A Comprehensive Approach to Critical Information Infrastructure Assurance

Size: px
Start display at page:

Download "A Comprehensive Approach to Critical Information Infrastructure Assurance"

Transcription

1 A Comprehensive Approach to Critical Information Infrastructure Assurance Euro-Atlantic Symposium on Critical Information Infrastructure Assurance March 2006 Riva San Vitale, Switzerland Professor Saifur Rahman Director Advanced Research Institute Virginia Polytechnic Inst & State University, U.S.A. 1

2 Outline Critical infrastructures and their interdependencies Importance of information and electricity infrastructures Cyber and physical vulnerabilities and cascading failures Historical and new approaches to CIIA 2

3 What are Critical Infrastructures? An infrastructure or asset the destruction of which would have a debilitating impact on the national security and the economic and social welfare of a nation WATER NATURAL GAS TRANSPORTATION ELECTRICITY TELECOM 3

4 Infrastructure Interdependencies 4

5 Two Important Sectors: Critical Information and Electricity Infrastructures Information Oil and gas Banking and finance Transportation Water and sewer Telecommunications Emergency responders Critical government services Electricity Without these two enabling infrastructures, other infrastructures cannot function 5

6 Electricity and Information Infrastructure for Transportation Sector Transportation sector Electricity to power all equipment Real time information gathered and sent by the information infrastructure Traffic camera Traffic lights Traffic light control center Traffic flow detection 6

7 Electricity and Information Infrastructure for Banking and Financial Sector Banking and financial sector Needs electricity to process all transactions All information is maintained and collected in a network ATM Credit card Online transaction 7

8 Dependency of Electric Power Delivery on Information Infrastructure Source: IEEE Power & Energy Magazine, Sep/Oct 2004 CII is necessary for the reliable and secure supply of electricity 8

9 Dependency of Critical Information Services on Electric Power Arial view of the US at night Source: NASA Concentration of ISPs in the US Source: The GeoURL ICBM Address Server 9

10 Types of Vulnerabilities Cyber Physical - natural 10

11 Cyber Vulnerabilities 11

12 Physical Vulnerabilities Natural Hazards: hurricanes, snowstorms, earthquakes, floods System Failures: intentional events, equipment failures, human errors Earthquake Kobe 1995 Japan Major Floods 2002 Europe Hurricane Katrina 2005 USA 12

13 Vulnerabilities and Cascading Failures Indirect effects Physical/ Cyber Attacks Direct effects Electricity outages IT outages Oil & gas outages Water outages Traffic signal outages Telecom outages Business interruptions Delays in Emergency services 13

14 Critical Information Infrastructure Its role in containing Vulnerabilities and minimizing Cascading Failures 14

15 Why assuring CII is important CII is a means to monitor and control the system status and reduce vulnerabilities of other critical infrastructures Electric power systems, natural gas and water supply networks, refineries, etc. are monitored and controlled over an information network called Supervisory Control and Data Acquisition (SCADA) Early warning signals can be generated over this network so that other CI s can be protected 15

16 Information InfrastructureAssurance: An Evolving Discipline Critical Nation s safety and prosperity Pervasive Wherever IT-enabled services exist. Evolving Grows hand-in-hand with technology Cross-disciplinary Computer Science, Electrical Engineering, Business, Law, Math, Social Science, etc. Challenging Attackers, Failures and Targets Complex Interdependencies 16

17 Approaches to Critical Information Infrastructure Assurance Assurance aspects in CII design, evolution, operation and maintenance Business, management, and organizational issues Law, policy, and privacy issues 17

18 Assurance aspects in CII design, evolution, operation and maintenance There is a broad spectrum of security research across several academic disciplines and research groups. For example: Cryptology and cryptography Network security Internet security Intrusion detection Electronic commerce Secure software agents Multicast security Security for wireless systems 18

19 Business, management, and organizational issues Information security is a business and national security issue as well as a matter of management practice Security threats, i.e. fraud, abuse and errors from inside the organization, are potentially dangerous and likely to occur Need to educate employees about Latest developments in information security trends, i.e. viruses, spam, threats When and how to approach law enforcement agencies 19

20 Law, policy, and privacy issues Need the cooperation among government, private sectors and academic organizations Need the development of a broad strategy to promote national or regional awareness/partnership for critical infrastructure security Primary foci are, for example, owners and operators of critical infrastructures and other influential stakeholders in the economy Samples of government policies in the US Security Breach state laws Critical Infrastructure Information Act (2002) 20

