System Aware Cyber Security
|
|
|
- Beatrice McGee
- 10 years ago
- Views:
Transcription
1 System Aware Cyber Security Application of Dynamic System Models and State Estimation Technology to the Cyber Security of Physical Systems Barry M. Horowitz, Kate Pierce University of Virginia April, 2012 This material is based upon work supported, in whole or in part, by the U.S. Department of Defense through the Systems Engineering Research Center (SERC) under Contract H D SERC is a federally funded University Affiliated Research Center managed by Stevens Institute of Technology
2 Objectives for System Aware Cyber Security Research Increase cyber security by developing new system engineering-based technology that provides a Point Defense option for cyber security Inside the system being protected, for the most critical functions Complements current defense approaches of network and perimeter cyber security Directly address supply chain and insider threats that perimeter security does not protect against Including physical systems as well as information systems Provide technology design patterns that are reusable and address the assurance of data integrity and rapid forensics, as well as denial of service Develop a systems engineering scoring framework for evaluating cyber security architectures and what they protect, to arrive at the most cost-effective integrated solution
3 Publications Jennifer L. Bayuk and Barry M. Horowitz, An Architectural Systems Engineering Methodology for Addressing Cyber Security, Systems Engineering 14 (2011), Rick A. Jones and Barry M. Horowitz, System-Aware Cyber Security, ITNG, 2011 Eighth IEEE International Conference on Information Technology: New Generations, April, 2011, pp (Best Student Paper Award) Rick A. Jones and Barry M. Horowitz, System-Aware Security for Nuclear Power Systems, 2011 IEEE International Conference on Technologies for Homeland Security, November, (Featured Conference Paper) Rick A. Jones and Barry M. Horowitz, A System-Aware Cyber Security Architecture, Systems Engineering, Volume 15, No. 2, February, 2012
4 System-Aware Cyber Security Architecture System-Aware Cyber Security Architectures combine design techniques from 3 communities Cyber Security Fault-Tolerant Systems Automatic Control Systems The point defense solution designers need to come from the communities related to system design, providing a new orientation to complement the established approaches of the information assurance community New point defense solutions will have independent failure modes from traditional solutions, thereby minimizing probabilities of successful attack via greater defense in depth
5 A Set of Techniques Utilized in System-Aware Security Cyber Security *Data Provenance *Moving Target (Virtual Control for Hopping) *Forensics Fault-Tolerance *Diverse Redundancy (DoS, Automated Restoral) *Redundant Component Voting (Data Integrity, Restoral) Automatic Control *Physical Control for Configuration Hopping (Moving Target, Restoral) *State Estimation (Data Integrity) *System Identification (Tactical Forensics, Restoral)
6 A Set of Techniques Utilized in System-Aware Security Cyber Security *Data Provenance *Moving Target (Virtual Control for Hopping) *Forensics Fault-Tolerance *Diverse Redundancy (DoS, Automated Restoral) *Redundant Component Voting (Data Integrity, Restoral) Automatic Control *Physical Control for Configuration Hopping (Moving Target, Restoral) *State Estimation (Data Integrity) *System Identification (Tactical Forensics, Restoral) This combination of solutions requires adversaries to: Understand the details of how the targeted systems actually work
7 A Set of Techniques Utilized in System-Aware Security Cyber Security *Data Provenance *Moving Target (Virtual Control for Hopping) *Forensics Fault-Tolerance *Diverse Redundancy (DoS, Automated Restoral) *Redundant Component Voting (Data Integrity, Restoral) Automatic Control *Physical Control for Configuration Hopping (Moving Target, Restoral) *State Estimation (Data Integrity) *System Identification (Tactical Forensics, Restoral) This combination of solutions requires adversaries to: Understand the details of how the targeted systems actually work Develop synchronized, distributed exploits consistent with how the attacked system actually works
