Cyber Security Practical considerations for implementing IEC 62351
|
|
|
- Marvin Johnson
- 9 years ago
- Views:
Transcription
1 1. Introduction Cyber Security Practical considerations for implementing IEC Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB Switzerland Two trends are currently changing substation automation systems: IEC and the need for increased cyber security. IEC has gained global acceptance by both vendors as well as customers. Cyber security on the other hand has quickly become one of the most dominant topics for control systems in general and electrical utilities in particular. The combination of the two, securing IEC based communications, has been one of the goals of the recently published technical specification IEC In the authors view IEC is overall a good starting point and will be the future standard to help secure IEC communication. However, there are some shortcomings of the current standard and some challenges that need to be addressed before IEC can be implemented and gain wide acceptance. This paper will highlight the challenge of addressing secure communication in the substation real-time environment, complying with the IEC real-time specifications. The major difficulties are to reach the performance defined in IEC for GOOSE and SV data with today s proposed technical specification defined for IEC part 6. In chapter 2, we will give a short overview about the structure of IEC as well as the detailed performance requirements for the various data types. Chapter 3 will present an introduction of the IEC standard including the used methods to secure the IEC communication. Chapter 4 will then show the major implementation issues of IEC part 6. Chapters 5 and 6 highlight two of the main remaining challenges: interoperability and manageability of security solutions. This paper focuses on IEC61850 based systems, security, however, must be addressed for all computer systems and communication. Most of the challenges mentioned in this paper are not limited to IEC61850 based systems, but are general in nature. Even system based on serial communications can not work properly without any security measures. 2. IEC Overview IEC is the first and only global standard that considers all communication needs within the substation automation environment. The standard defines strict interoperability rules between functions and devices, independent of the device manufacturer, providing protection, monitoring, control and automation. IEC was published as a standard by IEC in fourteen parts between 2003 and 2005 [1]. In the meantime this standard has gained global acceptance and several thousands of substations worldwide have been energized. The standardization activity has reached a next step and the Edition II of IEC should be available by end of Due to the fact that the technical specification IEC is not jet finalized, security is not finally addressed in IEC Edition II but it will come in a later step. A key feature of IEC is that it separates the application from the communication by means of an abstract interface. A domain-specific, object oriented function and device model describes the application data with all services needed. The functions can be allocated freely to different devices. As shown in Figure 1 the stack, selected from mainstream communication technology, comprises MMS (Manufacturing Message Specification) over TCP/IP and Ethernet. The object model is mapped in a standardized way to the MMS application layer, but time critical messages pass directly to the link layer of Ethernet. Specific performance classes are defined for the different communication methods.
2 Figure 1: IEC61850 Communication Services Overview Goose messages like trip, interlocking and inter-trip signals belong to the fast messages which should be transmitted within 10ms (Performance Class P1). For some signals event within 3ms (Performance Class P2/3) are specified. For Sampled Values (SV) the IEC standard defines several performance classes for raw data messages from digitizing transducers and digital instrument transformers. Figure 2: Performance classes for raw data messages used for metering As show in Figure 2 the performance classes starts with class M1 (sample rate of 1,5 khz) refers to revenue metering with accuracy class 0.5, performance class M2 (sample rate of 4 khz) refers to revenue metering with accuracy class 0.2 and performance class M3 (sample rate of 12 khz) refers to quality metering. Therefore the devices have to process the raw data each 666 us in performance class M1, each 250 us in performance class M2 and each 83 us in performance class M3. For Client - Server communication there are no explicit timing requirements defined but nevertheless IEC clients have to receive several hundreds of event from the various protection and control IED s. Any security standard that attempts to secure IEC based traffic must take these performance requirements into account. The fast response times that are required for some of the communication types coupled with the limited processing capabilities of some of the device (e.g. IEDs) present a clear challenge. We will look at these challenges in the following sections and analyze if and how IEC addresses them.