21 An Example of Infrastructure Assurance SCADA Systems SCADA Supervisory Control and Data Acquisition Most power system controls are based on SCADA systems. Other applications are: (A) oil & gas operations, (B) water & waste water management systems. Power Gas Water 21

22 Components of a typical SCADA System An old technology with a critical importance SCADA components 1. Master Station (MS) 2. Remote Terminal Units (RTU) 3. Communication links between MS and RTU, e.g. LAN WAN VSAT TCP/IP Wireless Source: 22

23 Traditional SCADA systems on Independent Networks Each infrastructure has its unique & separate SCADA systems Electricity SCADA systems cannot piggyback on that of gas or water Gas network SCADA systems cannot run on other networks Similarly, electricity or gas SCADA systems cannot be shared with that of water supply systems Source: 23

24 Internet-based SCADA systems If a common backbone can be used among various infrastructures, there will be only small additional costs to build an individual SCADA system. Source: IEEE Power & Energy Magazine, March/April

25 Internet-based SCADA systems: Pros and Cons Advantages of using Internet-based SCADA: Wide-area connectivity and pervasive Routability Redundancy and hot standby Integration of IT with automation and monitoring networks Standardization Can login from anywhere in the world Disadvantages: Security concerns Reliability concerns 25

26 Research and Development in CIIA How to secure CII so that it can facilitate the protection and reduce vulnerability of other critical infrastructures 26

27 Thanks for Listening Name: Prof. Saifur Rahman Affiliation: Virginia Tech, USA Phone: (703) Web site: Questions or Comments? 27

Common Threats and Vulnerabilities of Critical Infrastructures

Common Threats and Vulnerabilities of Critical Infrastructures International Journal of Control and Automation 17 Common Threats and Vulnerabilities of Critical Infrastructures Rosslin John Robles 1, Min-kyu Choi 1, Eun-suk Cho 1, Seok-soo Kim 1, Gil-cheol Park 1,

More information

Considerations for Hybrid Communications Network Technology for Pipeline Monitoring

Considerations for Hybrid Communications Network Technology for Pipeline Monitoring Considerations for Hybrid Communications Network Technology for Pipeline Monitoring Craig Held White Paper April 2012 Abstract The concept of automation (and its corresponding technologies) is a primary

More information

Business Continuity White Paper

Business Continuity White Paper White Paper January 2011 Introduction In today s demanding business environment, few companies can afford having a key facility or branch location go off-line, or face service interruptions at headquarters.

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

THE FUTURE OF SMART GRID COMMUNICATIONS

THE FUTURE OF SMART GRID COMMUNICATIONS THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005 AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT

More information

DISASTER PLANNING AND RECOVERY

DISASTER PLANNING AND RECOVERY PLANNING IS THE KEY TO SUCCESSFUL DISASTER RECOVERY Source: US State Government Disaster Recovery Markets by Frost & Sullivan, A Global Growth Consulting Company DISASTER PLANNING AND RECOVERY In the aftermath

More information

Privacy and Security in Healthcare

Privacy and Security in Healthcare 5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical

More information

SCADA/Business Network Separation: Securing an Integrated SCADA System

SCADA/Business Network Separation: Securing an Integrated SCADA System SCADA/Business Network Separation: Securing an Integrated SCADA System This white paper is based on a utility example but applies to any SCADA installation from power generation and distribution to water/wastewater

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Broadband and VoIP Services

Broadband and VoIP Services Outage Reporting for Broadband and VoIP Services Mike Oldak VP & General Counsel Utilities Telecom Council NARUC Feb 5, 2012 Changing Communication Needs of Critical i Infrastructure Industries CII provide

More information

Business Continuity and Disaster Recovery the WAN is a Strategic Component

Business Continuity and Disaster Recovery the WAN is a Strategic Component Business Continuity and Disaster Recovery the WAN is a Strategic Component Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Business Continuity

More information

Critical Infrastructure Security and Resilience

Critical Infrastructure Security and Resilience U.S. Department of Homeland Security in partnership with the National Coordination Office for Space-Based Positioning, Navigation and Timing Critical Infrastructure Security and Resilience International

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

The Geospatial Dimensions of Critical Infrastructure and Emergency Response. White Paper Series. No. 1 - Infrastructure Interdependencies

The Geospatial Dimensions of Critical Infrastructure and Emergency Response. White Paper Series. No. 1 - Infrastructure Interdependencies The Geospatial Dimensions of Critical Infrastructure and Emergency Response White Paper Series No. 1 - Infrastructure Interdependencies Infrastructure Interdependencies 1 November 2008 INTRODUCTION In

