Securing Distribution Automation
|
|
|
- Noreen Powers
- 10 years ago
- Views:
Transcription
1 Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
2 Agenda > Hydro-Québec Distribution Automation project overview > Cyber security requirements > Security requirements and applicable standards > Securing the communications link > Securing control operations > Authenticating users and systems > Conclusion 2
3 Hydro-Québec Distribution Automation Project > Project started in 2001 with the following goals Improve reliability and reduce outage duration Move towards a modern interactive network > Deployment started in 2006 > Project scope 3750 switches 1100 feeders 3
4 Key Components > Pole-top cabinets that contain: Motorized switch RTU Communications gateway / Data concentrator Protective relay (in some cabinets) > The communications gateway Concentrates data from multiple devices Provides local processing capability Implements electronic perimeter Helps protect against obsolescence 4
5 Distributed Architecture > Very high volume of data Large number of data points per cabinet > 100 binaries > 20 analogs Large number of cabinets > Load distributed through Regional Control Centers Front End Processor (FEP) Distribution Management System (DMS) 5
6 Front End Processors > Manage all communications > Feed data to DMS > Support various communication links Direct TCP/IP Dialup Other > Perform scheduled data poll of cabinets > Cabinets can call in to report events and changes of status > On-demand communication to retrieve data, control switches, and perform remote maintenance 6
7 High Level Cyber Security Requirements > To protect from unintended or malicious operations, the system must ensure that: Only authorized devices can connect to the communications network Control operations originate from an authorized control center Remote maintenance access is only granted to authorized users Local maintenance access is only granted to authorized users 7
8 Security requirements and applicable standards > Until very recently, security was not a regulatory requirement > NERC CIP introduced a security framework that mostly applies to generation and transmission > NERC CIP definition of critical asset is evolving towards a risk and impact-based assessment > Projects funded under the Recovery Act require cyber security > NIST Framework and Roadmap for Smart Grid Interoperability Standards has identified 75 existing standards, including security, that are applicable to Smart Grid projects 8
9 Electronic Perimeter IEEE > IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities Unique user ID and password combinations. Ability to assign IED functions and features according to the individual user accounts. Ability to record an audit trail listing events in the order in which they occur. Ability to monitor security-related activity and make the information available to a supervisory system through a real-time communications protocol. Ability for SCADA to grant permission prior to performing actions, locally or remotely. Ability to authenticate that the configuration software is a copy that has been authorized by the user. 9
10 Communications Security IEC > Standard developed for handling the security of TC- 57 protocols including IEC 61850, IEC and it derivatives, such as DNP3 IEC specifies how to secure TCP/IPbased protocols through the use of Transport Layer Security (TLS). IEC specifies how to add user and device authentication, and data integrity. 10
11 Firmware Updates IEEE C37.231, NEMA SG-AMI 1 > IEEE specifies that firmware should be managed according to C IEEE Recommended Practice for Microprocessor-Based Protection Equipment Firmware Control. > NEMA SG-AMI 1 developed as Priority Action Plan, part of the NIST Framework and Roadmap for Smart Grid Interoperability Standards, adresses firmware updates for smart meters. > Many of these requirements apply to any type of device: Recover to previous version if unable to complete upgrade. Have no impact on device operational settings. Validate that a firmware image passes integrity check. Validate that the firmware image comes from a trusted source. 11
12 Securing the Communications Link 12
13 Dial-Up Security > Access can be protected by Caller ID, callback, and shared passwords. > Caller ID spoofing is much easier with IP telephony. > Enterprise password management solutions are available, but not designed to handle unreliable communications with field devices. > NIST CyberSecurity Coordination Task Group has identified device password management as one of the issues that needs to be addressed for Smart Grid security. 13
14 Network-to-Network Security > Typically implemented through a VPN Authenticates both network endpoints. Encrypts traffic exchanged between endpoints. Acts as a tunnel to carry information between two networks > Does not address: Authenticity of party issuing control requests. Rogue application or malware at master station. Rogue application or malware at outstation. 14
