Research Article Secure Model against APT in m-connected SCADA Network
|
|
|
- Everett Kristian Fields
- 10 years ago
- Views:
Transcription
1 Distributed Sensor Networks, Article ID , 8 pages Research Article Secure Model against APT in m-connected SCADA Network Si-Jung Kim, 1 Do-Eun Cho, 2 and Sang-Soo Yeo 3 1 College of General Education, Hannam University, Daejeon , Republic of Korea 2 Innovation Center for Engineering Education, Mokwon University, Daejeon , Republic of Korea 3 Division of Convergence Computer & Media, Mokwon University, Daejeon , Republic of Korea Correspondence should be addressed to Sang-Soo Yeo; [email protected] Received 4 January 2014; Accepted 1 April 2014; Published 17 June 2014 Academic Editor: Jongsung Kim Copyright 2014 Si-Jung Kim et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Supervisory control and data acquisition (SCADA) networks for the remote control and operation of various industrial infrastructures are currently being used as main metropolitan infrastructures, especially smart grid and power plants. Most of the existing SCADA networks have fortified securities because of their powerful access control based on closed and private networks. However, recent SCADA networks are frequently connected to various IT-based systems and also to other conventional networks, in order to achieve the operational convenience of SCADA systems, as well as the execution requirements of various applications. Therefore, SCADA systems have acute needs for secure countermeasures against the ordinary network vulnerabilities and for tangible preparations against ever-changing intrusion attacks such as advanced persistent threat (APT). This paper introduces the concept of m-connected SCADA networks, analyzes various security vulnerabilities on such networks, and finally proposes an integrated secure model having an APT managing module and a rule-based intrusion detection system (IDS) for internal and external network access. 1. Introduction Currently, most of the major core infrastructures, including power supply chains, are managed and operated through the supervisory control and data acquisition (SCADA) system. Various types of metropolitan infrastructure networks consist of IT-based network systems. Consequently, cyber terrors aimed at these systems, as well as malfunction and information leakage due to virus infections and hacking, and unauthorized remote control have resulted in greatly increased damage. Large-scale plant facilities, such as power plants and dams, are gradually moving toward information systemization for the effective operation of management systems located remotely in major social infrastructure and industry fields. Therefore, concerns regarding the information security of control systems are increasing. Thus far, national infrastructure control systems have operated based on the closed SCADA system. The SCADA system manages and controls major national infrastructures, including oil, gas equipment, and water and sewage equipment, and it is the technology that operators can use to collectdatafromremoteinfrastructureequipment,aswellas transfer commands to control such equipment [1, 2]. Most countries operate SCADA systems in closed networks, and it can be said that such networks are secure from cyber attacks because the vendor s own operating system and protocols are used. However, in recent years, connections with open networks have been implemented for work effectiveness and operational convenience. Because most SCADA networks include sensor devices, network communication functions, remote monitoring facilities, data acquisition systems, they can be easily connected to wide area networks and to the public networks. The traditional connecting method is to use exclusively private networks, but now it has been changed into the dual structures consisting of its own intranet and Internet. Consequently, much more security vulnerability appears due to the interlocking of intranet and Internet connections with various IT systems, and the possibility of critical damage caused by cyber attacks might increase. For example, a new malicious code called Stuxnet has infected some essential mechatronic devices at the Bushehr Power Plant in Iran and
2 2 Distributed Sensor Networks Control center WAN Field device Workstation HMI Switched telephone. Leased line or power line based communications Modem Field device PLC Radio or cellular microwave WAN card IED Field device Data historian Control server (SCADA-MTU) Communication routers Satellite 2100 server Modem Figure 1: A typical structure of SCADA network [20]. caused them to malfunction; this type of malicious code has attracted the attention of security professionals around the world. The SCADA system which was then allowed to operate in a closed private network disconnected from the Internet for not being a victim to cyber danger now strongly requires various types of external connections along with remote maintenance and usage of mobile storage mediums such as USB flash memory. Such an environmental change means that the securities of the SCADA system, which are rooted in the characteristics of closed networks, can no longer be maintained [3]. Our proposed m-connected SCADA network is defined in this paper in order to analyze the weak points