SCADA, and Non-Traditional Incident Response. Kyle Wilhoit Threat Researcher, Trend Micro ICS, SCADA, and Non-Traditional Incident Response Kyle Wilhoit Threat Researcher, Trend Micro 1 $whoami Threat Researcher, FTR, Trend Micro Threat Researcher at Trend Micro- research and blogger on criminal

More information

Antonio Di Pietro. antonio.dipietro@enea.it Italian

Antonio Di Pietro. antonio.dipietro@enea.it Italian CURRICULUM VITAE PERSONAL INFORMATION First name / Surname City Rome Telephone 39-339 48 92 925 39-06 3048 3821 Fax 39-06 3048 6511 E-mails Nationality Date of birth 08.25.1978 Gender antonio.dipietro@enea.it

More information

Cybersecurity Risk Assessment in Smart Grids

Cybersecurity Risk Assessment in Smart Grids Cybersecurity Risk Assessment in Smart Grids Lucie Langer, Paul Smith, Thomas Hecht firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Symposium 2014 Sept 30, 2014 1 Risk Assessment:

More information

Monitoring & Control of Small-scale Renewable Energy Sources

Monitoring & Control of Small-scale Renewable Energy Sources Small Scale Renewable Energy Sources and Energy Saving: 6-17 th July 2009 Monitoring & Control of Small-scale Renewable Energy Sources Dr G A Taylor Brunel Institute of Power Systems Brunel University,

More information

Evolution of Control for the Smart Transmission Grid

Evolution of Control for the Smart Transmission Grid Evolution of Control for the Smart Transmission Grid Anjan Bose Washington State University Pullman, WA SCE Smart Grid Research Symposium California Institute Of Technology October, 2011 The Past (before

More information

UE Project N.261788. Global risk assessment. RSE, Alstom Grid, City University London, JRC, SINTEF, Univ. Genoa. D. Cirio, RSE. AFTER Final Workshop

UE Project N.261788. Global risk assessment. RSE, Alstom Grid, City University London, JRC, SINTEF, Univ. Genoa. D. Cirio, RSE. AFTER Final Workshop F T ER UE Project N.261788 Global risk assessment RSE, Alstom Grid, City University London, JRC, SINTEF, Univ. Genoa D. Cirio, RSE AFTER Final Workshop Rome, 27 November 2014 Outline Background & Motivations

More information

!! "# $%!& $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565

!! # $%!& $!$ +) * ', -./01.//1233/ 4, -./01.//12223 *, 565 !! "# $%!& '(!)**+* $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565 1 Content CRUTIAL testbeds - objectives The Telecontrol Testbed platform Critical scenarios - plotted demo Experimental results The

More information

GLOBAL VIRTUAL. Global Virtual Conference April, 8. - 12. 2013. SECTION 19. Information Technology

GLOBAL VIRTUAL. Global Virtual Conference April, 8. - 12. 2013. SECTION 19. Information Technology Computerized risk detection towards Critical Infrastructure Protection: An Introduction of CockpitCI Project Jianmin Jiang Department of Computing, University of Surrey, Guildford, GU2 7XH, United Kingdom.

More information

Down the SCADA (security) Rabbit Hole. Alberto Volpatto

Down the SCADA (security) Rabbit Hole. Alberto Volpatto Down the SCADA (security) Rabbit Hole Alberto Volpatto Alberto Volpatto Security Engineer & Team Leader @ Secure Network Computer Engineer Application Security Specialist What is SCADA? Supervisory operators,

More information

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005 AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT

More information

Cyber Security Health Test

Cyber Security Health Test ENERGY Cyber Security Health Test Robin Massink 20-05-2014 1 DNV GL 2013 2014 20-12-2013 SAFER, SMARTER, GREENER Cyber security issues facing the utility industry We are moving from IEC60870-5-101/ DNP3

More information

Synchronized real time data: a new foundation for the Electric Power Grid.