15 Securing TCP/IP-Based Protocols IEC Securing TCP/IP-based protocols through the use of Transport Layer Security (TLS), was previously known as SSL: > Shall support at least AES-128 encryption. > Shall support multiple Certificate Authorities (CA). > Shall renegotiate symmetric keys based upon a time period and a maximum allowed number of packets/bytes sent. > Shall use bidirectional certificate exchange and validation. 15
16 User Authentication and Data Integrity IEC Securing IEC and derivatives, such as DNP3: > Defines a challenge-response mechanism that addresses the following threats: Spoofing, Modification, Replay. Eavesdropping - on exchanges of cryptographic keys only, not on other data. Non-repudiation to the extent of identifying individual users of the system. > Application layer only Supports bridging across data concentrators and networks with different media types. Protects against rogue applications. Provides the capability of authenticating individual users. > Bidirectional 16
17 Securing Control Operations Through DNP3 Secure Authentication 17
18 DNP3 Secure Authentication Agressive Mode 18
19 Authentication Challenge > Authentication challenge message (g120v1) Sequence number User number identifies session keys to use HMAC algorithm SHA-1 (4 or 10 octets), SHA- 256 (8 or 16 octets) Reason for challenge CRITICAL function. Previous ASDU must be included in calculation of HMAC. Pseudo-random challenge data 19
20 Authentication Reply > Authentication reply message (g120v2) Sequence number User number HMAC value 20
21 DNP3 Secure Authentication Key Benefits and Issues > Relatively lightweight, uses cryptography but does not encrypt data. > Can be combined with TLS if confidentiality required. > Independent of transport, can be used with serial or network communications. > Added as new messages to protocol. Can interoperate with legacy devices. > Standard supports the use of data concentrators. > Management of encryption keys is not defined and remains to be addressed. > Now supported by IEEE as IEEE P
22 Authenticating Users and Systems > Requirements Only authorized devices can connect to the distribution automation system. Individual user accounts. Granular access permissions. Support remote maintenance access. Support local maintenance access. Manage access locally, even when no connection is available. 22
23 X.509 > International Telecommunication Union (ITU) standard that defines a Public Key Infrastructure (PKI) based on: Certificate Authorities (CA) Public key certificates Attribute certificates Certificate revocation lists 23
24 Asymmetric Cryptography or Public Key Cryptography > The basics In symmetric cryptography both parties share a secret key used to encrypt and decrypt messages. In asymmetric cryptography, keys come in pairs. A message encrypted with one key can only be decrypted using the other key. One key is known as the public key and can be widely shared. The other key, known as the private key, is kept in a secure location. The sender of a message can use the intended receiver s public key to encrypt the message. Only the intended receiver with the appropriate private key will then be able to decrypt the message. 24
25 Digital Signatures > Asymmetric cryptography can be used to authenticate the sender and to protect the contents of a message: Before sending a message, Alice calculates a hash of the message. Alice encrypts the hash with her private key, adds it to the message as a digital signature and sends the message. Bob calculates the hash of the received message. He extracts the signature and uses Alice s public key to decrypt it. If the hash matches, Bob can be certain it comes form Alice and was not tampered with. 25
26 Certificate Authority > A Certificate Authority (CA) acts a trusted third party that validates individuals and issues public keys. Alice generates a key pair She sends the public key to the CA The CA confirms her identity The CA generates an electronic document that contains the user s name and public key The CA signs this document using its own private key The signed document is called a public key certificate 26
27 Establishing Trust > To set up a Public Key Infrastructure (PKI): The CA s public key certificate is distributed to all parties. A party that trusts the CA can then use the CA s public key to validate the authenticity of a public key certificate provided by an unknown user. If the signature on the certificate is valid and we trust the CA, we can also trust the identity of the user bearing the certificate. > Public key certificates are widely used to authenticate web sites and to set up encryption with the TLS protocol. 27