that can take place while closed SCADA jobs are performed and to present a security model against advanced persistent threat (APT) attacks. In this paper, we will discuss security through a more enhanced SCADA network security model by presenting a security model for APT attacks in the form of anomaly detection of m-connected SCADA networks that operate in open or closed structures. In Section 2, the structure of existing SCADA systems is examined, and the existing research on its security is discussed. In Section 3, the definition of m-connected SCADA networks is discussed, and attacks against these networks are examined. In addition, Section 3 analyzes vulnerabilities of the SCADA system and responses to attacks are examined. In Section 4,asecuritymodelagainst vulnerabilities is proposed. Our conclusion is presented in Section 5. This paper includes our initial research result published in[3] and gives more detailed explanations and elaborations onto it. 2. Related Work In general, the system structure of SCADA networks can be changed according to their usage and objectives. Figure 1 shows a typical structure of SCADA networks, including the SCADA control servers, human machine interfaces (HMIs), data historians, and field devices, and such structure should be well designed and organized in order to process sensing data and control commands securely [2]. (i) Human machine interface (HMI) transmits the collected information to the system operator and transfers the control command under the secure user authentication. (ii) SCADA control server collects and analyzes the measured information transferred from the field devices and transfers the control command through the HMI to the field devices. (iii) Field device transfers various status signals or information of the target network to the SCADA server. In addition, it transfers the command signals that aresuitabletotheactualtargetdeviceforcontrolby analyzing the SCADA control command transmitted from the server to the various file site devices, including the remote terminal unit (), programmable logic controllers (PLC), intelligent electronic device (IED), and programmable automation controller (PAC) SCADA Network Security Invasions. Recently, APT attacks, using very intelligent, viable, and malicious codes such as Duqu, Flame, and Gauss, which are variants of Stuxnet, occurred on SCADA networks. In addition, the appearance of the malicious code Flamer (W32.Flamer), which targets national infrastructures and can leak information after an attack, has increased concerns regarding information security [1 3]. Similarly,newattackmethods,suchasthepolymorphism attack that occurs, namely, through the server from where other attackers automatically generate mutagenic malicious code that was obtained from the attacker s website, have
3 Distributed Sensor Networks 3 appeared and constantly take place, along with high-skilled targeted attacks, including APT attacks. APT attack methods are performed in stages (internal intrusion, searching, collection, and leakage) through spear phishing, after a target has been elaborately checked through preinvestigation. Approximately 100,000 personal computers (PCs) have been infected by Stuxnet all over the world; similar damage to PCs in India and the USA has also been reported. Since the advent of Stuxnet, it is impossible to assert that SCADA systems are secure from cyber attacks; closed networks are no exception. Generally, this type of attack intrudes networks after normal PCs have been infected. When the infected PCs then connect to and interface with closed networks, the network becomes infected. Even before the advent of Stuxnet in 2010, SCADA network security invasions occurred several times [4 6]. Existing closed SCADA systems should be controlled effectively, because they are frequently accessed from outside the system through mobile storage mediums, including universal serial bus (USB) storage devices. Control systems that are operated only within closed networks can be exposed to infection threats from malicious code based on the use of mobile storage mediums, including USBs. In addition, policies are required that block connections with mobile storage mediums through USB ports, including operator PCs (human machine interface, HMI) and central servers that can regulate control equipment. Stuxnet and other malicious codes have even been transmitted through mobile storage mediums such as USBs and have invaded facilities operated within closed networks. Strengthening the security measures for outside personnel is also necessary. Notebooks and portable PCs that belong to outside personnel should only be used after being checked for viruses and illegal programs. Fundamentally, such equipment should be checked by clean PCs that are stored by the management organization. User account management and authentication processes require strengthening. Major systems, including HMI PCs that operate and control equipment, central servers, and network devices should only be accessed by authorized managers. In addition, control access, including the provision of IDs as well as the registration, change, and disposal procedures performed according to authorized managers andusers,shouldbestrengthened.insomeorganizations, manageridsandpasswordsarefrequentlysharedamong