Synchronized real time data: a new foundation for the Electric Power Grid. Synchronized real time data: a new foundation for the Electric Power Grid. Pat Kennedy and Chuck Wells Conjecture: Synchronized GPS based data time stamping, high data sampling rates, phasor measurements

More information

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology

More information

Holistic View of Industrial Control Cyber Security

Holistic View of Industrial Control Cyber Security Holistic View of Industrial Control Cyber Security A Deep Dive into Fundamentals of Industrial Control Cyber Security Learning Goals o Understanding security implications involving industrial control systems

More information

Agenda do Mini-Curso. Sérgio Yoshio Fujii. Ethan Boardman. sergio.fujii@areva-td.com. ethan.boardman@areva-td.com

Agenda do Mini-Curso. Sérgio Yoshio Fujii. Ethan Boardman. sergio.fujii@areva-td.com. ethan.boardman@areva-td.com Agenda do Mini-Curso Sérgio Yoshio Fujii sergio.fujii@areva-td.com Ethan Boardman ethan.boardman@areva-td.com Agenda do Mini-Curso Sistemas de Distribuição (DMS) Characteristics of Distribution Network

More information

SCADA System Security, Complexity, and Security Proof

SCADA System Security, Complexity, and Security Proof SCADA System Security, Complexity, and Security Proof Reda Shbib, Shikun Zhou, Khalil Alkadhimi School of Engineering, University of Portsmouth, Portsmouth, UK {reda.shbib,shikun.zhou,khalil.alkadhimi}@port.ac.uk

More information

Cyber Security of the Smart Grid

Cyber Security of the Smart Grid Cyber Security of the Smart Grid Design Document May 12-21 11/4/11 Group Members John Majzner Daniel Kosac Kyle Slinger Jeremy Deberg Team Advisor Manimaran Govindarasu Graduate Students Adam Hahnad Siddharth

More information

How To Protect Critical Infrastructure From Attack

How To Protect Critical Infrastructure From Attack Trust and Reputation Management for Critical Infrastructure Protection Filipe Caldeira 12, Edmundo Monteiro 1, and Paulo Simões 1 1 Universidade de Coimbra - DEI/CISUC, Coimbra, 3030-290, Portugal {fmanuel,edmundo,psimoes}@dei.uc.pt

More information

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience INSPIRE: INcreasing Security and Protection through Infrastructure REsilience Salvatore D Antonio University of Naples Parthenope Consorzio Interuniversitario Nazionale per l Informatica 20th of May 2010

More information

SMART ENERGY. The only cloud that speeds up your. cloud services. broadband for smart grids. Last Mile Keeper

SMART ENERGY. The only cloud that speeds up your. cloud services. broadband for smart grids. Last Mile Keeper SMART ENERGY cloud services broadband for smart grids Last Mile Keeper The only cloud that speeds up your Energy Management System Introduction Smart Grids are the result of the merging between power and

More information

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios Lucie Langer and Paul Smith firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September,

More information

Proceedings of the 13th European Conference on Cyber Warfare and Security

Proceedings of the 13th European Conference on Cyber Warfare and Security Proceedings of the 13th European Conference on Cyber Warfare and Security The University it of Piraeus Greece 3-4 July 2014 Edited by Andrew Liaropoulos and George Tsihrintzis A conference managed by ACPI,

More information

Cyber Security of the Power Grid

Cyber Security of the Power Grid Cyber Security of the Power Grid Chen-Ching Ching Liu Professor of Power Systems University College Dublin Research for Ireland s Future Ireland -Country of natural beauty -Quality of life ranked among

More information

Integrated System Modeling for Handling Big Data in Electric Utility Systems

Integrated System Modeling for Handling Big Data in Electric Utility Systems Integrated System Modeling for Handling Big Data in Electric Utility Systems Stephanie Hamilton Brookhaven National Laboratory Robert Broadwater EDD dew@edd-us.com 1 Finding Good Solutions for the Hard