3 3. Introduction to IEC The scope of the IEC series is information security for power system control operations. Its primary objective is to undertake the development of standards for security of the communication protocols defined by IEC TC 57, specifically the IEC series, the IEC series, the IEC series, the IEC series, and the IEC series. The IEC standard is currently divided into 8 parts. As shown in Table 1 parts 1-6 are officially categorized as TS (technical specification) and released by IEC. Parts 7 and 8 are currently under development, with the current state of part 7 being Circulated Draft Technical Specification (CDTS) and Part 8 being Draft approved for Committee Draft with Vote (ACDV). In addition two new work item proposals (NWP) exist to address "Key management (certificate handling) and Security Architecture. Part Title Status 1 Communication network and system security Introduction to security issues 2 Glossary of terms TS 3 Security for profiles including TCP/IP TS 4 Profiles including MMS TS 5 Security for IEC and derivatives TS 6 Security for IEC TS 7 Network and system management (NSM) data object models TS CDTS 8 Role-Based Access Control ACDV Key Management (Certificate Handling) Security Architecture Table 1: Overview of IEC standard series NWP NWP In this paper we will focus mainly on parts 3, 4, and 6, with an emphasis on part 6 because it defines specific requirements for IEC based communications. As discussed in the previous section IEC communications can be divided into client server (i.e. MMS) and real time (i.e. GOOSE and Sample Values) communications. IEC provides different methods for securing the different communication types: MMS (IEC ): securing MMS traffic is done on the application and the transport level. Peer authentication is performed on the application level by carrying authentication information in the ACSE AARQ and AARE PDUs [2]. Authentication information comprises a X.509 encoded certificate, a time stamp and the digitally signed time value. For security on the transport layer IEC refers to TLS [4]. It specifies to us port 3782 for secure communications instead of standard port 102. It also specifies a set of mandatory and recommended cipher suites to be used, at a minimum TLS_DH_DSS_WITH_AES_256_SHA 1 and TLS_DH_RSA_WITH_AES_128_SHA 2 must be supported. GOOSE / Sampled Values: security of real-time traffic is limited to message authentication, i.e. use encryption is not specified. Message authentication is defined by extending the GOOSE / SV PDUs with an authentication value that is calculated by signing a SHA256 hash using RSA [3]. Certificate exchange is not done as part of the messages; X.509 encoded certificates must be pre-installed on the receiving nodes. 1 Specified in IEC Specified in IEC
4 Protocol extensions to the affected communication standards are required in order to actually be able to implement IEC IEC does not yet include these necessary extensions in its current release. The upcoming Edition II will also not completely cover this because IEC is not yet finalized. 4. Performance issues in IEC Part 6 Performance impacts should always be considered for any communication infrastructure before introducing encryption and / or message authentication. This is particularly true if asymmetric cryptography, real-time traffic or systems with limited resources are involved. In case of securing GOOSE and SV using IEC all three constraints apply: Embedded devices such as Protection & Control IEDs or RTUs typically have little computational power (as compared to personal computers or servers) and only a (small) portion can be made available to functionality other than protection and control. In addition, changing or upgrading hardware is not an easy task for embedded devices that potentially have a very long lifetime. Security solutions for embedded devices should therefore not require major hardware changes. For both GOOSE and SV strict real-time constraints exist 3ms response time for GOOSE and sampling rates up to 12 khz for Sampled Values. IEC 62351, as of today, specifies the use of digital signatures (asymmetric cryptography using RSA) to authenticate broadcast GOOSE and SV packets We focus our attention in this discussion on the performance impact on securing real-time traffic as specified in IEC part 6, in particular the signing of the hash value using the RSA algorithm. The calculation of the SHA256 hash value as well as the verification of the digital signature is considerably less CPU intense and therefore omitted for the moment. In a first step implementing digital signatures in software was analyzed. The first results quickly showed that a software implementation of digital signatures would not meet the real-time requirements with today s existing IED s hardware. Table 2 shows the performance results of implementing RSA signing on two different platforms using C. The reader will notice that even though the processor and memory available on both platforms are exceeding those of typical embedded devices the times needed for a single digital signature are at least 1.5 milliseconds, i.e. half of the minimum response time for GOOSE messages. For a key length of 1024 bits, which can be considered minimum best practice, calculating the signature took at least 4 milliseconds. Key-size Pentium M 1.7 GHz (1GB RAM) Intel Core GHz (2 GB RAM) ms 4 ms ms 1.5 ms Table 2: Time use for RSA signature operations A more promising approach that has been followed after the first study was to base cryptographic operations on special purpose hardware. However, the results from the hardware implementation could not meet the strict real-time constraints of GOOSE and SV. Even with an increment of several hundred dollars in hardware production costs per device the real-time performance of 3ms for GOOSE massages and the support for 12 khz SV sampling rates remain very difficult to achieve. FPGA Platforms Table 3 shows a summary of the performance measures using FPGA based solutions. The overhead for message authentication (i.e. calculation of the hash and RSA signing by sender, calculation of hash and verification of signature by recipient) is between 2 and 4 milliseconds. Although at a first glance, 2 milliseconds seem to be acceptable using two thirds of the overall allowed response time is not adequate considering the time that would be left for other calculations. Additionally the 12 khz sampling rate for SV requires messages to be processed within 83 microseconds, more than an order of magnitude less than needed for sending of messages (Note that the processing times for signing GOOSE and SV messages are the same). Our results where confirmed by [5] and others that all