28 Using Certificates Certificate Authority Alice sends her public key to be signed by the CA Bob retrieves a copy of the CA public key certificate The CA issues Alice a signed public key certificate Bob trusts that the message is really from Alice since it is signed with a certificate issued by the trusted CA Alice s Certificate Alice Alice sends a message to Bob signed with her certificate Bob CA Certificate 28
29 Transport Layer Security 29
30 Authenticating and Assigning Permissions > Each user has a public key certificate used for identification purposes. > Each device has a public key certificate to identify it. > Each user has an attribute certificate used to assign permissions. > Attributes certificates are similar to public key certificates but are used to establish access permissions. > The X.509 standard defines attribute certificates, but there is currently no standard format to define device permissions. 30
31 Revoking Access > Certificates have a limited lifetime Device certificates typically have a very long lifetime. User certificates typically have a shorter lifetime. Attribute certificates typically have an even shorter lifetime. > Certificates can be revoked before their expiration The Online Certificate Status Protocol (OCSP) can be used to validate a certificate when a connection is available. Certificate Revocation Lists (CRL) can be propagated on a periodic basis. 31
32 Conclusion Many technologies and standards are already available to meet the security requirements of distribution automation. However, there remain gaps and work is still in progress to establish the required standards and best practices. To achieve its original interactive network vision, Hydro-Québec specified from the beginning that Automation components provide sufficient processing power Be remotely upgradable Comply with existing standards, including security By thus future-proofing its solution, Hydro-Québec has been able to evolve its solution as functional and security requirements evolve. 32
33 Contact Information Jacques Benoit Senior Analyst Information Security Cooper Power Systems Serge Gagnon Chargé de projets informatiques Hydro-Québec Luc Tétreault Ingénieur Automatismes Hydro-Québec 33
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Secure Substation Automation for Operations & Maintenance
Secure Substation Automation for Operations & Maintenance Byron Flynn GE Energy 1. Abstract Today s Cyber Security requirements have created a need to redesign the Station Automation Architectures to provide
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -
Security - 1 - OPC UA - Security Security Access control Wide adoption of OPC SCADA & DCS Embedded devices Performance Internet Scalability MES Firewalls ERP Communication between distributed systems OPC
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
Fundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework Jacques Benoit, Cooper Power Systems Inc., Energy Automations Solutions - Cybectec Robert O Reilly, Cooper
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Lightweight Security using Identity-Based Encryption Guido Appenzeller
Lightweight Security using Identity-Based Encryption Guido Appenzeller Chief Technology Officer Voltage Security Inc. Identity-Based Encryption (IBE) IBE is a new public key encryption algorithm A number
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Network Security 101 Multiple Tactics for Multi-layered Security
Security and Resilience for Utility Network Communications White Paper Communications networks represent a partial paradox. The very openness and ubiquity that make them powerful can also present a weakness.
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Redesigning automation network security
White Paper WP152006EN Redesigning automation network security Presented at Power and Energy Automation Conference (PEAC), Spokane, WA, March 2014 Jacques Benoit Eaton s Cooper Power Systems Abstract The
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
White Paper. The risks of authenticating with digital certificates exposed
White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric
Cyber Security Practical considerations for implementing IEC 62351
1. Introduction Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB [email protected] Switzerland Two trends are currently changing
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT
Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
SSL Protect your users, start with yourself
SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
Benefits of Network Level Security at the RTU Level. By: Kevin Finnan and Philippe Willems
By: Kevin Finnan and Philippe Willems Introduction New security capabilities at the remote terminal unit (RTU) level are substantially easing implementation of cyber security measures in SCADA systems.