More information

SECURITY RISK ANALYSIS AND EVALUATION OF INTEGRATING CUSTOMER ENERGY MANAGEMENT SYSTEMS INTO SMART DISTRIBUTION GRIDS

SECURITY RISK ANALYSIS AND EVALUATION OF INTEGRATING CUSTOMER ENERGY MANAGEMENT SYSTEMS INTO SMART DISTRIBUTION GRIDS SECURITY RISK ANALYSIS AND EVALUATION OF INTEGRATING CUSTOMER ENERGY MANAGEMENT SYSTEMS INTO SMART DISTRIBUTION GRIDS Christian HÄGERLING Fabian M. KURTZ Christian WIETFELD TU Dortmund University Germany

More information

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security A Holistic Security Risk Management Approach www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security This white paper discusses current

More information

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation

More information

New Era in Cyber Security. Technology Development

New Era in Cyber Security. Technology Development New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security

More information

Designing secure networks for substation automation and control systems

Designing secure networks for substation automation and control systems Designing secure networks for substation automation and control systems Niculescu Eliodor Sorin, Rusta Constantin, Mircea Paul Mihai, Ruieneanu Liviu and Daianu Adrian Abstract Development of the energy

More information

Cyber Security for SCADA/ICS Networks

Cyber Security for SCADA/ICS Networks Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And

More information

Cybersecurity of Control System Networks

Cybersecurity of Control System Networks Cybersecurity of Control System Networks Robin Gandhi, William Mahoney, Ken Dick University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) Nebraska University Centre on

More information

Emerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP

Emerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP Emerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP July 25, 2014 Topics Improved 4G Communications Mobile Devices Cyber Security Threats Cyber Security Guidance

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access

More information

Dr. György Kálmán gyorgy@mnemonic.no

Dr. György Kálmán gyorgy@mnemonic.no COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán gyorgy@mnemonic.no Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats

More information

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests

More information

Infrastructure Interdependencies

Infrastructure Interdependencies Infrastructure Interdependencies Terrence K. (Terry) Kelly, Ph.D. Senior National Security Officer White House Office of Science and Technology Policy based in part on an article to appear in IEEE Control

More information

Opportunities to Overcome Key Challenges

Opportunities to Overcome Key Challenges The Electricity Transmission System Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia

More information

ADMS(Advanced Distribution Management System ) in Smart Grid

ADMS(Advanced Distribution Management System ) in Smart Grid ADMS(Advanced Distribution Management System ) in Smart Grid 柯 佾 寬 博 士 Yi-Kuan Ke, Ph.D. 2014/03/28 Smart Grid Solution Smart Grid Solution Overview Smart Grid Solutions Smart Network Operation - Distribution

More information

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Overview Assurance & Evaluation Security Testing Approaches

More information

Big Data-ready, Secure & Sovereign Cloud

Big Data-ready, Secure & Sovereign Cloud Copernicus Big Data Workshop Big Data-ready, Secure & Sovereign Cloud A Technology Enabler for Copernicus Data Innovation March 14 th, 2014 Brussels F. BOUJEMAA R&D Manager E. MICONNET - Head of Cyber

More information

PREEMPTIVE. Preventive methodology and tools to protect utilities http://preemptive.eu/ Main goal

PREEMPTIVE. Preventive methodology and tools to protect utilities http://preemptive.eu/ Main goal PREEMPTIVE Preventive methodology and tools to protect utilities http://preemptive.eu/ Ignasi Cairó 15 October 2015 Brussels Main goal The main goal of PREEMPTIVE is to provide an innovative solution for

More information

Industrial Cyber Security 101. Mike Spear

Industrial Cyber Security 101. Mike Spear Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security Mike.spear@honeywell.com Responsible for the Global Delivery of Honeywell

More information

This is a preview - click here to buy the full publication

This is a preview - click here to buy the full publication TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems

More information

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE 1 CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE Gavin McLintock P.Eng. CISSP PCIP 2 METCALFE POWER STATION 16 April 2013 Sophisticated physical attack 27 Days outage $15.4 million

