Cyber-Physical System Security of Smart Grid
|
|
- Daniela Patrick
- 8 years ago
- Views:
Transcription
1 Cyber-Physical System Security of Smart Grid Manimaran Govindarasu Dept. of Electrical and Computer Engineering Iowa State University, USA Presented at NSF-ECEDHA Energy and Power Summer Program, Georgia Tech, July 9, 2011
2 Presentation Outline Intro. to cyber systems and security Cyber attacks on power grid Risk assessment 4 Control systems security 5 6 SCADA Security Testbed Conclusions Page 2
3 Characteristics of Secure System Confidentiality: - Message content should be accessed by authorized users only - Achieved by using encryption Integrity: - Making sure that message was not altered (in transit, or later) without detection - Achieved by using hashing Availability: - services must be accessible and available to authorized users Authentication: - Sender, receiver want to confirm identity of each other - Achieved by using d Non-Repudiation: - The actual sender can not claim that he did not send the message - Achieved by using digital signature
4 Security Threats Interruption: preventing messages from reaching authorized users Interception: getting access to the message content Modification: altering the message content Fabrication: injecting fake messages A B Replication: re-sending previously sent message Infrastructure attacks: many forms: protocol attacks, intrusions, DoS
5 Security threats/characteristics mapping Security Threat Interruption Interception Modification Fabrication Replication Characteristics affected Availability Confidentiality Integrity Confidentiality Availability Availability Authentication Authentication Availability
6 Internet operation Functional & Attack View DoS hack DNS Server Intra-domain routing Interruption Fabrication DoS attacks Routing table poisoning Destination Packet Mistreating Src Dst NxtHop (Routing Table) Protocol attacks Page 4
7 Securing the Cyber systems is difficult Open and interoperable protocols - while desirable, tend to work against security. Security vs. performance tradeoff - performance was usually preferred Security is expensive - special resources are needed to support it Security vs. usability tradeoff - security often complicates things Attackers enjoy breaking into a system - Some people see circumventing security as a challenge and enjoy doing it Cyber Infrastructure is vulnerable - Most systems and networks were not designed with security concerns in mind
8 Cyber Threats to Critical Infrastructures Cyber-Based Attacks Protocol Attacks Routing Attacks Intrusions Worms / Spyware/ Malware Denial of Service (DoS) Insider Threats [General Accounting Office, CIP Reports, 2004 to 2010]; [NSA Perfect Citizen, 2010]: Recognizes that critical infrastructures are vulnerable to cyber attacks from numerous sources, including hostile governments, terrorist groups, disgruntled employees, and other malicious intruders. Page 8
9 Statistics of Cyber Vulnerability Total vulnerability: 39,490 (Up-to-date) Statistics From US CERT Total Vulnerabilities Cateloged Page 9
10 Distributed Denial of Service Attack (DDos) - e.g., Botnets Slave (zombie) Slave (zombie) Slave (zombie) Master Attacker Slave (zombie) 2. The master installs attack code on slave machines, also called (zombies). 1. Attacker compromises attack machine (the master). Victim 3. Slaves are instructed to flood the victim with packets holding spoofed IPs Slave (zombie) Slave (zombie) Slave (zombie) Page 10
11 Reflector DoS Attacks (stepping stone) Reflectors Reflectors send send their their replies replies to to the the victim victim Reflectors Attacker Attacker compromises compromises attack attack machine machine (the (the master) master) The The master master installs installs attack attack code code on on slave slave machines, machines, also also called called (zombies) (zombies) Attacker master Victim victim s address in the source address field of each Slave (zombie) request. Zombies Zombies are are instructed instructed to to continuously continuously send send spoofed spoofed requests requests to to large large set set of of Internet Internet reflectors reflectors Page 10
12 How an intrusion happens? 1. Try now 2. If it does not succeed, try again 3. And again Hacking is a trial and error process Page 12
13 The Intrusion Process Steps to penetrate into a network involve: Footprinting Identification of organization s security posture locations of the substations, control centers, or generating units IP addresses and address of the utility company Scanning Exhaustively identify the possibilities access points Access points: Wireless connection, LAN, VLAN, VPN, and Tools: War dialing or Traffic sniffer Enumerating Listing all active ports available on a target IP address Tools: Password guessing: Dictionary, brute-force, social engineering Exploit! This is where an attacker got lucky! But we do not want them to be lucky Page 13 Unfortunately, automated software tools are available online