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Making the most out of substation IEDs in a secure, NERC compliant manner
Making the most out of substation IEDs in a secure, NERC compliant manner Jacques Benoit, Product Marketing Manager, Cybectec Inc. Jean-Louis Pâquet, Chief of Technology, Cybectec Inc. Abstract An increasing
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces
Introduction An Overview of the D Industrial Router Product Line Secure Access with VPN Technology in Industrial Networks Outlining the IPsec and VPN capabilities available in the GarrettCom D series of
EnergyAxis System: Security for the Smart Grid
Security for the Smart Grid 2010 by Elster All rights reserved. No part of this document may be reproduced, transmitted, processed or recorded by any means or form, electronic, mechanical, photographic
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity)
Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity) Abstract Strong identity management enforced with digital authentication mechanisms
Keeping SCADA Networks Open and Secure DNP3 Security
Keeping SCADA Networks Open and Secure DNP3 Security June 2008 DNP3 Protocol DNP3 protocol has become widely accepted within water and electrical utilities worldwide for SCADA communications with field
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Cryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure (AMI)
Cryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure (AMI) 1024431 Cryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure
Mira Zafirovic-Vukotic, Roger Moore, Michael Leslie, Rene Midence, Marzio Pozzuoli, RuggedCom Inc.
Securing SCADA Communications following NERC CIP Requirements Abstract Mira Zafirovic-Vukotic, Roger Moore, Michael Leslie, Rene Midence, Marzio Pozzuoli, RuggedCom Inc. Asia Energy Week 2008, Kuala Lumpur,
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Digital Certificates Demystified
Digital Certificates Demystified Alyson Comer IBM Corporation System SSL Development Endicott, NY Email: [email protected] February 7 th, 2013 Session 12534 (C) 2012, 2013 IBM Corporation Trademarks The
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Certificates. Noah Zani, Tim Strasser, Andrés Baumeler
Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1
Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Skoot Secure File Transfer
Page 1 Skoot Secure File Transfer Sharing information has become fundamental to organizational success. And as the value of that information whether expressed as mission critical or in monetary terms increases,
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
John M Shaw Presentation to UTC Region 7 February 19, 2009 [email protected]
NERC CIP Substation Cyber Security Update John M Shaw Presentation to UTC Region 7 February 19, 2009 [email protected] It s February 19, 2009 132 project days left to compliance Do you know where (what)
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Cyber Security for Protection Related Data Files
IEEE PSRC H18 Report October 7 th, 2011 Cyber for Protection Related Data Files Report to the PSRC Main Committee from WG H-18 Working Group Members Amir Makki, Chair Stephen Thompson, Vice Chair Mark
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
Global Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)
Managed Communications JPMorgan - Global Client Access Managed Internet (EC Gateway) Managed Communications Overview JPMorgan offers a variety of electronic communications services that are reliable and
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
1. OVERVIEW: IEC TC57 WG15 SECURITY FOR POWER SYSTEM COMMUNICATIONS... 1 2. DUAL INFRASTRUCTURES: THE POWER SYSTEM AND THE INFORMATION SYSTEM...
IEC TC57 WG15: IEC 62351 Security Standards for the Power System Information Infrastructure Frances Cleveland, WG15 Convenor Xanthus Consulting International Contents 1. OVERVIEW: IEC TC57 WG15 SECURITY
Open Enterprise Architectures for a Substation Password Management System
CIGRÉ Canada 21, rue d Artois, F-75008 PARIS (154) Conference on Power Systems http : //www.cigre.org Toronto, October 4-6, 2009 Open Enterprise Architectures for a Substation Password Management System
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
An Introduction to Entrust PKI. Last updated: September 14, 2004
An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
RIG Acceptance Test (RAT) Procedures
RIG Acceptance Test (RAT) Procedures RIG Acceptance Test (RAT) Procedure 0 Print Date 2 /20/2007 REVISION HISTORY REVISON NO. DATE DESCRIPTION 1.0 Initial Release 0 Update Logo and Links i RIG Acceptance
OBM (Out of Band Management) Overview
OBM (Out of Band Management) Overview With the growth of IP, routers deployed into an IP network must not only be accessible by the network operator for maintenance and configuration purposes, but secure
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
A Case Study: How a Utility Automated and Integrated Data/Control for 4000 Pole-Top Switches and Protection Relays, and Reduced its SAIDI
A Case Study: How a Utility Automated and Integrated Data/Control for 4000 Pole-Top Switches and Protection Relays, and Reduced its SAIDI Hervé Delmas, Eng. - Hydro-Quebec Patrick Cossette, Eng. - Cooper
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT
29175671 CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT Version 1.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the