More information

Gunnar Björkman, ABB Mannheim. Smart Grids Security SICS Security Seminar in Kista on April 8, 2014

Gunnar Björkman, ABB Mannheim. Smart Grids Security SICS Security Seminar in Kista on April 8, 2014 Gunnar Björkman, ABB Mannheim Smart Grids Security SICS Security Seminar in Kista on April 8, 2014 Smart Grids Security Agenda Traditional Supervision and Control Evolution to Smart Grids Grid4EU A large

More information

The Critical Infrastructure: To be or not to be Secure. European Network for Cyber Security. Fred Streefland Director Education & Training

The Critical Infrastructure: To be or not to be Secure. European Network for Cyber Security. Fred Streefland Director Education & Training The Critical Infrastructure: To be or not to be Secure European Network for Cyber Security Fred Streefland Director Education & Training Utilinet Securing IP/Ethernet Networks CBS video Aurora Content

More information

Vulnerabilities in SCADA and Critical Infrastructure Systems

Vulnerabilities in SCADA and Critical Infrastructure Systems International Journal of Future Generation Communication and Networking 99 Vulnerabilities in SCADA and Critical Infrastructure Systems Rosslin John Robles 1, Min-kyu Choi 1, Eun-suk Cho 1, Seok-soo Kim

More information

Security Testing in Critical Systems

Security Testing in Critical Systems Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base

More information

Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg

Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Challenges of Future Internet Internet as a starting point Was defined for asynchronous services (web pages, file transfer

More information

ISACA rudens konference

ISACA rudens konference ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial

More information

SCADA. The Heart of an Energy Management System. Presented by: Doug Van Slyke SCADA Specialist

SCADA. The Heart of an Energy Management System. Presented by: Doug Van Slyke SCADA Specialist SCADA The Heart of an Energy Management System Presented by: Doug Van Slyke SCADA Specialist What is SCADA/EMS? SCADA: Supervisory Control and Data Acquisition Retrieves data and alarms from remote sites

More information

PROJECT FINAL REPORT

PROJECT FINAL REPORT PROJECT FINAL REPORT Grant Agreement number: 225353 Project acronym: MICIE Project title: Tool for systemic risk analysis and secure mediation of data exchanged across linked CI information infrastructures

More information

Power System Security Monitoring, Analysis, and Control. George Gross

Power System Security Monitoring, Analysis, and Control. George Gross ECE 573 Power System Operations and Control Power System Security Monitoring, Analysis, and Control George Gross Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign

More information

SHOULD I BE CONCERNED ABOUT CYBER SECURITY? OR IS THE BETTER QUESTION WHAT IS CYBER SECURITY?!!!?

SHOULD I BE CONCERNED ABOUT CYBER SECURITY? OR IS THE BETTER QUESTION WHAT IS CYBER SECURITY?!!!? SHOULD I BE CONCERNED ABOUT CYBER SECURITY? OR IS THE BETTER QUESTION WHAT IS CYBER SECURITY?!!!? What we are not going to discuss: Understand, I am not a computer guru. My knowledge is probably more limited

More information

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage. Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee

More information

The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems

The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems Mathias Ekstedt, Associate Prof. KTH Royal Institute of Technology, Stockholm

More information

WORKSHOP Rethinking Cyber Security for Industrial Control Systems

WORKSHOP Rethinking Cyber Security for Industrial Control Systems WORKSHOP Rethinking Cyber Security for Industrial Control Systems Bob Mick, Workshop Moderator VP Emerging Technologies ARC Advisory Group bmick@arcweb.com 1 Re-Thinking Cyber Security Why Re-Thinking?