8 A Set of Techniques Utilized in System-Aware Security Cyber Security Fault-Tolerance *Data Provenance *Diverse Redundancy *Moving Target (DoS, Automated Restoral) (Virtual Control for Hopping) *Redundant Component Voting *Forensics (Data Integrity, Restoral) Automatic Control *Physical Control for Configuration Hopping (Moving Target, Restoral) *State Estimation (Data Integrity) *System Identification (Tactical Forensics, Restoral) If implemented properly, this combination of solutions requires adversaries to: Understand the details of how the targeted systems actually work Develop synchronized, distributed exploits consistent with how the attacked system actually works Corrupt multiple supply chains
9 Example Design Patterns Under Development Diverse Redundancy for post-attack restoration Diverse Redundancy + Verifiable Voting for trans-attack defense Physical Configuration Hopping for moving target defense Virtual Configuration Hopping for moving target defense Physical Confirmations of Digital Data Data Consistency Checking
10 ATTACK 1: OPERATOR DISPLAY ATTACK ATTACK 2: CONTROL SYSTEM & OPERATOR DISPLAY ATTACK ATTACK 3: SENSOR SYSTEM ATTACK
11 ATTACKS 1 & 2 OPERATOR DISPLAY ATTACK/ COORDINATED CONTROL SYSTEM & OPERATOR DISPLAY ATTACK
12 The Problem Being Addressed Highly automated physical system Operator monitoring function, including criteria for human over-ride of the automation Critical system states for both operator observation and feedback control consider as least trusted from cyber security viewpoint Other measured system states consider as more trusted from cyber security viewpoint CYBER ATTACK: Create a problematic outcome by disrupting human display data and/or critical feedback control data.
13 Cyber Attack: Damaging Turbine and Hiding its Effects Main Control Room No Operator Control Corrective Action Vendor 1 Controller Sensor Inputs Incorrect Real Time Controller Status Health Status Station Turbine I&C Damaging Actuation Sensors* Turbine Reactor Trip Control *Turbine Safety Measurements Speed, Load, and Pressure Incorrect Real Time Turbine Status **Controller Status Measurements Hardware and System Health Status Software Execution Features I/O Status
14 Simplified Block Diagram for Inference-Based Data Integrity Detection System Protected System Sensors Less Critical/ More Trusted Measured States (Other Than Operator & Feedback Control States Feedback Control States System Operator Observed States System Controller Data Integrity Alerts Data Integrity Checker Estimates of Operator Observed States Critical State Estimator
15 EXAMPLE
16 Regulating a Linear Physical System (1)
17 Regulating a Linear Physical System (2) System measurements are represented by: y (k) = C x (k) + v (k) Where y(k) is a m vector of measurements at time interval k C is a mxn measurement matrix v (k) is an m vector representing measurement noise
18 A Simulation Model for Regulating the States of the System To facilitate evaluating the data consistency cyber security design pattern: Simulate a linear system controller to sustain the states of a system at designated levels Optimal Regulator Solution (LQG) utilized for simulation White Gaussian noise Separation Theorem Kalman Filter for state estimation Ricatti Equation-based controller for feedback control Controller feed back law based upon variances of input noise, measurement noise and the A,B and C matrices of the system dynamics model
19 Example State Equations and Noise Assumptions A = [ 1, , , 1, -.01, 0.2,.01, 1, ,.02, -.01, 1 ]; B = [ 0, 1, 0, 0 ]; Operator Observed (less trusted): C = [ 1, 0, 0, 0 ]; Related States (unobserved by operator, more trusted): C2 = [ ; ; ] K1 = 0.25; process noise variances for each of the states K2 = 0.25; sensor noise variances for each of the measurements
20 Simulated System Operation for Regulation of a State Component at 500
21 True Monitored State Simulated Normal Operation Operator Observed State Inferred Monitored State Δ in Operator and Inferred States
22 True Monitored State Simulated Normal Operation Operator Observed State Inferred Monitored State Δ in Operator and Inferred States