14 /167 Information Security Vs. Infrastructure security Information Security Infrastructure Security Scope Information Protection Message Confidentiality Message Integrity Message Authenticity Infrastructure protection Routers Servers Links Protocols Service availability Approach Encryption/Decryption Digital signature Message Authentication Codes Public Key Infrastructure Traffic Monitoring Statistical analysis Authentication Protocols Secure Protocols Secure Servers Our very way of life depends on the secure and safe operations of critical systems that depend on the cyberspace [Richard Clarke, NSTAC 2002] Page 14
15 Presentation Outline Intro. to cyber systems and security Cyber-power systems & cyber attacks Risk assessment 4 Control systems security 5 6 SCADA Security Testbed Conclusions Page 15
16 Electric Power Grid: A Cyber-Physical System Source: Page 16
17 Security layers of power grid Internet security Intranet security Computer Dynamic Voltage Overload security security security security Power System Security Zone Cyber Security Zone Page 17
18 SCADA control network Page 18
19 Substation automation SCADA Modems Remote Users Substation Computer Back-up master N I M N I M N I M Data Collection LAN N I M N I M N I M N I M N I M Control LAN I/O Node I/O Node Digital Meter Protectiv e Relay PMUs IEDs SUBSTATION I/O SOURCES Circuit Breakers Switches Capacitors Batteries Electro-Mechanical Devices Transformers Page 19
20 Cyber Incidents on SCADA Systems : Salt River Project, an electricity and water provider in Phoenix, was hacked 1997: A teenager shuts down the air-traffic control room of a local MA airport 1997: The US DoD asks NSA to test safety of power supply going to US military bases 1999: Russian hackers took control of a pipeline for 24 hours 2000: Disgruntled Australian employee hacks wastewater SCADA system 45 times and dumps 264,000 gallons of sewage in the city s parks and rivers 2001: California ISO affected by a software exploit in Solaris, for 17 days 2002: Captured Al-Qaeda laptops reveal critical data to hack the US power grid 2003: Slammer worm crashes Davis-Besse nuclear power plant, OH, for 5 hours 2003: Slammer worm penetrates a major SCADA network through a VPN connection 2003: Major blackout in northeastern US (software bugs: a contributing factor) 2010: Stuxnet worm targeted nuclear power plant operation Iran, worldwide Page 20
21 Cyber threat to power grid are real CIP Report, General Accounting Office, March 2004 There has been a growing recognition that control systems are now vulnerable to cyber attacks from numerous sources, including hostile governments, terrorist groups, disgruntled employees, and other malicious intruders Repository for Industrial Control System (RISI) incident report, March # industrial cyber incidents has been stable, expected to rise - Power and utilities: 13 reported incidents in the last 5 years (30% increase from previous 5 years; Total: 28 incidents) McAfee report [2010] In the Crossfire: Critical Infrastructure in the Age of Cyber War - Shows similar data and increase in cyber incidents The problem is that IT people don t understand SCADA and SCADA people don t understand security [Gary Sevounts, Director, Symantec] Page 21
22 Cyber Threats to Critical Infrastructures Cyber-Based Attacks Protocol Attacks Routing Attacks Intrusions Worms / Spyware/ Malware Denial of Service (DoS) Insider Threats Page 22
23 Intrusion Scenarios The Processes of Hacking: Footprint, Scan, Enumerate, and Exploit Page 23 Step 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: Searching Once Sniff Another Using A Found Upon new NMap IP the successful VPN way network addresses, wireless Substation for to connections dial-up discover get upon logon access into found , SCADA or successful to the to wireless other point through control Scan intranet firewall system. intranet, is , the connections found, logon machines center is information; ports through Use to sniff try intranet, are , the password to ( , the dial-up of login alive intranet this utility local sniff and using reveals use network. guessing traffic through the found , scanning default network and configurations it For footprinting wireless program is determine password used instance, and programs and gather access for to ). logon of GPS footprinting. if war-dialing (e.g., the IP Attempt IP points. netcat) firewalls. techniques. programs communication. if addresses. connection to it logon is password Determine to using By check by is Determine doing knowing are secured password protected. for also the so, available number determined. a with the remote guessing prefix ports passphrase. ports of IP of are IP utility programs address These are alive alive. phone and IP is in addresses Use if found attempt these number. password intranet. to are to possibly are Password-guessing logon password scanned cracking using log on protected. password to program to determine other programs to intranet guessing the are ports hack using used program the if are windows the if system. alive these access / terminal listening. are point password user is password interface protected. protected.