More information

Energy Infrastructure Security: Advanced multidimensional threats and responses. By John Cogliandro November 17, 2009

Energy Infrastructure Security: Advanced multidimensional threats and responses. By John Cogliandro November 17, 2009 Energy Infrastructure Security: Advanced multidimensional threats and responses By John Cogliandro November 17, 2009 Outline Energy Infrastructure Security: Advanced multidimensional threats and responses

More information

Methods for Assessing Vulnerability of Critical Infrastructure

Methods for Assessing Vulnerability of Critical Infrastructure March 2010 Methods for Assessing Vulnerability of Critical Infrastructure Project Leads Eric Solano, PhD, PE, RTI International Statement of Problem Several events in the recent past, including the attacks

More information

Intrusion Detection for SCADA Systems

Intrusion Detection for SCADA Systems Intrusion Detection for SCADA Systems Dr Kieran McLaughlin CSIT, Queen s University Belfast Outline Background & Motivation Experience with IEC 60870-5-104 SCADA-IDS approach SPARKS mini-project targeting

More information

Water Infrastructure Interdependencies

Water Infrastructure Interdependencies Water Infrastructure Interdependencies John Whitler US EPA Office of Water Water Security Division February 12, 2006 November 2005 DRAFT For Official Use Only Do Not Cite, Circulate, or Copy 1 Overview

More information

Information Services for Smart Grids

Information Services for Smart Grids Smart Grid and Renewable Energy, 2009, 8 12 Published Online September 2009 (http://www.scirp.org/journal/sgre/). ABSTRACT Interconnected and integrated electrical power systems, by their very dynamic

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community

More information

The State-of-the-State of Control System Cyber Security

The State-of-the-State of Control System Cyber Security The State-of-the-State of Control System Cyber Security Prepared for HTCIA September 19, 2012 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 joe.weiss@realtimeacs.com Summary Control systems are

More information

Stress Testing and Distributed Denial of Service Testing of Network Infrastructures

Stress Testing and Distributed Denial of Service Testing of Network Infrastructures Faculty of Electrical Engineering and Communication Brno University of Technology Technická 12, CZ-616 00 Brno, Czechia http://www.six.feec.vutbr.cz Stress Testing and Distributed Denial of Service Testing

More information

Solutions and IT services for Oil-Gas & Energy markets

Solutions and IT services for Oil-Gas & Energy markets Solutions and IT services for The context Companies operating in the Oil-Gas & Energy sectors are facing radical changes that have a significant impact on their business processes. In this context, compliance

More information

Test di sicurezza in ambienti Smart Grid e SCADA

Test di sicurezza in ambienti Smart Grid e SCADA Test di sicurezza in ambienti Smart Grid e SCADA Simone Riccetti, IBM Italy simone.riccetti@it.ibm.com Agenda SCADA/Smart Grid overview SCADA/Smart Grid security issues Security test challenges Testing

More information

September 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for

September 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for Testimony of John A. McCarthy, Director of the Critical Infrastructure Protection Project, George Mason School of Law Before a joint hearing of the House Subcommittee on Infrastructure Security and The

More information

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards A Concise Model to Evaluate Security of SCADA Systems based on Security Standards Nasser Aghajanzadeh School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran Alireza Keshavarz-Haddad

More information

Who Are The Enemies? What Can They Do?

Who Are The Enemies? What Can They Do? Who Are The Enemies? What Can They Do? Internet Software Security Issues in the Software Development Process Dr Charles P Pfleeger Pfleeger Consulting Group chuck@pfleeger.com Overview WAMPS 2009 - Workshop

More information

Secure Networking for Critical Infrastructure. Ilan Barda March 2014

Secure Networking for Critical Infrastructure. Ilan Barda March 2014 Secure Networking for Critical Infrastructure Ilan Barda March 2014 RADiFlow as part of the RAD Group The Access Company Secure Ruggedized Communication Solutions Wireless Mobile Backhaul Group Distributor

More information

SCADA Security. Balancing security and functionality in the development and integration of next generation SCADA architectures

SCADA Security. Balancing security and functionality in the development and integration of next generation SCADA architectures SCADA Security Balancing security and functionality in the development and integration of next generation SCADA architectures SG Tech Europe 2015 Smart Grids Technical Forum Salzburg Netz GmbH Ein Unternehmen

More information

Hybrid Risk Management for Utility Networks

Hybrid Risk Management for Utility Networks Hybrid Risk Management for Utility Networks Hermann de Meer hermann.demeer@uni-passau.de Computer Networks and Computer Communications Lab (CNACC) University of Passau CNACC: Introduction People Prof.