23 REPLAY ATTACK TO CAUSE ERRONEOUS OPERATOR ACTION
24 Simulated Replay Attack True Monitored State Operator Observed State Trusted Observed System Inferred Monitored State Δ in Operator and Inferred States
25 Simulated Replay Attack True Monitored State Operator Observed State Trusted Observed System Inferred Monitored State Δ in Operator and Inferred States
26 ATTACK TO ADJUST REGULATOR OBJECTIVES AND MASK THE PHYSICAL CHANGE THROUGH REPLAY ATTACK ON OPERATOR DISPLAYS
27 Simulated System Output Based Upon Controller Attack
28 True Monitored State Simulated Regulator Attack Operator Observed State Inferred Monitored State Δ in Operator and Inferred States
29 True Monitored State Simulated Regulator Attack Operator Observed State Inferred Monitored State Δ in Operator and Inferred States
30 Metrics As a practical matter, cyber attack detection/response for mission critical physical systems will need to be tuned to have virtually no modelpredicable false alarms for initiating significant responses, such as shut down (for emphasis referred to as zero model-based false alarms), while also promising zero missed detections. Equivalently, sensor accuracy and corresponding detection algorithms must permit use of attack detection thresholds that are greatly distanced from both normal system operation and system operation regions that result in unacceptable consequences In order to determine detection thresholds and the corresponding false alarm and missed detection rates, operational data collections would need to be used to build upon model-based analysis, serving to account for shortfalls in system models. Detection algorithms and criteria that cause delays in initiating responses must account for how long a system can operate in a region of the state space before an important response is too late
31 Sliding Window Detection For our example, a sliding window detection algorithm is used for integrating over the time series of the N most recent individual point detections, each based on a threshold test A cyber attack is declared upon detecting m threshold violations over N detection opportunities Increasing m and N serve to reduce over-reaction to individual estimates resulting in threshold violations, thereby reducing false alarm rate at the expense of potentially increasing the missed detection rate and delaying detections More specifically, given a time series of individual point detections, determined by comparing a time series of the most recent state estimates, x 1, x 2, x 3.x N to an alarm threshold, th If x i > th, increment g by 1, where: g = (x i > th) For the example, within a time series consisting of N state estimates each compared to threshold criterion th, if g > N/2 a cyber attack is declared.
32 Zero False Alarm Thresholds 150,000 point simulation Zero False Alarm Decision Threshold; Measured States=[0,1,1,1] Zero False Alarm Decision Threshold; Measured States = [0,1,0,0] Threshold of Alarm Point Window 20 Point Window 30 Point Window Threshold of Alarm Point Window 20 Point Window 30 Point Window Variance of Input and Measurement Noise Variance of input and Measurement Noise
33 Zero False Alarm Thresholds 150,000 point simulation Zero False Alarm Threshold; 10 Point Window / Minimum 10 Second Delay Zero False Alarm Threshold; 30 Point Window/Minimum 30 Second Delay Treshold of Alarm [0,1,1,1] [0,1,0,0] [0,1,1,0] Threshold of Alarm [0,1,1,1] [0,1,0,0] [0,1,1,0] Variance of Input and Measurement Noise Variance of Input and Measurement Noise
34 Design Sensitivity Analysis Decision Thresholds vs sensor accuracy ~20-30% change in threshold value over sensor accuracies (variances) ranging from Decision Thresholds vs selection of states used for inferring critical state(s) values ~ % change in threshold value over state measurement range of [0,1,1,1] to [0,1,0,0] Decision Thresholds vs delays in detection (length of sliding window)-10-20% change in threshold value over a second sliding window detector Design range of threshold values comparing the worst case (lowest thresholds) and best case designs (highest thresholds) for achieving zero model-based false alarm/missed detection rates ~400% change from worst accuracy, least states measured, longest sliding window detector to best accuracy, most states measured, shortest sliding window detector