More information

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005 SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n

Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing

More information

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012 Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives Initiation date: January 2012 Completion date: June 2012 Nomination submitted by: Samuel A. Nixon

More information

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE 1 CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE Gavin McLintock P.Eng. CISSP PCIP 2 METCALFE POWER STATION 16 April 2013 Sophisticated physical attack 27 Days outage $15.4 million

More information

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering Cyber Controls : A Critical Discipline of Systems 14 th Annual NDIA Systems San Diego, CA October 24-28, 2011 Bharat Shah Lockheed Martin IS&GS bharat.shah@lmco.com Purpose Provide an overview on integrating

More information

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

Redundancy for Corporate Broadband

Redundancy for Corporate Broadband Redundancy for Corporate Broadband WHITE PAPER December, 2012 Introduction Over the past twenty years, broadband service providers have been using different mediums to deliver their services. From wireless

More information

Research Imperatives

Research Imperatives Research Imperatives Areas of Research Needed in Information Security Julie J.C.H. Ryan, D.Sc. Assistant Professor The George Washington University What We Know Technology Fabulous research going on in

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Chapter 7 Information System Security and Control

Chapter 7 Information System Security and Control Chapter 7 Information System Security and Control Essay Questions: 1. Hackers and their companion viruses are an increasing problem, especially on the Internet. What can a digital company do to protect

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities

IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities IT Infrastructure Services White Paper Cyber Risk Mitigation for Smart Cities About the Author Abhik Chaudhuri Abhik Chaudhuri is a Domain Consultant with the Information Technology Infrastructure Services

More information

Observer Analyzer Provides In-Depth Management

Observer Analyzer Provides In-Depth Management Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,

More information

Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity)

Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity) Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity) Abstract Strong identity management enforced with digital authentication mechanisms

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

U.S. Gulf Coast Telecommunications Power Infrastructure Evolution since Hurricane Katrina. Alexis Kwasinski The University of Texas at Austin

U.S. Gulf Coast Telecommunications Power Infrastructure Evolution since Hurricane Katrina. Alexis Kwasinski The University of Texas at Austin U.S. Gulf Coast Telecommunications Power Infrastructure Evolution since Hurricane Katrina Alexis Kwasinski The University of Texas at Austin 1 Alexis Kwasinski, 2009 Overview» Introduction and motivation»

More information

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption White Paper Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption Today s Encryption Environments The number of cyber attacks targeting US organizational data has doubled over

More information

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Business Continuity and Disaster Recovery Planning from an Information Technology Perspective Presenter: David Bird, Director of Sales, Business Technology Consultant phone: 215-672-7100 email: dbird@quatro.com

More information

DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK

DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK ABSTRACT Dr. Sanjeev Dhull Associate Professor, RPIIT Karnal, Dept of Computer Science The DoS attack is the most

More information

Critical IT-Infrastructure (like Pipeline SCADA systems) require cyber-attack protection

Critical IT-Infrastructure (like Pipeline SCADA systems) require cyber-attack protection Critical IT-Infrastructure (like Pipeline SCADA systems) require cyber-attack protection Tobias WALK ILF Consulting Engineers GmbH Germany Abstract Pipeline Supervisory Control And Data Acquisition (SCADA)

More information

A COLLABORATIVE APPROACH TO INTERDEPENDENCY ANALYSIS OF REGIONAL CI

A COLLABORATIVE APPROACH TO INTERDEPENDENCY ANALYSIS OF REGIONAL CI A COLLABORATIVE APPROACH TO INTERDEPENDENCY ANALYSIS OF REGIONAL CI Irène CLOUTIER, M.A. Benoît ROBERT, ing., Ph.D. Luciano MORABITO, ing. Jr. Centre risque & performance (CRP) École Polytechnique de Montréal

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Hardware and Software Security

Hardware and Software Security Today, with the big advancement of technology and the need to share data globally at all time. Security has become one of the most important topics when we talk about data sharing. This means that the

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

PIPELINE ENGINEERING - Pipeline System Automation and Control - C. Bruce Warren and Mike S. Yoon PIPELINE SYSTEM AUTOMATION AND CONTROL

PIPELINE ENGINEERING - Pipeline System Automation and Control - C. Bruce Warren and Mike S. Yoon PIPELINE SYSTEM AUTOMATION AND CONTROL PIPELINE SYSTEM AUTOMATION AND CONTROL C. Bruce Warren and Mike S. Yoon BCT Group and Yoon Consulting Keywords: SCADA, RTU, Communications, Data Management, HMI, Alarm, Security, Measurement, Flow Meters,

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Public Private Partnerships and National Input to International Cyber Security

Public Private Partnerships and National Input to International Cyber Security Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,

More information

White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks

White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks White Paper April 2006 Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks According to a recent Harris Interactive survey, the country s leading business executives consider

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

Secure Access Solutions for the Petroleum Industry. Secure. Easy. Protected. Access.