all operators, and systems are automatically logged into for convenience; however, such practices should be discontinued and avoided, without exception. The latest security patch should be maintained through regular security updates, along with vaccine installation. Vaccines in the control system should be kept current through regular updates; pretests of software security patches should be performed to study their effects on the system, prior to the next offline update. Other security processes that should occur are the detection of unauthorized modems and wireless LANs that might have been installed through internal or external access; if found, such modems and wireless LANs should be disconnected immediately and constantly monitored, because they could be operated while an external connection is open for remote maintenance [7 9] m-connected SCADA Network. As we explained above, even a closed SCADA network can be momentary online status which is defined as m-connected status,andsuchtemporary pseudoconnections are made by portable mediums such as external flash memory, floppy disks, and CD-ROMs which are used to perform maintenance tasks including patching,upgrades,andmigration[3]. So m-connected SCADA network is a closed, isolated, and private SCADA network which has, however, similar levels of vulnerabilities to open online SCADA networks in a long-term observation. Moreover, such m-connected status of a closed SCADA network can be formed by an official update/patch server attached in the SCADA network, and if the update/patch server is infected by malware through portable mediums, this will make a big disaster on the SCADA system. 3. Security of m-connected SCADA Network The SCADA network generally performs services through the proper interface, according to each network type. In addition, security vulnerabilities appear after general-purpose hardware and software begin to be used. An m-connected SCADA network that operates within both open platforms and closed platformsshowsseriousweakpoints[3]. Currently, SCADA systems based on exclusively closed protocols and their own dedicated interfaces are no longer secure but have the lack of awareness of security and authentication in the design, disposition, and operation of the SCADA network. Consequently, any belief that the SCADA network is secure because of its physical isolation is not true anymore. In particular, some of the weak points in the managerial aspect of SCADA networks are a weak security connection, passwords shared by several people, impossibility in tracing it when an attack has occurred, and not knowing where the responsibility lies. Technical weak points include an OS, whose security is not strengthened, applications, system operation, and damage from attacks. Therefore, SCADA networks are quite complex in their security measures [10 14]. 3.1.ThreatofAttacktoSCADANetwork.Security threats from attacks to SCADA networks are described as follows [14]. (i) Threat to the Use of Platform Technology with Standard Protocol and Vulnerability. Organizations have the same exposure to vulnerability known by the use of famous operating systems from the use of exclusive systems. In addition, standard network protocols, such as transmission control protocol/internet protocol (TCP/IP), are used for cost reduction and performance increase. The uses of these protocols and technologies do present advantages in the economic and
4 4 Distributed Sensor Networks technological aspect but are extremely vulnerable to attacks from effective hacking tools. (ii) Increased Access among Networks. Internal and external organizations generally connect the SCADA system to a network system in order to fulfill various objectives, including operation and information management. In such organizations, there is a system manager or technology supporting personnel responsible for monitoring the external system. These same managers or supporting personnel set up remote access channels; in addition, access among different networks is increased to collect information about the system operation. The SCADA system uses wide area networks and the Internet for the operation of remote or local devices; this structure can increase network vulnerability. (iii) Connection of Various Access Devices. System maintenance is responsible for authorizing wireless communication in cases where remote access is permissible and related services are established. Illegal access or authentication can be tried to test access to system or to test authentication procedures. Dangers to security might not be recognized because of the complexity that exists among different networks when a given network and the SCADA network attempt to gain access, and this could result in weaknesses in the control access to the network Vulnerability of the m-connected SCADA Network. This section explores various weaknesses in the m-connected SCADA networks. (i) Structural Weak Points in the SCADA Network. The control network is secured with powerful access controls based on isolation from the commercial network. However, such security control will not be meaningful anymore after the control network is connected to the commercial network. In addition, it has become easier to acquire information to an attacking path to the SCADA