35 Real World Example: Gas Turbine RPM 3600 Measurement Error 1-2 rpm Data Interval - 40msec Trip Threshold ~10% rpm deviation First estimate of augmenting sensor-based Trip Threshold - ~1% rpm deviation Suitable spacing between attack detection thresholds and operating in regions with significant adverse consequences, permitting zero model-based false alarms/missed detections Multiple triplex sensors A/D converters and processor interfaces on a single board
36 Δ Relating Detection Thresholds, System Responses, and Acceptable False Alarm Rates T(i) Detection Threshold Values FA(i) Acceptable False Alarm Rates T(3) T(2) T(1) REGION 4 - System Shut Down REGION 3 Automatic Restorals REGION 2 Operator Engaged for Conducting Manual Checks REGION 1 System Normal FA(4) FA(3) FA(2)
37 ATTACK ON CRITICAL SENSORS OUTPUTS Design Pattern Based Upon Cyber Security Extension of: T. Kobayashi, D. L. Simon, Application of a Bank of Kalman Filters for Aircraft Engine Fault Diagnostics, Turbo Expo 2003, American Society of Mechanical Engineers and the International Gas Turbine Institute, June, 2003
38 Simplified Block Diagram for Sensor Attack Detection System Protected System System Controller Sensors All Measured System States Data Integrity Alerts Protected State Measurements ( Other Than Feedback Control Measurement States Distribution Feedback Control States Data Integrity Checker F1 F2 F3 F4 Fn n Estimates of Selected Feedback Control State Estimate of Selected State Verifiable Voter Sensor Failure Detection Filter Bank
39 Simplified Block Diagram for Sensor Attack Detection System Protected System System Controller Sensors All Measured System States Data Integrity Alerts Protected State Measurements ( Other Than Feedback Control Measurement States Distribution Feedback Control States Data Integrity Checker Estimate of Selected State F1 F2 F3 F4 Fn n Estimates of Selected Feedback Control State Verifiable Voter Sensor Failure Detection Filter Bank
40 Rapid Post-Attack Sensor Noise Analysis to Confirm Faulty Sensor Assessment Measurement Noise n Faulty Sensor Filter Bank Isolated Sensor s ƒ (s,n) Signal Analysis Forensics Analysis Likely Cyber Attack Filter Bank Isolated Sensor Data
41 Conclusions Data consistency checking design patterns can potentially make an important contribution to cyber security of physical systems Past work in fault-tolerant and automatic control systems provides a starting point regarding solutions and knowledge to draw upon, although specific solution designs will need to be implemented in a manner that is sensitive to the issues surrounding cyber attacks Development of actual solutions will require system activities in: System dynamics modeling State estimation Security-focused analysis regarding attack scenarios, protection needs, more trusted and less trusted components, and sensors and measurement characterization Distributed security solution designs that serve to complicate, and hopefully deter, attacks In-field data collections regarding selection of detection thresholds and responses to achieve acceptably low false alarm/missed detection rates
How To Design A Cyber Security Architecture
A System-Aware Cyber Security Architecture Rick A. Jones and Barry Horowitz* Regular Paper Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904 A SYSTEM-AWARE CYBER SECURITY
System Aware Cyber Security Architecture
System Aware Cyber Security Architecture Rick A. Jones October, 2011 Research Topic DescripAon System Aware Cyber Security Architecture Addresses supply chain and insider threats Embedded into the system
SERC Security. By Jennifer Bayuk
SERC Security By Jennifer Bayuk Annual SERC Research Review October 5 6, 2011 University of Maryland MarrioF Inn and ConvenHon Center HyaFsville, MD www.sercuarc.org Annual SERC Research Review, October
Background: State Estimation
State Estimation Cyber Security of the Smart Grid Dr. Deepa Kundur Background: State Estimation University of Toronto Dr. Deepa Kundur (University of Toronto) Cyber Security of the Smart Grid 1 / 81 Dr.