24 Coordinated attacks - smart attacks Attack at these substations Page 24
25 Attack Classification Cyber Attacks on Critical Infrastructures Coordinated Attacks Isolated Attacks Intelligent Coordinated Attacks Brute-force Coordinated Attacks Brute-force Isolated Attacks Intelligent Isolated Attacks Page 25
26 Presentation Outline Intro. to cyber systems and security Cyber attacks on power grid Risk assessment 4 Control systems security 5 6 SCADA Security Testbed Conclusions Page 26
27 Electric Grid - Control Center Environment Power System Operations Control Center ISO Operating Center Generation Control Center (Generators) Office Intranet EMS DMZ F EMS System Primary Control Area F ISO DMZ F Transmission Substation Automation (Buses) Distribution Substation Control (Loads) WAN Office Intranet F EMS DMZ WAN EMS System F Backup Control Area WAN F ISO DMZ Page 27
28 Critical Cyber Asset Identification - Energy Management System (EMS) in Control Center - Distribution Management System (DMS) - Process Control System (Power Plants) - Substation Automation System (SAS) - SCADA Control network Page 28
29 Multilevel Security Enforce appropriate security properties - Confidentiality, Integrity, Availability, Authentication, Access control, and Non-repudiation. System level security User-level security - Password management, privilege levels, training, Operating System (OS) security - Access control, security policies, patch management, database security, system management Network level security - Firewall, intrusion detection, protocol security, session security Page 29
30 NERC CIP Standards Focuses on Accounting Polices and procedures Governance Critical Asset inventory Information Classification Change control Training & Personnel Risk management Focuses on Access control Network management Systems management Incident Response Recovery Vulnerability Assessment Physical Security What to do, but not how to do? NERC Cyber security standards generally take IT security concepts and apply them to control networks and systems BUT, the underlying physical system has real-time dynamics, which needs to be accounted Cyber-Physical Systems Security Page 30
31 Info. Vs. Infrastr. vs. Control system security /167 Information Security Infrastructure Security Control Systems Security N E E D S Information Protection Message Confidentiality Message Integrity Message Authenticity Infrastructure protection Routers DNS servers Links Internet protocols Service availability Generation control apps. Transmission control apps. Distribution control apps. Real-Time Energy Markets M E A N S Encryption/Decryption Digital signature Message Auth.Codes Public Key Infrastructure Traffic Monitoring Statistical analysis Authentication Protocols Secure Protocols Secure Servers Robust Control Algorithms Model-based Algorithms - Anomaly detection - Intrusion Tolerance - Bad data elimination Risk modeling and mitigation Cyber Attacks: Deter, Prevent, Detect, Mitigate, be Resilient, Attribution Page 31
32 Risk Modeling and Mitigation Framework Risk = Threat x Vulnerability x Impacts Risk Assessment & Risk Mitigation (GAO CIP Report, 2010) Security Investment Analysis System Vulnerability Scenario Vulnerability Access Point Vulnerability high risk low risk Page 32 Hierarchical modeling
33 Risk Modeling Framework Anomaly Detection Impact Analysis AB C D AECFAB A Real-Time Monitoring Responses Page 33
34 Risk Management Proactive (offline) Define system model Proactive/Reactive (online) Real-time monitoring Define attacker model Risk assessment Sensitivity analysis Security enhancements Cost-benefit analysis Anomaly detection Intrusions DoS attacks Timing attacks What if scenario analysis Impact analysis (risk modeling) Real-time mitigation Page 34
35 Presentation Outline Intro. to cyber systems and security Cyber attacks on power grid Risk assessment 4 Control systems security 5 6 SCADA Security Testbed Conclusions Page 35
36 The SCADA Network: Control system view Control Center Schematic Control System Schematic Page 36
37 Control System Attack Modeling Control Signal Cyber System Man-in-the-middle attacks Data integrity attacks Denial of service attacks Timing attacks min max [ t), ( t) ] z^ i ( z^ i Physical System min max yˆ ( t), yˆ ( t ) i i Sensing Signal Signal Integrity Attack DoS Attack Duration of the attack τ = A [ ] t, s t e Page 37 Y. Huang, A. A. Cardenas, S. Sastry, Understanding the Physical and Economic Consequences of Attacks on Control Systems, Elsevier, International Journal of Critical Infrastructure Protection 2009.
38 Cyber Attacks on Wide Area Monitoring and Control Man-in-the-middle attacks Data integrity attacks Denial of service attacks Timing attacks Frequency control Voltage control Stability control Page 38
39 Real-Time Control Loops in the Power Grid Page 39
40 Automatic Generation Control (AGC) Area 1 Control Center Frequency and Tie-Line Flow Measurements Control Action Area 1 Power System Tie-Line Flow Area 2 Control Center Control Action Frequency and Tie-Line Flow Measurements Area 2 Power System Page 40
41 Balancing Authorities in the U.S. Page 41 Source: NERC
42 The AGC Algorithm Page 42 Inputs to AGC algorithm: Frequency deviation Δf, Net tie-line flow ΔP i
43 Simulation - Results An intelligent attack involves manipulating tie-line flow and frequency Attack-impact Results (2 control area test system) Parameter Before Attack After Attack Frequency (Hz) Tie-Line Flow from Area 1 (pu) Unit 1 Generation change (pu) Generation- Demand Imbalance (pu) S. Siddharth and G. Manimaran, Data integrity attacks and their impacts on SCADA control system IEEE PES General Meeting, Page 43
44 Voltage Control Loop - FACTS 1. Connected to Transmission Network 2. Inject/Absorb Reactive Power 3. Remotely Controlled S. Siddharth and G. Manimaran, Data integrity attacks and their impacts on voltage control loops, IEEE PES General Meeting, 2011.
45 Voltage Control Loop - FACTS Attack Vectors (*) - Denial of Cooperative Operation among FACT devices - Desynchronization (timing-based attack) - Data injection (data corruption/duplicate) Sample Attack: Bad data injection Effect: Incorrect reactive power injection/absorption into the network Impact: Voltage criteria violation * Source Critical Infrastructure Protection, Eric Goetx and Sujeet Shenoi, Springer 2009
46 Presentation Outline Intro. to cyber systems and security Cyber attacks on power grid Risk assessment 4 Control systems security 5 6 SCADA Security Testbed Conclusions Page 46
47 SCADA Security Testbed C A C A F ABC D ABC D E ABC D E F F F Page 47 E F E E E F
48 Spectrum Power TG Control Center Managing databases Establishing communications Monitoring current or voltage levels, trip breakers. Analog telemetry from relays Binary statuses for breakers Page 48
49 Substation: RTU, Firewall, Relay, Load SICAM PAS RTU Scalance security device Siemens DIGSI 4 (over current relay) with Resistive load Page 49
50 Cyber-Physical Security Testbed: SCADA + ISEAGE + RTDS DTS Primary Control Intranet Backup Control Control Center SCADA Server WAN Remote Station RTU RTU IED IED RTDS (Real-Time Digital Simulator) Page 50
51 Testbed - Security Testing Nmap - Port scanning - Communication Port Wireshark - Packet capture - DNP 3.0 Protocol - Relay Open/Close request packet Attack-defense studies - Denial of Sensor measurement (Substation Control center) - Denial of Control (Control center Substation) - Cyber-Physical Impact Analysis & Countermeasure evaluation
52 Presentation Outline Intro. to cyber systems and security Cyber attacks on power grid Risk assessment 4 Control systems security 5 6 SCADA Security Testbed Conclusions Page 52
53 Conclusions (1) Cyber security threat to power grid is real! Increasingly important in the emerging smart grid Vulnerability exists in critical SCADA systems - SCDA, RTU, IED, EMS, etc. - ICCP, RTU-SCADA link, comm. Ports - Access control mechanisms, patch management, etc. Electronic security policy, Best practices - Electronic security perimeter - IDS/IPS, firewalls, anti-virus software - Incidence notification, response, and analysis - Recovery contingency plans - Security Systems Engineering Page 53
54 Conclusions (2) Cyber-Physical System Security = IT Security + Real-Time Control + System Dynamics (+ Safety issues) R&D Issues - Risk modeling and mitigation - Intrusion prevention, tolerance, mitigation - Denial of service/control prevention and mitigation - Secure protocols - Security Systems Engineering - Simulation tools, SCADA-Security Testbeds and Studies Interdisciplinary R&D: Power System + Cyber Security Collaborative R&D: Industry-University-Regulatory bodies Education: University education, short courses, continuing ed. Page 54
55 Conclusions (3) Sample R&D efforts - US National Laboratories - Idaho National Laboratory (National SCADA Testbed) - Sandia National Laboratory - Pacific Northwest National Laboratory - Oak Ridge National Laboratory - US Department of Homeland Security (Control Systems Security Program) - Covers critical infrastructures SCADA, PCS, DCS - NERC CIP Standards - DoE Cyber Security Roadmap - DoE NASPInet initative Page 55 - Industry R&D efforts and security products - University research efforts - University of Illinois, Iowa State,, European universities, etc.
56 Thank you!!! Acknowledgements: National Science Foundation Electric Power Research Center, ISU
Cyber Security of the Power Grid
Cyber Security of the Power Grid Chen-Ching Ching Liu Professor of Power Systems University College Dublin Research for Ireland s Future Ireland -Country of natural beauty -Quality of life ranked among
More informationOverview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
More informationSecuring Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
More information2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
More informationINDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
More informationa) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
More informationEEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
More informationSCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
More informationCS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
More informationICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
More informationCOSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
More informationInnovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: info@plantdata.com Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
More informationVerve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
More informationIntegrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi etieghi@visionautomation.
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems Enzo M. Tieghi etieghi@visionautomation.it Security IT & Control System Security: where are we?
More informationCyber Security for the Smart Grid: A R&D Perspective
NATO Advanced Institute on Energy Security Antalya, Turkey, October 4-11, 2015 Cyber Security for the Smart Grid: A R&D Perspective Manimaran Govindarasu Dept. of Electrical and Computer Engineering Iowa
More informationSCADA Security: Challenges and Solutions
SCADA Security: Challenges and Solutions June 2011 / White paper by Metin Ozturk, Philip Aubin Make the most of your energy Summary Executive Summary... p 2 Protecting Critical Infrastructure Includes
More informationCritical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
More informationHow To Secure A Wireless Utility Network
Utilities Facing Many Challenges Cyber Security Is One Area Where Help Is Available Executive Summary Utilities are in the crosshairs of many forces in the world today. Among these are environmental global
More informationNSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs
Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary
More informationDesign Document. Team Members: Tony Gedwillo James Parrott David Ryan. Faculty Advisor: Dr. Manimaran Govindarasu
12/6/2010 SDMAY11-11 CYBER SECURITY OF SCADA SYSTEMS TEST BED Design Document Team Members: Tony Gedwillo James Parrott David Ryan Faculty Advisor: Dr. Manimaran Govindarasu Design Document Tony Gedwillo
More information1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
More informationJohn M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com
NERC CIP Substation Cyber Security Update John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com It s February 19, 2009 132 project days left to compliance Do you know where (what)
More informationDeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
More informationIntrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis
Intrusion Detection Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationSecurity Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
More informationCYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
More informationDenial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
More informationCertified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationHACKING RELOADED. Hacken IS simple! Christian H. Gresser cgresser@nesec.de
HACKING RELOADED Hacken IS simple! Christian H. Gresser cgresser@nesec.de Agenda About NESEC IT-Security and control Systems Hacking is easy A short example where we currently are Possible solutions IT-security
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationBuilding Secure Networks for the Industrial World
Building Secure Networks for the Industrial World Anders Felling Vice President, International Sales Westermo Group Managing Director Westermo Data Communication AB 1 Westermo What do we do? Robust data
More informationDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
More informationNERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com
NERC CIP Substation Cyber Security Update John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com It s February 19, 2009 132 project days left to compliance Do you know where (what)
More informationCritical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn
Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Overview Assurance & Evaluation Security Testing Approaches
More informationHoneywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
More informationCyber-Physical Systems Security for Smart Grid
Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems Engineering Research Center Empowering Minds to Engineer the Future Electric Energy System Cyber-Physical
More informationCyber Security Initiatives and Issues
Cyber Security Initiatives and Issues NARUC Summer Committee Meetings Robert Schreiber, CISSP, CISA Director, Client Services and Security Operations ITS July 19, 2009 Water Utility History of SCADA Yesterday
More informationSEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
More informationCEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
More informationIf you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you
More informationLarry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
More informationDr. György Kálmán gyorgy@mnemonic.no
COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán gyorgy@mnemonic.no Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats
More informationDocument ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
More informationSecuring Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
More informationIT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
More informationNetwork Security: Introduction
Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has
More informationWhite Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
More informationProtecting Organizations from Cyber Attack
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 cliff.glantz@pnnl.gov guy.landine@pnnl.gov 1 Key Topics
More informationOvation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
More information13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
More informationSCADA System Overview
Introduction SCADA systems are critical to the control and monitoring of complex cyber-physical systems. Now with advanced computer and communications technologies, SCADA systems are connected to networks
More informationCS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
More informationCRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
More informationOvation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
More informationBy David G. Holmberg, Ph.D., Member ASHRAE
The following article was published in ASHRAE Journal, November 2003. Copyright 2003 American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. It is presented for educational purposes
More informationState of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
More informationDetailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
More information74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
More informationIntrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
More informationFundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
More informationFundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
More informationCompTIA Security+ (Exam SY0-410)
CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
More informationCourse Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
More informationIndustrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
More informationCyber Security of the Smart Grid
Cyber Security of the Smart Grid Design Document May 12-21 11/4/11 Group Members John Majzner Daniel Kosac Kyle Slinger Jeremy Deberg Team Advisor Manimaran Govindarasu Graduate Students Adam Hahnad Siddharth
More informationABB s approach concerning IS Security for Automation Systems
ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik stefan.kubik@de.abb.com The problem Most manufacturing facilities are more connected (and
More informationSANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
More informationWhat is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
More informationCOURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
More informationWhite Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks
White Paper April 2006 Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks According to a recent Harris Interactive survey, the country s leading business executives consider
More informationHE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK
HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK Prepared By: Raghda Zahran, Msc. NYIT-Jordan campus. Supervised By: Dr. Lo ai Tawalbeh. November 2006 Page 1 of 8 THE WAR AGAINST BEING AN INTERMEDIARY
More informationComputer System Security Updates
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
More informationSecurity Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
More informationINTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
More informationSecurity Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
More informationMitigations for Security Vulnerabilities Found in Control System Networks
Mitigations for Security Vulnerabilities Found in Control System Networks KEYWORDS Control system, SCADA, cyber security, mitigation, firewall, IDS, encryption, DMZ ABSTRACT Industry is aware of the need
More informationCconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
More informationAn Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
More informationHow To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System
Network Security in Power Systems Maja Knezev and Zarko Djekic Introduction Protection control Outline EMS, SCADA, RTU, PLC Attacks using power system Vulnerabilities Solution Conclusion Introduction Generator
More informationSCOPE. September 25, 2014, 0930 EDT
National Protection and Programs Directorate Office of Cyber and Infrastructure Analysis (OCIA) Critical Infrastructure Security and Resilience Note Critical Infrastructure Security and Resilience Note:
More informationBest Practices for DeltaV Cyber- Security
January 2013 Page 1 Best Practices for DeltaV Cyber- Security This document describes best practices will help you maintain a cyber-secure DeltaV digital automation system. www.deltav.com January 2013
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationChapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
More informationPenetration Testing. Presented by
Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing
More informationFIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
More informationCMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
More informationDefense in Cyber Space Beating Cyber Threats that Target Mesh Networks
Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table
More informationCyber Security Seminar KTH 2011-04-14
Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid erik.z.johansson@se.abb.com Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon
More informationSECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
More information7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
More informationSecurity Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
More informationHost Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
More information10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
More informationPractical Considerations for Security
Practical Considerations for Security Steven Hodder GE Digital Energy, Multilin 1. Introduction This paper has been prepared to outline some practical security strategies for protection & control engineers
More informationCyber Security. Smart Grid
Cyber Security for the Smart Grid Peter David Vickery Executive Vice President N-Dimension Solutions Inc. APPA National Conference June 21, 2010 Cyber Security Solutions For Cyber Security
More informationCyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
More informationUtility Modernization Cyber Security City of Glendale, California
Utility Modernization Cyber Security City of Glendale, California Cyber Security Achievements Cyber Security Achievements (cont) 1. Deploying IT Security Awareness training program Q4 2012 2. Purchased
More informationProtecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
More informationNorth American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
More information