Secure Access Solutions for the Petroleum Industry. Secure. Easy. Protected. Access. for the Petroleum Industry Secure. Easy. Protected. Access. Cybersecurity A Growing Concern for Oil Companies Oil and gas companies utilize Supervisory Control and Data Acquisition Systems (SCADA) to control

More information

September 20, 2013 Senior IT Examiner Gene Lilienthal

September 20, 2013 Senior IT Examiner Gene Lilienthal Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank

More information

Claes Rytoft, ABB, 2009-10-27 Security in Power Systems. ABB Group October 29, 2009 Slide 1

Claes Rytoft, ABB, 2009-10-27 Security in Power Systems. ABB Group October 29, 2009 Slide 1 Claes Rytoft, ABB, 2009-10-27 Security in Power Systems October 29, 2009 Slide 1 A global leader in power and automation technologies Leading market positions in main businesses 120,000 employees in about

More information

PATTERN MATCHING OF LIVE DATA TO IMPLEMENT PROACTIVE NETWORK MANAGEMENT

PATTERN MATCHING OF LIVE DATA TO IMPLEMENT PROACTIVE NETWORK MANAGEMENT PATTERN MATCHING OF LIVE DATA TO IMPLEMENT PROACTIVE NETWORK MANAGEMENT Eur Ing Steve Mustard, Product Manager, LogicaCMG Dr Mark Thornton, Solutions Director, Helveta Abstract Supervisory Control And

More information

Public Safety and Homeland Security. National Broadband Plan Recommendations

Public Safety and Homeland Security. National Broadband Plan Recommendations Public Safety and Homeland Security National Broadband Plan Recommendations Nationwide Interoperable Public Safety Wireless Broadband Network Broadband Network Strategy Vision: For significantly less then

More information

How Secure is Your Enterprise Information System?

How Secure is Your Enterprise Information System? Session 1658 How Secure is Your Enterprise Information System? O. Geoffrey Egekwu College of Integrated Science & Technology James Madison University Abstract The enterprise computer systems that control

More information

SMALL BUSINESS. the basics. in telecommunications solutions

SMALL BUSINESS. the basics. in telecommunications solutions SMALL BUSINESS the basics in telecommunications solutions 1 2 Mobility Innovation, transformation and the cloud Security and business continuity At AT&T, we understand the unique needs that small businesses

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

A model for evaluating the reliability of computational systems disaster recovery plans

A model for evaluating the reliability of computational systems disaster recovery plans Risk, Reliability and Societal Safety Aven & Vinnem (eds) 2007 Taylor & Francis Group, London, ISBN 978-0-415-44786-7 A model for evaluating the reliability of computational systems disaster recovery plans

More information

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125. When Disaster Strikes Are You Prepared?

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125. When Disaster Strikes Are You Prepared? RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125 When Disaster Strikes Are You Prepared? Copyright Materials This presentation is protected by US and International Copyright laws.

More information

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain 1. What is the most common planned performance duration for a continuity of operations plan (COOP)? A. 30 days B. 60 days C. 90 days D. It depends on the severity of a disaster. 2. What is the business

More information

Managing business risk

Managing business risk Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success

More information

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007 SECURING AN INTEGRATED SCADA SYSTEM Network Security & SCADA Systems Whitepaper Technical Paper April 2007 Presented by: Scott Wooldridge Managing Director of Oceania Citect 1 Abstract This paper discusses

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests

More information

Ecom Infotech. Page 1 of 6

Ecom Infotech. Page 1 of 6 Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

The Internet Working for Consumers

The Internet Working for Consumers The Internet Working for Consumers 1 How the Internet works The Internet and its key applications email, the World Wide Web and file transfers provide people all over the world with access to information,

More information

System Solutions. Industry-Leading Expertise and Field-Proven Technologies Delivering Innovative Wireless System Solutions

System Solutions. Industry-Leading Expertise and Field-Proven Technologies Delivering Innovative Wireless System Solutions System Solutions Industry-Leading Expertise and Field-Proven Technologies Delivering Innovative Wireless System Solutions Innovative Wireless System Solutions The System Solutions Group of Cooper Bussmann

More information

E-Business, E-Commerce

E-Business, E-Commerce E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson Introduction to Information Systems Explain the differences between extranets and intranets as well as show how organizations utilize

More information

Security issues in Voice over IP: A Review

Security issues in Voice over IP: A Review www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

How to Secure Your Environment

How to Secure Your Environment End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge

More information

End-to-end technology solutions and services

End-to-end technology solutions and services System solutions End-to-end technology solutions and services Visit the website to learn more about Eaton wireless and wired solutions Industry-leading expertise and proven technology deliver innovative,

More information

Network Security and the Small Business

Network Security and the Small Business Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,

More information

Secure Networking for Critical Infrastructure. Ilan Barda March 2014

Secure Networking for Critical Infrastructure. Ilan Barda March 2014 Secure Networking for Critical Infrastructure Ilan Barda March 2014 RADiFlow as part of the RAD Group The Access Company Secure Ruggedized Communication Solutions Wireless Mobile Backhaul Group Distributor

More information

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards A Concise Model to Evaluate Security of SCADA Systems based on Security Standards Nasser Aghajanzadeh School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran Alireza Keshavarz-Haddad

More information

EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH

EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH OIOS conducted an audit of information and communications technology (ICT) governance

More information

ISACA rudens konference

ISACA rudens konference ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial

More information

Modern Accounting Information System Security (AISS) Research Based on IT Technology

Modern Accounting Information System Security (AISS) Research Based on IT Technology , pp.163-170 http://dx.doi.org/10.14257/astl.2016. Modern Accounting Information System Security (AISS) Research Based on IT Technology Jiamin Fang and Liqing Shu Accounting Branch, Jilin Business and

More information

5 Tools For Passing a

5 Tools For Passing a 5 Tools For Passing a 4530 Plank Rd., Ste. 111, Fredericksburg, VA 22407 3 Health Insurance Portability and Accountability Act 4 Health Information Technology for Economic and Clinical Health Act 4 5 1

More information

2007 AT&T Business Continuity Study U.S. NATIONAL Results

2007 AT&T Business Continuity Study U.S. NATIONAL Results 2007 AT&T Business Continuity Study U.S. NATIONAL Results Methodology The following results are based on a telephone survey of 1,000 Information Technology (IT) executives in 10 U.S. metropolitan/regional

More information

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security A Holistic Security Risk Management Approach www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security This white paper discusses current

More information

Feature. SCADA Cybersecurity Framework

Feature. SCADA Cybersecurity Framework Feature Samir Malaviya, CISA, CGEIT, CSSA, works with the Global Consulting Practice-GRC practice of Tata Consultancy Services and has more than 17 years of experience in telecommunications, IT, and operation

More information

How Secure is Your SCADA System?

How Secure is Your SCADA System? How Secure is Your SCADA System? Charles Drobny GlobaLogix, Inc. Houston, TX, USA Our Industry is a Target 40% of cyber attacks on Critical Infrastructure targets are aimed at the Energy Industry The potential

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

2007 AT&T Business Continuity Study HOUSTON Results

2007 AT&T Business Continuity Study HOUSTON Results 2007 AT&T Business Continuity Study HOUSTON Results Methodology The following results are based on a telephone survey of 100 Information Technology (IT) executives in the Houston metropolitan area. The

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere

More information

Cybersecurity Training

Cybersecurity Training Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/web2014/cybetrn Expert-led training

More information

Building more resilient and secure solutions for Water/Wastewater Industry

Building more resilient and secure solutions for Water/Wastewater Industry Building more resilient and secure solutions for Water/Wastewater Industry Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Copyright 2010 Rockwell Automation, Inc. All rights reserved. 1 Governmental

More information

EHRs and Information Availability: Are You At Risk?

EHRs and Information Availability: Are You At Risk? May 2006 Issue EHRs and Information Availability: Are You At Risk? The EHR initiative is changing the face of disaster and the nature of prevention planning. By Jim Grogan On April 27, 2004, the age of

More information

1.5 Distributed Systems

1.5 Distributed Systems 1.5 Distributed Systems A network, in the simplest terms, is a communication path between two or more systems. Distributed systems depend on networking for their functionality. By being able to communicate,

More information

Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative

Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative November 2014 Disclaimer Current SCADA Vulnerability Factors Industrial Control Systems 101 Proposed Countermeasures

More information