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
SureSense Software Suite Overview
SureSense Software Overview Eliminate Failures, Increase Reliability and Safety, Reduce Costs and Predict Remaining Useful Life for Critical Assets Using SureSense and Health Monitoring Software What SureSense
Announcement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
System Aware Cyber Security. Barry Horowitz University of Virginia March 2014
System Aware Cyber Security Barry Horowitz University of Virginia March 2014 Our Team SIE Faculty: Horowitz, Beling Research Scientists: Jones, Suhler, Lau CS Faculty: Skadron, Humphrey Post Doc: Li ECE
Propulsion Gas Path Health Management Task Overview. Donald L. Simon NASA Glenn Research Center
Propulsion Gas Path Health Management Task Overview Donald L. Simon NASA Glenn Research Center Propulsion Controls and s Research Workshop December 8-10, 2009 Cleveland, OH www.nasa.gov 1 National Aeronautics
Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004)
Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004) Dale Perry Worldwide Pressure Marketing Manager Emerson Process Management Rosemount Division Chanhassen, MN 55317 USA
Emulated Digital Control System Validation in Nuclear Power Plant Training Simulators
Digital Control System Validation in Nuclear Power Training s Gregory W. Silvaggio Westinghouse Electric Company LLC [email protected] Keywords: Validation, nuclear, digital control systems Abstract
Health Management for In-Service Gas Turbine Engines
Health Management for In-Service Gas Turbine Engines PHM Society Meeting San Diego, CA October 1, 2009 Thomas Mooney GE-Aviation DES-1474-1 Agenda Legacy Maintenance Implementing Health Management Choosing
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
Diagnosis and Fault-Tolerant Control
Mogens Blanke Michel Kinnaert Jan Lunze Marcel Staroswiecki Diagnosis and Fault-Tolerant Control With contributions by Jochen Schroder With 228 Figures Springer 1. Introduction to diagnosis and fault-tolerant
GNSS integrity monitoring for the detection and mitigation of interference
GNSS integrity monitoring for the detection and mitigation of interference Dr. Shaojun Feng Centre for Transport Studies Outline GNSS vulnerability GNSS integrity monitoring Cases study GAARDIAN ERAIM
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants
Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants Jung-Woon Lee, Cheol-Kwon Lee, Jae-Gu Song, and Dong-Young Lee I&C and HF Research Division, Korea Atomic Energy
FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING
FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING Hussain Al-Asaad and Alireza Sarvi Department of Electrical & Computer Engineering University of California Davis, CA, U.S.A.
INTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla [email protected] Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
Signal Detection. Outline. Detection Theory. Example Applications of Detection Theory
Outline Signal Detection M. Sami Fadali Professor of lectrical ngineering University of Nevada, Reno Hypothesis testing. Neyman-Pearson (NP) detector for a known signal in white Gaussian noise (WGN). Matched
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
Hybrid processing of SCADA and synchronized phasor measurements for tracking network state
IEEE PES General Meeting, Denver, USA, July 2015 1 Hybrid processing of SCADA and synchronized phasor measurements for tracking network state Boris Alcaide-Moreno Claudio Fuerte-Esquivel Universidad Michoacana
Safety Integrated. SIMATIC Safety Matrix. The Management Tool for all Phases of the Safety Lifecycle. Brochure September 2010. Answers for industry.
SIMATIC Safety Matrix The Management Tool for all Phases of the Safety Lifecycle Brochure September 2010 Safety Integrated Answers for industry. Functional safety and Safety Lifecycle Management Hazard
The Role of Automation Systems in Management of Change
The Role of Automation Systems in Management of Change Similar to changing lanes in an automobile in a winter storm, with change enters risk. Everyone has most likely experienced that feeling of changing
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Safety Requirements Specification Guideline
Safety Requirements Specification Comments on this report are gratefully received by Johan Hedberg at SP Swedish National Testing and Research Institute mailto:[email protected] -1- Summary Safety Requirement
Cyber Security Implications of SIS Integration with Control Networks
Cyber Security Implications of SIS Integration with Control Networks The LOGIIC SIS Project Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Zach Tudor is a Program
SPPA-D3000 Plant Monitor Technical Description
SPPA-D3000 Plant Monitor Technical Description Model-based monitoring and early fault detection for components and processes May 2008 Answers for energy. 1 Siemens AG 2008. All Rights Reserved Contents
Introduction to Security
2 Introduction to Security : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l01, Steve/Courses/2013/s2/its335/lectures/intro.tex,
Mapping an Application to a Control Architecture: Specification of the Problem
Mapping an Application to a Control Architecture: Specification of the Problem Mieczyslaw M. Kokar 1, Kevin M. Passino 2, Kenneth Baclawski 1, and Jeffrey E. Smith 3 1 Northeastern University, Boston,
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Cyber Security Assessments of Industrial Control Systems Good Practice
Integrating Cyber Security into Nuclear Power Plant Safety Systems Design
Integrating Cyber Security into Nuclear Power Plant Safety Systems Design Deanna Zhang U.S. Nuclear Regulatory Commission Document Date: 05/21/2010 Objectives To provide methods for utilizing safety features,
Value Paper Author: Edgar C. Ramirez. Diverse redundancy used in SIS technology to achieve higher safety integrity
Value Paper Author: Edgar C. Ramirez Diverse redundancy used in SIS technology to achieve higher safety integrity Diverse redundancy used in SIS technology to achieve higher safety integrity Abstract SIS
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Frontiers in Cyber Security: Beyond the OS
2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks
Systems Engineering. Designing, implementing, deploying and operating systems which include hardware, software and people
Systems Engineering Designing, implementing, deploying and operating systems which include hardware, software and people Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 2 Slide 1 Objectives
Evaluation of Processor Health within Hierarchical Condition Monitoring System
Evaluation of Processor Health within Hierarchical Condition Monitoring System Lenka Pavelková and Ladislav Jirsa Department of Adaptive Systems, Institute of Information Theory and Automation, Czech Academy
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Optimization Problems in Infrastructure Security
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Optimization Problems in Infrastructure Security Evangelos Kranakis Carleton University School of Computer Science Ottawa,
Nuclear Power Plant Electrical Power Supply System Requirements
1 Nuclear Power Plant Electrical Power Supply System Requirements Željko Jurković, Krško NPP, [email protected] Abstract Various regulations and standards require from electrical power system of the
EHOOKS Prototyping is Rapid Again
09CV-0113 EHOOKS Prototyping is Rapid Again Vivek Jaikamal ETAS Inc. Nigel Tracey ETAS Ltd. Copyright 2009 SAE International ABSTRACT Automotive controls engineers have traditionally used bypass rapid
AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS
http://dx.doi.org/10.5516/net.04.2012.091 AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG *, JUNG-WOON LEE, GEE-YONG PARK, KEE-CHOON KWON,
Viewpoint on ISA TR84.0.02 Simplified Methods and Fault Tree Analysis Angela E. Summers, Ph.D., P.E., President
Viewpoint on ISA TR84.0.0 Simplified Methods and Fault Tree Analysis Angela E. Summers, Ph.D., P.E., President Presented at Interkama, Dusseldorf, Germany, October 1999, Published in ISA Transactions,
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
AP1000 European 18. Human Factors Engineering Design Control Document
18.2 Human Factors Engineering Program Management The purpose of this section is to describe the goals of the AP1000 human factors engineering program, the technical program to accomplish these goals,
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Operational Continuity
Solution Brief Operational Continuity Achieve Maximum Uptime In a recent speech, Omar Sherin of the Qatar CERT, shared how they shifted their focus from protection and detection to response in the wake
Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication
Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication Thomas Reilly Data Physics Corporation 1741 Technology Drive, Suite 260 San Jose, CA 95110 (408) 216-8440 This paper
Fault Monitoring of the Electric Machine in a Hybrid Vehicle
Fault Monitoring of the Electric Machine in a Hybrid Vehicle Christofer Sundström, Erik Frisk, and Lars Nielsen Vehicular Systems, Dept. of Electrical Engineering, Linköping University, SE-581 83 Linköping,
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Embedded Systems Lecture 9: Reliability & Fault Tolerance. Björn Franke University of Edinburgh
Embedded Systems Lecture 9: Reliability & Fault Tolerance Björn Franke University of Edinburgh Overview Definitions System Reliability Fault Tolerance Sources and Detection of Errors Stage Error Sources
Performance Study based on Matlab Modeling for Hybrid Electric Vehicles
International Journal of Computer Applications (975 8887) Volume 99 No.12, August 214 Performance Study based on Matlab Modeling for Hybrid Electric Vehicles Mihai-Ovidiu Nicolaica PhD Student, Faculty
OPERATIONS CAPITAL. The Operations Capital program for the test years is divided into two categories:
Filed: September 0, 00 EB-00-0 Tab Schedule Page of OPERATIONS CAPITAL.0 INTRODUCTION Operations Capital funds enhancements and replacements to the facilities required to operate the Hydro One Transmission
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Designing a Control System for High Availability
Designing a Control System for High Availability Art Pietrzyk, TUV FSExp, Rockwell Automation Brian Root, Redundancy Marketing Manager, Process Initiative, Rockwell Automation Paul Gruhn, P.E., CFSE, Training
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
IT Services Management Service Brief
IT Services Management Service Brief Service Continuity (Disaster Recovery Planning) Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Demo: Real-time Tracking of Round Object
Page 1 of 1 Demo: Real-time Tracking of Round Object by: Brianna Bikker and David Price, TAMU Course Instructor: Professor Deepa Kundur Introduction Our project is intended to track the motion of a round
AN AUTOMATIC MAINTENANCE SYSTEM FOR NUCLEAR POWER PLANTS INSTRUMENTATION
AN AUTOMATIC MAINTENANCE SYSTEM FOR NUCLEAR POWER PLANTS INSTRUMENTATION Bárbara Álvarez, Andrés Iborra, *Carlos Fernández Universidad Politécnica de Cartagena, Dpto. Tecnología Electrónica Campus Muralla
8/27/2015. Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354. Don t Wait Another Day
Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354 2015 FRWA Annual Conference Don t Wait Another Day 1 SCADA Subsystems Management Physical Connectivity Configuration Mgmt.
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices
DNP SCADA to SCADA Over : Standards, Regulations Security and Best Practices Earl Emerson, Director Systems Engineering RAD Data Communications 2014 Utilities Telecom Council of Canada Motivations for
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Multisensor Data Fusion and Applications
Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: [email protected]
A Robust Dynamic Load-balancing Scheme for Data Parallel Application on Message Passing Architecture
A Robust Dynamic Load-balancing Scheme for Data Parallel Application on Message Passing Architecture Yangsuk Kee Department of Computer Engineering Seoul National University Seoul, 151-742, Korea Soonhoi
Introduction to Network Management
Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function
Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology
MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Paralleling Switchgear
Paralleling Switchgear By Maurice D Mello, P.Eng. Systems Engineer, GE Consumer & Industrial, Canada What is Paralleling? Paralleling is the operation in which multiple power sources, usually two or more
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Management (CSM) Capability
CDM Configuration Settings Management (CSM) Capability Department of Homeland Security National Cyber Security Division Federal Network Security Network & Infrastructure Security Table of Contents 1 PURPOSE
Syslog Analyzer ABOUT US. Member of the TeleManagement Forum. [email protected] +1-916-290-9300 http://www.ossera.com
Syslog Analyzer ABOUT US OSSera, Inc. is a global provider of Operational Support System (OSS) solutions for IT organizations, service planning, service operations, and network operations. OSSera's multithreaded
Security Engineering Project
Security Engineering Project Part 1a System Aware Cyber Security for an Autonomous Surveillance System On Board an Unmanned Arial Vehicle Part 1b System Aware Cyber-Security Application to Unmanned Aircraft
Software testing. Objectives
Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating
Kevin Kochirka, ABB Turbine Automation, June 29, 2016. Flexible turbine control retrofits Webinar
Kevin Kochirka, ABB Turbine Automation, June 29, 2016 Flexible turbine control retrofits Webinar Welcome Speaker introduction Kevin Kochirka Sr. Applications Engineer with ABB Inc. [email protected]
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