More information

Realization of control center HMIs by using IEC 61850 and CIM data bases for communication and data handling

Realization of control center HMIs by using IEC 61850 and CIM data bases for communication and data handling Realization of control center HMIs by using IEC 61850 and CIM data bases for communication and data handling A. Naumann, Otto-von-Guericke-University, Magdeburg V. Kostenko, Delphin-Informatika, Moscow

More information

Network Cyber Security. Presented by: Motty Anavi RFL Electronics

Network Cyber Security. Presented by: Motty Anavi RFL Electronics Network Cyber Security Presented by: Motty Anavi RFL Electronics Agenda Cyber Security Threats Defense Strategy & Consequences Next Generation Networking ICS Vulnerabilities Liabilities Next Gen Networking

More information

Steve Lusk Alex Amirnovin Tim Collins

Steve Lusk Alex Amirnovin Tim Collins Steve Lusk Alex Amirnovin Tim Collins ViaSat Inc. Cyber-intrusion Auto-response and Policy Management System (CAPMS) Cybersecurity for Energy Delivery Systems Peer Review August 5-6, 2014 Summary: Cyber-intrusion

More information

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191 Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3

More information

Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures

Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures Workshop on Novel Approaches to Risk and Security Management for Utility Providers and Critical Infrastructures Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures Xiaobing

More information

Testing Intelligent Device Communications in a Distributed System

Testing Intelligent Device Communications in a Distributed System Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) dgoughnour@trianglemicroworks.com United States Smart Grid systems

More information

Cyber security and critical national infrastructure

Cyber security and critical national infrastructure 120 Dr Richard Piggin Manager Defence, Aerospace & Communications Atkins Cyber security and critical national infrastructure Abstract Cyber security is an all-embracing term, meaning different things to

More information

UE Project N.261788. Assessment and applicability of the global risk assessment tool. Hanne Vefsnmo, hanne.vefsnmo@sintef.no SINTEF Energy Research

UE Project N.261788. Assessment and applicability of the global risk assessment tool. Hanne Vefsnmo, hanne.vefsnmo@sintef.no SINTEF Energy Research UE Project N.261788 Assessment and applicability of the global risk assessment tool Hanne Vefsnmo, hanne.vefsnmo@sintef.no SINTEF Energy Research Final workshop, Rome, 2014-11-27 Outline Short introduction

More information

THE FUTURE OF SMART GRID COMMUNICATIONS

THE FUTURE OF SMART GRID COMMUNICATIONS THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND

More information

A MODERN DISTRIBUTION MANAGEMENT SYSTEM FOR REGIONAL ELECTRICITY COMPANIES

A MODERN DISTRIBUTION MANAGEMENT SYSTEM FOR REGIONAL ELECTRICITY COMPANIES A MODERN DISTRIBUTION MANAGEMENT SYSTEM FOR REGIONAL ELECTRICITY COMPANIES A Roberts, T Berry, W D Wilson Schneider Electric Ltd, UK SYNOPSIS This paper describes the features of a modern Distribution

More information

Cybersecurity Landscape for the Utility Industry and Considerations for State Regulators

Cybersecurity Landscape for the Utility Industry and Considerations for State Regulators Cybersecurity Landscape for the Utility Industry and Considerations for State Regulators Chairman s Forum on Cybersecurity and Critical Infrastructure Kentucky Public Service Commission, Hearing Room One

More information

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually

More information

An Introduction to SCADA-ICS System Security. Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015

An Introduction to SCADA-ICS System Security. Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015 An Introduction to SCADA-ICS System Security Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015 Overview Supervisory Control And Data Acquisition (SCADA) for Industrial Control Systems

More information