network, because information about the SCADA network structure has been revealed in the Internet. Access to separate devices has been avoidable in cases of emergency and during system maintenance in the generally closed status of closed SCADA networks. This is an exceptional access that can be expected to occur periodically, and this means that abnormal access or the possibility to be exposed to various attack methods has greatly increased. (ii) Security Vulnerabilities for Physical Connections. Data might be exposed during data transfer through wireless connections when communication is established between remote devices and the control center. Moreover, data might be accessed through HMIs without passing through the proper authentication process during communication with the telephone network. (iii) Security Vulnerabilities in EMS. When commercial networks and SCADA networks are used through their connections, security threats exist due to attacks to several devices. Authentication systems that use passwords for remote terminal units () and intelligent electronic devices (IED) are vulnerable to attacks because of password exposure and management carelessness APT Attacks. According to the recent threat analysis of cyber attacks, advanced persistent threats (APTs) attacks are the most common attacks in SCADA systems. APT attacks are also defined as advanced targeted persistent threats (ATPTs), and they are an attack type where attackers with professional technology having elaborated levels or vast resources use an attacking path. APTs mainly target large organization networks, and the damage they cause is more considerable than any other attack types [14, 15]. The goals of APT attacks are to leak information constantly by providing and expanding the internal foundations of information technology infrastructures in the general organization, to obstruct important aspects in the organization, or to later acquire its foundations. Repetitive and continuous attacks are performed for a long time, while constant threats adapt to the defending resistance and persistently maintain the necessary level of interaction to execute their objectives. The differences between intelligent, constant threats and existing attacks are as follows. First, the attacker attempts to assail continuously a specific field or organization. Second, the attacker abuses weak points until new ones are discovered, or large-scale attacks are rearranged by combining small weak points. Third, there is an incubation period that makes attacks difficult to detect. Invasions are relatively easy to detect because general security invasions tend to steal large amounts of data in a short time. Conversely, existing security systems can become incapacitated because intelligent and constant threats use a method to leak the target data over several months or years. Figure 2 shows a general process of an APT attack. APT attacks are a type of attack that utilizes malicious code to attack large-scale networks and target specific organizations. APT attacks deliberately choose a target, and the attacking group is strategically flexible for the target. Major attacks focus on large-scale organization networks using worms that leak information for lengthy periods or provide a foundation for other invasion attacks using an evasion in the network of the target organization [16 19]. The security requirements against APT attacks are described as follows [19]. Step 1. Requirements for continuous network traffic analysis are (i) traffic analysis of protocols, including Internet relay chats (IRC) and hypertext transfer protocols (HTTP), and traffic monitoring through secure socket layer (SSL) communication analysis; (ii) upgrading the platform system operation file through a network vulnerability analysis; (iii) general usage pattern analysis for the network user, namely, execution of action analysis.
5 Distributed Sensor Networks 5 An invader transfers the file to the target system by using an attack file where document exploit is attached. Additional attack starts by using the informed exploit. Intelligent gathering Files in the target system are transferred through mail system. Foundation to attack like an installation of backdoor program is secured right after they are opened. Point of entry communication Target system is infected by various viruses and worms and information starts to leak. Data exfiltration Weak points of the network inside the target system are transferred, scan (ARP/port). Lateral movement Asset/data discovery Figure 2: General process of APT attack. Step 2. Requirements for context analysis based on network operation are (i) analysis of known vulnerabilities through analysis of protocols based on the platform; (ii) application program detection and analysis in the cyber space; (iii) access log file analysis and extraction of the corresponding access data. Step 3. Content analysis based on access includes (i) structural weak point analysis of data file; (ii) analysis of attached files and monitoring of the running code in case of downloads. Similarly, security measures by phase for APT attacks takingplaceinthescadanetworkarerequired.analysis and monitoring of all network traffic should be performed, and separate handling routines should be maintained to detect malicious contents and executable code. Test processes by phase are required to determine whether an attack has occurred. Adequate intrusion detection system (IDS) rules should be applied. This type of regular monitoring system and detection routine rule should be updated in real time. When an attack is detected, a handling process for emergency control operations should be performed. Abnormal access should be detected and blocked through a more dynamic operation in the existing system. 