5 needed 3 milliseconds or more to perform an RSA signature with a key length of 1024 bits using FPGA. FPGA GOOSE sending GOOSE Receiving Total Processing Clock 100 MHz ms ms ms 200 MHz ms ms 2.036ms Table 3: Time measurement for securing GOOSE with FPGA ASIC Platforms ASIC platforms are as expected significantly faster than FPGA. However, only a handful of solutions exist today that are capable of meeting the requirements. The three best solutions that were found calculate a 1024 bit private key RSA signature in 0.16, 0.34, respectively 0.95 milliseconds, making only two of them real options for applying IEC part 6 to GOOSE. Since none of them are capable of dealing with the maximum sampling rate of 12 khz for SV and since these top solutions come at a significant cost ASIC platform can currently not be considered a feasible solution for implementing IEC part 6. RSA crypto chips The last hardware solution that was evaluated were specialized crypto-chips. The top in class chips that were looked at are capable of calculating a single RSA signature with a key length of 1024 bits in as little as 23.8 microseconds, which in theory would even allow supporting 12 khz sampling rates. However, integrating such crypto-chips would require a major redesign of the overall hardware, including possibly dedicated external memory, complex interface glue logic or cooling systems. For future systems this is certainly possible, but for short or mid-term solutions not feasible. Based on the evaluation the conclusions are clear: authentication of GOOSE and SV broadcast messages using digital signatures is not feasible with today s embedded devices, even without considering cost. A hardware implementation today would not meet SV real-time requirements. Protection and control IED s must handle between 100 and 300 GOOSE packets per second while receiving SV packets at the same time (4 000 Packets / sec), and while running their protection algorithms and doing other tasks such as refreshing user interfaces, logging, time synchronization etc. These findings have been presented to TC 57 WG 15 in October 2009 and convinced the working group that another approach is needed. A solution using symmetric cryptography (using of HMACs) was suggested and IEC will now be revised accordingly, with a first draft targeted for the first half of Interoperability One of the most important aspects for the acceptance of IEC 62351, and any other security standard, is interoperability - interoperability between implementations of different vendors as well as interoperability of new solutions with the installed base, i.e. backward compatibility. While the first, interoperability of implementations of different vendors, might seem trivial with having a standard there are some considerations that must be made. Backward compatibility on the other hand seems difficult at a first look because security mechanisms such as encryption seem to require all entities to support the new functionality. Interoperability of vendor implementations Achieving interoperability with security related standards imposes new challenges extending beyond pure definition and implementation of communication protocols and interfaces. Interoperability of security protocols is also depending on the use of standardized cryptographic algorithms. Implementations of SSL / TLS for example, while being fully compliant with the standard itself, are only capable of setting up a secure session if the same crypto suites are supported. IEC addresses
6 this by mandating support of TLS_DH_DSS_WITH_AES_256_SHA and TLS_DH_RSA_WITH_AES_128_SHA at a minimum. Backward compatibility Introducing new technologies can be facilitated be allowing for backward compatibility and thus by allowing a stepwise introduction of the new technology. IEC specifies that for securing MMS traffic security mechanisms can be disabled for devices for the purpose of compatibility. This allows IEC compliant devices to be installed in an existing infrastructure without the use of security. Therefore, legacy equipment can be replaced by new devices gradually without having to replace or upgrade the whole system at once. However, it is clear that unless all devices support IEC 62351, encryption cannot be used. The obvious risk of never using security features must be taken seriously, especially if no governmental standard explicitly demands these features. For securing GOOSE and SV backward compatibility has also been addressed by IEC First, receiving devices that do not support IEC can simply ignore the security extensions of IEC in the PDUs and process messages as before. If the receiving device supports IEC but the sending device does not, then the recipient can be configured to accept unauthenticated messages from the particular sender. 6. Manageability Besides the interoperability of devices the second major hurdle to overcome is the usability and manageability of security. Experience has shown that security is often compromised if it cannot be used, managed and maintained easily. Personnel responsible for the operation of automation and control systems are typically not security experts and they will likely find workarounds if security presents too much of a challenge. Examples are default passwords that are not changed or firewalls that are not configured correctly and not properly maintained. In the case of IEC the main challenge for the use of asymmetric cryptography is the handling of certificates and certificate revocation lists. While the standard defines in technical detail how certificates shall be used and what format they shall have, the management of them is (currently) not addressed. It starts with generating and installing certificates. End-users often do not have the knowhow and / or infrastructure (i.e. a certificate authority) to generate certificates for all individual devices. Major providers of certificates have so far not been much involved with the electric industry and do not have a business model for it, i.e. addressing the issue of needing thousands of certificates within a single organization. Once the certificates have been installed technical solutions are needed to prevent certificate expiration, which could have severe consequences. End-users must thus receive automated notifications in due time before a certificate expires. Finally yet importantly, proper use of certificates also depends on technical solutions for handling certificate revocation lists (CRL). With IED s typically not being directly connected to external networks updating CRLs is not trivial and endusers must be presented with solutions and architectures that allow a timely handling of any changes in CRLs. [6] describes in detail the major challenges associated with certificate handling in industrial automation and control systems. The two new work item proposals "Key management (certificate handling) and Security Architecture currently under discussion in TC57 WG15 will hopefully address the issues of using, managing and maintaining certificates. In the author s view, it would be a big and important step that increases the acceptance and usability of IEC Summary TC57 WG15 has started to address the security issues for communication protocols defined by IEC TC 57, specifically the IEC series, the IEC series, the IEC series, the IEC series, and the IEC series. Some parts of this technical specification are finalized while work on others has just stared. The performance evaluation done for IEC part 6 showed that both software as well hardware solutions could not satisfy the performance requirements defined in IEC for GOOSE and SV data. TC57 WG15 has accepted these findings and is now looking at a new approach, which will likely use symmetric cryptography. TC57 WG15 is currently also addressing certificate handling, which in the authors view is a key challenge to overcome before IEC can gain wide acceptance. The
7 very good initiative of TC57 WG15 must be driven further, addressing the raised issues, so that security can become an integrated part of IEC While this paper focused on IEC to help secure IEC based substations there are many other security mechanisms that can and must be used to improve the overall security architecture of modern substation automation systems. The fact that IEC61850 uses mainstream communication technology, i.e. Ethernet and TCP/IP, makes a wide variety of solutions available. Firewalls for examples can protect the security perimeter and VPN technology can build up secure channels to remote centers. Access to systems and devices can and must be further protected by using individual user authentication and authorization coupled with detailed logging of all user activity. Literature [1] IEC Communication Networks and Systems in Substations, 14 parts: IEC x-y IEC: , [2] ISO/IEC Information technology -- Open Systems Interconnection -- Connection-oriented protocol for the Association Control Service Element: Protocol specification, 1996, ISO [3] Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1,RFC 3447, February 2003 [4] The TLS Protocol Version 1.0, RFC 2246, 1999 [5] D. Amanor, C. Paar, J. Pelzl, V. Bunimov, M. Schimmler Efficient hardware architectures for modular multiplication on FPGAs, International Conference on Field Programmable Logic and Applications, 2005 [6] S. Obermeier, Hadeli, R. Schierholz, R. Enderlein, Certificate Management for Embedded Industrial Devices, ICSJWG, 2009 Abstract Two trends are currently changing substation automation systems: IEC and the need for increased cyber security. IEC has gained global acceptance by both vendors as well as customers. Cyber security on the other hand has quickly become one of the most dominant topics for control systems in general and electrical utilities in particular. The combination of the two, securing IEC based communications, has been one of the goals of the recently published technical specification IEC The acceptance of IEC will largely depend on its impact on interoperability, performance, and manageability. This paper will present performance evaluations that show the limitations on the technical feasibility of the current IEC documents. The authors will also give insights on how interoperability and manageability are affected. Finally the paper will show how some of the current shortcomings should be addressed in the future. Authors Information Markus Braendle Division Cyber Security Manager, Power Systems Division, ABB Markus is globally responsible for all aspects of cyber security within ABB's Power Systems division. He heads the Power Systems Security Council which defines, develops, and implements the security strategy for all products and systems within the Power Systems division. Markus is an active member of several security standardization efforts and working groups, e.g., IEEE PSRC H13, Cigre B5.38, ICSJWG or NIST SmartGrid CSCTG, and a recognized member in the industrial control system security community. Markus holds a doctoral degree in Computer Science from the Federal Institute for Technology in Zurich, Switzerland.
8 Frank Hohlbaum, Global Security Manager Power System Substations, ABB Frank is globally responsible for all aspects of cyber security within ABB s Power System Substations and drives the security activities in this business unit. He is an active member of the Power System Security Council and represents the business unit Power System Substations. Frank Hohlbaum joined ABB Inc. in 1996 and has 14 years of experience in substation automation. He graduated from University in Furtwangen (Germany) with Bachelor of Sciences concentrated in software and electrical technologies. Additionally he did post graduated studies in business administration at the University in Zurich (Switzerland). Fernando Alvarez Technical Security Architect, Power Systems Substations, ABB Fernando is the chief architect for defining security architecture and development strategies for ABB s Power Systems Substations. As a Security expert, he leads the technical group related to security for Substation Automation Products. Fernando is an active member of TC57 WG15. A technologist with vast experience in software and system design and implementation, he graduated from California State University, Long Beach with Bachelors in Computer Science Engineering.
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
D2-02 B11. Cyber Security requirements and related standards for Substation Automation Systems
CONSEIL INTERNATIONAL DES GRANDS RESEAUX ELECTRIQUES INTERNATIONAL COUNCIL ON LARGE ELECTRIC SYSTEMS http: //www.cigre-d2.org STUDY COMMITTEE D2 INFORMATION SYSTEMS AND TELECOMMUNICATION 2011 Colloquium
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
Security Issues for the Power Automation Industry in Central/South America. Juan Esteban Hoyos Pareja Timothy X. Brown Mark Dehus
Security Issues for the Power Automation Industry in Central/South America 1 Juan Esteban Hoyos Pareja Timothy X. Brown Mark Dehus 1 2 A Practical Attack on Cyber-infrastructure University of Colorado
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, 2015. Ian Silvester DNA Manager.
DNA White Paper Prepared by Ian Silvester DNA Manager Danwood Group Service Noble House Whisby Road Lincoln LN6 3DG Email: [email protected] Website: www.danwood.com\dna BI portal: https:\\biportal.danwood.com
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...
Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6
Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明
Spirent Abacus SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 1 1. TLS Interview (Transport Layer Security Protocol) (1) TLS Feature Introduction: 1. TLS is a successor of Secure Sockets Layer (SSL), a cryptographic
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
IEC 61850: Communication Networks and Systems in Substations
IEC 61850: Communication Networks and Systems in Substations Sistemi e strumenti per l'automazione, A. Flammini, AA2011-2012 Background I: Power Grid Sistemi e strumenti per l'automazione A. Flammini,
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN By Paul Stevens, Advantech Network security has become a concern not only for large businesses,
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
Web Security: Encryption & Authentication
Web Security: Encryption & Authentication Arnon Rungsawang [email protected] Massive Information & Knowledge Engineering Department of Computer Engineering Faculty of Engineering Kasetsart University, Bangkok,
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces
Introduction An Overview of the D Industrial Router Product Line Secure Access with VPN Technology in Industrial Networks Outlining the IPsec and VPN capabilities available in the GarrettCom D series of
Implementing SSL Security on a PowerExchange 9.1.0 Network
Implementing SSL Security on a PowerExchange 9.1.0 Network 2012 Informatica Abstract This article describes how to implement SSL security on a PowerExchange network. To implement SSL security, configure
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved
NCP Secure Client Juniper Edition Service Release: 9.30 Build 102 Date: February 2012 1. New Features and Enhancements The following describe the new features introduced in this release: Visual Feedback
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues
NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:
Secure SCADA Communication Protocol Performance Test Results
PNNL-17118 Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support.