4. Secure Model for m-connected SCADA Networks Currently, SCADA separated from extranets is connected to networks for general work and to IT system networks for the efficient management and operation of information. Consequently, many types of accidents related to security can occur frequently. Most SCADA networks are set up with general and fundamental network technology, and they may be exposed to various attacks caused by vulnerabilities, just as is the case with existing IT systems. Therefore, security measures of SCADA networks require the operation of security management programs, establishment of measures according to risk evaluation of vulnerability analysis, application of secure security modules, and establishment of security policies Intrusion Detection Module for the Proposed Security Model. Most devices do not consider system securities because SCADA, which is a converging network that consists of various application programs and devices, is set up with security solutions that are applicable to the existing networks. In addition, currently operated servers have security vulnerabilities because access authentication is performed with a simple password in cases of remote access. Moreover, protocols used in the SCADA network, such as distributed network protocols (DNP), intercontrol center communication protocols (ICCP), and Modbus, are becoming the target of attackers, because such protocols are not guaranteed with integrities that are important security elements. The SCADA network requires access between a network and another network for efficient operation. Currently, the secure measure is an introduction of IDS for the most efficient access. This is to guarantee the security of transferred data by placing IDS in case of data transfer inside and outside the network. It needs to guarantee security by placing the IDS module at the access point of internal and external SCADA networks.presently,host-basedsecuritymodulesareapplied to the IDS internal module; application of the IDS module should be performed after security assets of the SCADA
6 6 Distributed Sensor Networks - Rule and pattern DB - Pattern matching device - Information analysis module - Information collection module - Creating pattern device - Updating the security policy for the newly known vulnerability -Applying the individual and public security policy SCADA network Company service network Supervisors FEP Internet/WAN Enterprise/outside world Historian App server Router Firewall ICCP server Router SCADA network Firewall server 2100 PLC PLC HMI Control server Four entities for potential threats - Authorized internal person: application of the internal security system - Unauthorized internal person: control of security and access and, application of the security system - Authorized external person: authentication procedure and access policy application - Unauthorized external person: concurrent defense of firewall, IDS, and router Figure 3: Intrusion detection module in the proposed secure model. network are validated by applying the network-based module to the module of internal network access points. Malicious code and web viruses are detected on the network through the checksum of metadata files and the state data monitoring of log data processes in the host IDS module of the SCADA network. To this end, it is necessary to execute theapplicationmoduleoftheidssystembasedonthehost. In addition, effects on the process of the existing SCADA network service should be considered. As shown in Figure 3, new attack patterns can be generated by information analysis module and collection module, and then these patterns and their matching rules are registered to the rule and pattern database. These new patterns andrulesareappliedtothepatternmatchingdevices.the rule and pattern DBs located in internal IDS network are updated continuously, and this updating mechanism allows the whole systems to get active defensing characteristics and more powerful detecting capability. In the proposed IDS model, access entities are categorized into four kinds of entity types, and this classification definitely reduces unnecessary security policy enforcements and makes the system really up to date and protective Countermeasures against APT Attacks in the Proposed Security Model. Vulnerability studies on the security of SCADA networks are mostly conducted for various network platforms and communication protocols. Integrated control policy is needed through data surveillance and analysis to test illegalaccesstothetotalnetworksystemandfordetection and measures against intrusion or malicious code. Changing data and access status should always be analyzed through network monitoring, and reporting processes should be performed through such monitoring. A security defense method where an elaborate pattern matching process for known malicious code is applied is required for measuring APT attacks. Measuring strategies forpolymorphicmaliciouscodeshouldbeappliedthrough theanalysisfunctionofnetworktrafficandprocesses.atthe core of APT attacks are unknown system vulnerabilities and new malicious codes. Therefore, updating previous intrusion pattern data or rules is not significant. In order to measure APT attacks, it is necessary to evaluate risks through processes such as rapid and precise virtual execution, in case of detection of unknown intrusion patterns or malicious code. Additionally, it is required to design countermeasures against
7 Distributed Sensor Networks 7 SCADA network Defense against the expected attack through the regular reporting Information scanning Company service network Supervisors Historian App server ICCP server Router Execution of traffic/log file analysis and cure/defense process by phase Firewall Server monitoring FEP Sending files Log file analysis Internet/WAN Virus Worm Malicious code Information detection Enterprise/outside world Router Log file analysis of life cycle of APT attack by checking phase Firewall Countermeasures Defense against the expected attack through the regular reporting Log file analysis of life cycle of APT attack by checking phase Execution of traffic/log file analysis and cure/defense process by phase SCADA network 2100 server PLC PLC HMI Control server Reporting analyzed information Virtual testing for the unknown malicious code Evaluating actual risk level of the malicious code used for APT attack Executionof blocking function of real-time data transfer for information leakage Execution of the routine for analysis and detection of the intelligent signature Figure 4: Countermeasures against APT attacks in the proposed security model. the security vulnerabilities of file transferring and various data attachments for inbound and outbound protocols of the SCADA system. To this end, inspection processes of security items must be executed. (i) Integrated monitoring on network data includes (a) files to be updated: data and registry files residing in the system; (b) updating data key values of the application program that is necessary for platform operation; (c) updating log file and file device data. (ii) Inspection on log data includes (a) comprehensive analysis of the log file for applicationprogramsthatruninthesystem; (b) determining whether log data has been invaded after the intrusion detection process, which is basedontherulegeneratedfromthesecure model, has been executed. Figure 4 shows the proposed security model and its various countermeasures against APT attacks. The seven sorts of countermeasures are considered in the attack detecting process and also can be applied to the attack detection policy. These countermeasures are designed to protect the SCADA system from unknown or unexpected APT attacks, and they can be elaborated for providing virtual test environment for unknown malicious codes, evaluating actual risk levels, and blocking real-time information leakage. Consequently, the overall security model is very strong at managing unexpected threatsanditsvariousattackpatterns,anditisveryusefulfor controlling already infiltrated code and its risk level change. The proposed model is conducting continuous security checking phases including the log file analysis and reporting, traffic analysis, and information scanning. Analyzed results are used for updating protective mechanism which is monitoring APT life cycle. 5. Conclusions This paper has analyzed security vulnerabilities of the existing closed network SCADA, which is one of the industrial control systems, and shows that such SCADA network can be an m- connected SCADA network. SCADA networks that typically operate within a closed network have recently been connected to several intranets, extranets, and other devices in order to achieve operational effectiveness and convenience; therefore, the security of SCADA network cannot be guaranteed anymore by just using its isolation property. Because of several APT attacks, damage has been reported for the control systems of largescale organizations, including nuclear power plants under
8 8 Distributed Sensor Networks SCADA networks. In establishing security countermeasures of the SCADA network, a concrete security design should be made under consideration about how to apply new policy on the existing services and how big its main and side effects are. The security model presented in this paper recognized the connecting status through asset analysis of SCADA networks, analyzed the connection type of intra- and extranetworks, appliedthewell-definedhost/network-basedintrusiondetection module, provided continuous monitoring on data as a countermeasure against APT attacks, and designed the security module for surveillance analyses and effective controls. The proposed security model counters the existing vulnerabilities through the well-made IDS rules which are refined through asset analysis for integrated security measures to the SCADA network, IT devices, and field devices. In addition, the proposed model analyzes all possible paths of APT attacks constantly, monitors any changes in the systems and networks in real time, reports novel intrusion patterns, and applies new IDS rules to its own rule database. In our on-going research, more detailed design elaborations will be takenintoourproposedsecuritymodeltobeusedinpractical SCADA networks. Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper. Acknowledgment This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education ( ). References [1] W. Kim, H. K. Kim, K. Lee, and H. Y. Youm, Risk analysis and monitoring model of urban SCADA network infrastructure, the Korea Institute of Information Security and Cryptology, vol. 21, no. 6, pp , [2]K.Stouffer,J.Falco,andK.Scarfone,Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, NIST Special Publication , [3] S.-J. Kim, B.-H. Kim, S.-S. Yeo, and D.-E. Cho, Network anomaly detection for m-connected SCADA networks, in Proceedings of International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA '13),pp , October [4] R. J. Robles and M.-K. Choi, Assessment of the vulnerabilities of SCADA,control systems and critical infrastructure systems, Grid and Distributed Computing,vol.2, no. 2, pp , [5] S.Cheung,B.Dutertre,M.Fong,U.Lindqvist,K.Skinner,and A. Valdes, Using model-based intrusion detection for SCADA network, in Proceedings of the SCADA Security Scientific Symposium,pp ,January2007. [6]J.VerbaandM.Milvich, Idahonationallaboratorysupervisory control and data acquisition intrusion detection system (SCADA IDS), in Proceedings of the IEEE International Conference on Technologies for Homeland Security (HST '08),pp , May [7] P. Oman and M. Phillips, Intrusion detection and event monitoring in SCADA networks, in Critical Infrastructure Protection, E. Goetz and S. Shenoi, Eds., vol. 253 of IFIP International Federation for Information Processing,pp , Springer, [8]K.E.Holbert,A.Mishra,andL.Mill, Intrusiondetection through SCADA systems using fuzzy logic-based state estimation methods, Critical Infrastructures, vol.3,no.1-2,pp.58 87,2007. [9] D. Choi, S. Lee, D. Won, and S. Kim, Efficient secure group communications for SCADA, IEEE Transactions on Power Delivery,vol.25,no.2,pp ,2010. [10] J.O.KwonandY.J.Hong, Astudyonthesecuritymanagement plan of industrial control system, Samsung SDS IT Services,vol.8,no.2,pp ,2011. [11] A. Carcano, I. N. Fovino, M. Masera, and A. Trombetta, Statebased network intrusion detection systems for SCADA protocols: a proof of concept, in Critical Information Infrastructures Security, E. Rome and R. Bloomfield, Eds., vol of Lecture Notes in Computer Science, pp , Springer, [12] International Electro Technical Commission, Data and communication security profiles including MMS, IEC Standard IEC , [13] International Electro Technical Commission, Data and communication security security for IEC 61850, IEC Standard IEC , [14]V.Jyothsna,V.V.R.Prasad,andK.M.Prasad, Areview of anomaly based intrusion detection systems, International JournalofComputerApplications,vol.28,no.7,pp.26 35,2011. [15] D.-J. Kang, J.-J. Lee, Y. Lee, I.-S. Lee, and H.-K. Kim, Quantitative methodology to assess cyber security risks of SCADA system in electric power industry, Korea Institute of Information Security and Cryptology,vol.23,no.3,pp , [16] NIST Special Publication Revision 1, Guide for Conducting Risk Assessments, 2012, publications/drafts/ rev1/sp rev1-ipd.pdf. [17] IDG, Blue Code Security Report; APT Attack,2012. [18] IDG, Understanding of Next-Generation Security Evasion Techniques APT,2012. [19] IDG, The Start of the Next-Generation Hacking, Malicious Code and Understanding How to Respond,2012. [20] NIST, Guide to Industrial Control Systems (ICS) Security,2008.
9 Rotating Machinery Engineering The Scientific World Journal Distributed Sensor Networks Sensors Control Science and Engineering Advances in Civil Engineering Submit your manuscripts at Electrical and Computer Engineering Robotics VLSI Design Advances in OptoElectronics Navigation and Observation Chemical Engineering Active and Passive Electronic Components Antennas and Propagation Aerospace Engineering Modelling & Simulation in Engineering Shock and Vibration Advances in Acoustics and Vibration
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Vulnerabilities in SCADA and Critical Infrastructure Systems
International Journal of Future Generation Communication and Networking 99 Vulnerabilities in SCADA and Critical Infrastructure Systems Rosslin John Robles 1, Min-kyu Choi 1, Eun-suk Cho 1, Seok-soo Kim
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Using Tofino to control the spread of Stuxnet Malware
technical datasheet Application Note Using Tofino to control the spread of Stuxnet Malware This application note describes how to use the Tofino Industrial Security Solution to prevent the spread of the
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
A Concise Model to Evaluate Security of SCADA Systems based on Security Standards
A Concise Model to Evaluate Security of SCADA Systems based on Security Standards Nasser Aghajanzadeh School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran Alireza Keshavarz-Haddad
Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative
Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative November 2014 Disclaimer Current SCADA Vulnerability Factors Industrial Control Systems 101 Proposed Countermeasures
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi etieghi@visionautomation.