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support. 601DataPower_Security_NIST.ppt Page 1 of 17 This presentation discusses three new security features in the WebSphere DataPower
Thanks, But No Thanks
Thanks, But No Thanks Current Cryptographic Standards Are Sufficient for Software Dan Shumow MSR Security and Cryptography Group Microsoft Research Introduction Disclaimer: I am a Software Developer, so
Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi
Introduction Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi Introduction Comparing Secure Hypertext protocol (S-HTTP) to Secure Socket Layer (SSL) Agenda Waheed opens the presentation introduces
Cyber security measures in protection and control IEDs
Cyber security measures in protection and control IEDs K. Hagman 1, L.Frisk 1, J. Menezes 1 1 ABB AB, Sweden [email protected] Abstract: The electric power grids and power systems are critical
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
Secure Machine to Machine Communication on the example of Smart Grids
Corporate Technology Secure Machine to Machine Communication on the example of Smart Grids 10.ITG Fachtagung Zukunft der Netze 2011, Steffen Fries Siemens AG, CT T, GTF IT Security : +49 89 636 53403 :
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
Consulting International
NIST Cyber Security Working Group (CSWG) NISTIR 7628: NIST Guidelines for Smart Grid Cyber Security Frances Cleveland Xanthus Consulting International Xanthus Consulting International [email protected]
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Cyber Security for Substation Automation, Protection and Control Systems
Cyber Security for Substation Automation, Protection and Control Systems Steven Kunsman, Markus Braendle ABB Inc. [email protected] USA 1. Introduction Substation automation, protection and control
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture
IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
Wireless Mobile Internet Security. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2330593/ Wireless Mobile Internet Security. 2nd Edition Description: The mobile industry for wireless cellular services has grown
ATSC Standard: ATSC Security and Service Protection Standard
ATSC Standard: ATSC Security and Service Protection Standard Doc. A/106 28 September 2015 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 1 The Advanced Television
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
NetScaler 2048-bit SSL Performance
WHITE PAPER NetScaler Performance NetScaler 2048-bit SSL Performance July 2010 www.citrix.com/netscaler Overview NetScaler 9.2 boosts SSL performance with 2048-bit keys 5X to meet the needs of customers
Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -
Security - 1 - OPC UA - Security Security Access control Wide adoption of OPC SCADA & DCS Embedded devices Performance Internet Scalability MES Firewalls ERP Communication between distributed systems OPC
2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones
보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 3호 2011년 6월 Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones Rosslin John Robles 1) and Tai-hoon Kim 2) Abstract
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Benefits of Network Level Security at the RTU Level. By: Kevin Finnan and Philippe Willems
By: Kevin Finnan and Philippe Willems Introduction New security capabilities at the remote terminal unit (RTU) level are substantially easing implementation of cyber security measures in SCADA systems.
Authentication Applications
Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
CGHub Client Security Guide Documentation
CGHub Client Security Guide Documentation Release 3.1 University of California, Santa Cruz April 16, 2014 CONTENTS 1 Abstract 1 2 GeneTorrent: a secure, client/server BitTorrent 2 2.1 GeneTorrent protocols.....................................
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David A. Cooper NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
RSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager
Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager About our Cryptographic and Security Testing Laboratory Bringing together a suite of conformance testing
Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities
TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons
Communication Networks. We are securing the past in a fast moving future. FOX605 multiservice platform.
Communication Networks We are securing the past in a fast moving future. FOX605 multiservice platform. FOX605 Overview Operational networks of utilities demand real-time communication across the complete
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
GS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
1. Security Requirements for Human Users and Software Applications Which Interact with Automation Systems
Suggestions for What Security Topics to Include in Standards and Specifications Frances Cleveland ([email protected]) 1 1 1. Security Requirements for Human Users and Software Applications
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