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems Enzo M. Tieghi [email protected] Security IT & Control System Security: where are we?
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric Challenges What challenges are there for Cyber Security in Industrial
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
Best Practices for DanPac Express Cyber Security
March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction
AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS
http://dx.doi.org/10.5516/net.04.2012.091 AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG *, JUNG-WOON LEE, GEE-YONG PARK, KEE-CHOON KWON,
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Device-based Secure Data Management Scheme in a Smart Home
Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Best Practices for DeltaV Cyber- Security
January 2013 Page 1 Best Practices for DeltaV Cyber- Security This document describes best practices will help you maintain a cyber-secure DeltaV digital automation system. www.deltav.com January 2013
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
Fundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
IT Security and OT Security. Understanding the Challenges
IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control
A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems
, pp. 49-56 http://dx.doi.org/10.14257/ijsh.2013.7.5.05 A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems Minkyu Choi 1 and Ronnie D. Caytiles 2 1 Security Engineering Research
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Cyber Security of the Power Grid
Cyber Security of the Power Grid Chen-Ching Ching Liu Professor of Power Systems University College Dublin Research for Ireland s Future Ireland -Country of natural beauty -Quality of life ranked among
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
An Introduction to SCADA-ICS System Security. Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015
An Introduction to SCADA-ICS System Security Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015 Overview Supervisory Control And Data Acquisition (SCADA) for Industrial Control Systems
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 9 Firewalls and Intrusion Prevention Systems First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Firewalls and Intrusion
Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements
, pp.144-148 http://dx.doi.org/10.14257/astl.2015.95.27 Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements Hongseok Chae 1, AAmir Shahzad 1, Muhammad Irfan 2, HyangRan
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Discovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Fall 2010 Sonja Buchegger [email protected] Lecture 6, Nov. 10, 2010 Firewalls, Intrusion Prevention, Intrusion Detection
How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis
, pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn
Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Overview Assurance & Evaluation Security Testing Approaches
Safe Network Integration
UNIDIRECTIONAL SECURITY GATEWAYS Safe Network Integration Stronger than Firewalls Shaul Pescovsky, Sales Director Waterfall Security Solutions [email protected] Proprietary Information -- Copyright
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Technical Information
Technical Information Recorders, Data Loggers, and Control Products Security Standard Contents 1. Introduction... 1-1 Why Security Is Essential... 1-1 Applicable Products... 1-2 Trademarks... 1-2 2. Assets
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
13 Ways Through A Firewall What you don t know will hurt you
Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter
How To Create An Ics Network With A Network Of Nodes
A Connection Pattern-based Approach to Detect Network Traffic Anomalies in Critical Infrastructures Béla Genge 1, Dorin Adrian Rusu 2, Piroska Haller 1 1 Petru Maior University of Tîrgu Mureş, Romania
'Namgis Information Technology Policies
'Namgis Information Technology Policies Summary August 8th 2011 Government Security Policies CONFIDENTIAL Page 2 of 17 Contents... 5 Architecture Policy... 5 Backup Policy... 6 Data Policy... 7 Data Classification
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Holistic View of Industrial Control Cyber Security
Holistic View of Industrial Control Cyber Security A Deep Dive into Fundamentals of Industrial Control Cyber Security Learning Goals o Understanding security implications involving industrial control systems
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008
Utility Telecom Forum Robert Sill, CEO & President Aegis Technologies February 4, 2008 1 Agenda Asked to describe his job, Mike Selves, director of Emergency Management and Homeland Security in Johnson
The Four-Step Guide to Understanding Cyber Risk
Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated
