Integrating information security requirements in critical infrastructures: smart metering case. Layla AlAbdulkarim* and Zofia Lukszo

Size: px
Start display at page:

Download "Integrating information security requirements in critical infrastructures: smart metering case. Layla AlAbdulkarim* and Zofia Lukszo"

Transcription

1 Int. J. Critical Infrastructures, Vol. 6, No. 2, Integrating information security requirements in critical infrastructures: smart metering case Layla AlAbdulkarim* and Zofia Lukszo Section Energy and Industry Faculty of Technology, Policy and Management Delft University of Technology P.O. Box 5015, 2600 GA, Delft, The Netherlands *Corresponding author Abstract: In recent years, critical infrastructures have witnessed rapid developments in the way their services are being implemented and delivered to consumers; this was instigated by the adaptation of the latest technologies in Information Technology (IT). Despite the evident advantages of such transformation, this lead to the emergence of new challenges facing these infrastructures such as preserving the security of the information generated and maintained by the IT systems supporting the operation of these critical infrastructures. An example of such a case is smart metering in the energy sector. In this article, we present an analysis of information security threats and their consequences, emphasising the importance of incorporating information security as nonfunctional requirements in the early stages of system development rather than an afterthought of the system implementation and deployment. We also present a four dimensional information security assurance model for the smart metering system; this model provides guidelines to designers of IT systems supporting the operation of critical infrastructures. Keywords: critical infrastructures; information security; smart metering. Reference to this paper should be made as follows: AlAbdulkarim, L. and Lukszo, Z. (2010) Integrating information security requirements in critical infrastructures: smart metering case, Int. J. Critical Infrastructures, Vol. 6, No. 2, pp Biographical notes: Layla AlAbdulkarim is a PhD candidate at the Energy and Industry group at the Delft University of Technology, the Netherlands. Her area of research is the assurance of information security in critical infrastructures. Dr. ir. Zofia Lukszo is an Associate Professor at Delft University of Technology, the Netherlands. She acquired her PhD from Eindhoven University of Technology, the Netherlands. Her research focuses on operations management, mainly in the process industry and infrastructure sectors. She has extensive experience in the application of mathematical modelling, optimisation and quality control in decision making at the operation and control level in the process industry. She is also a leader of the programme Intelligent Infrastructures within the international research programme of the Next Generation Infrastructures ( Copyright 2010 Inderscience Enterprises Ltd.

2 188 L. AlAbdulkarim and Z. Lukszo 1 Introduction Over the decades, the operation of critical infrastructures has witnessed rapid developments in both the quantity and quality of their offered services and in the way these services are being implemented and delivered to consumers. One of the major transformations in these infrastructures is the adaptation of the latest developments in the information and communication technologies. The rapid and ongoing developments over the past years in information and communication technologies have lead to the emergence of state-of-the-art Information Technology (IT) infrastructures which facilitate the manipulation, storage and transportation of enormous volumes of data and information. The level of IT involvement in these infrastructures varies in visibility from back-end systems and underlying infrastructure technologies to interactive user-friendly service endpoints. The incorporation of IT infrastructures as a vital component supporting critical infrastructures has introduced additional high-tech services, reshaped their services offered to consumers and improved their quality which, in turn, had a noticeable impact on the quality of daily life. The advantages of IT-based services go far beyond consumer satisfaction. In fact, the main motives are usually political which aim for economic, industrial and institutional impact. Examples of this can be seen in the energy sector where the concept of smart metering has recently been introduced. This offers a number of advantages such as providing consumers with more capabilities and services related to electricity consumption, monitoring and managing in an economic and industrial level seeing that smart metering is considered the basis for facilitating the distributed generation of energy and is able to reduce operational costs and improve efficiency. Nevertheless, despite these great advantages allowed by the support of IT infrastructures to critical infrastructures, the gain of these advantages is not without a few drawbacks. The dependability of critical infrastructures on IT infrastructures has introduced new challenges particularly in terms of preserving the security of the information and sustaining the integrity of the system. Information security is normally retrofitted in software systems in the sense that it is treated as an afterthought leading to a cycle of penetrating and patching the different parts of the system (Gilliam et al., 2003). Unfortunately, the IT system supporting smart metering is no exception. This can obviously result in a questionable level of security considering the unstructured and ad hoc manner in which security is being implemented. To avoid the consequences of information security breaches, the assurance of information security requires careful planning starting in the early stages of system development. This can be achieved by analysing threats and vulnerabilities of system components to clearly and thoroughly establish information security requirements which can contribute to alleviating risks and producing a system with high quality information security (Wilander and Gustavsson, 2005; Hassan et al., 2008). In this paper, we emphasise the importance of addressing information security from an early stage of system development by presenting an information security assurance framework for smart metering. The framework includes the following four dimensions against which we propose that information security must be assured: 1 time 2 system breadth

3 Integrating information security requirements in critical infrastructures system depth 4 system actors. This paper is organised as follows: In Section 2, we give an overview of the anatomy of the smart metering system. In Section 3, we present a number of the limitations and challenges facing the system. In Section 4, we give an analysis of information security threats and their consequences, whereas in Section 5, we present our information security assurance model. Section 6 concludes the paper and gives some directions for future researches. 2 Smart metering: technology and anatomy A smart metering system is an interdependence between energy and IT infrastructures. It consists of a number of distrusted components belonging to either of the two infrastructures, the collaboration of which brings the intended services to consumers. Smart metering systems have been receiving a lot of attention lately in the light of the recent roll out of a number of smart metering projects among the member states of the European Union (EU) (Deconinck, 2009; Santer, 2009; Moen, 2009; Jensen, 2009; Pavan, 2009). The motivation behind the adoption of smart metering differs from one country to another. In general, there are some common drivers that encourage the different governments to adopt the smart metering system within their respective countries. For example, within the new liberalised market structure, the introduction of smart metering was considered a prerequisite step to achieve the desired market competitiveness. In addition to that, smart metering is regarded as a means to meet the requirements of both the Kyoto Protocol and the EU energy efficiency directives, i.e., EU Directive 2006/32/EC 1 and EU Directive 2005/89/EC. 2 By putting the smart metering system in use, it is expected that, with proper feedback mechanisms, consumers will reduce their electricity usage as they become aware of their actual consumption. This, in turn, is expected to reduce the need to build more power plants and to expand the existing distribution networks. Furthermore, the system will provide more accurate information to grid operators regarding how to allocate electricity use (Smartgridnews.com, 2007). However, despite the numerous advantages gained by the smart metering system, there exists a number of serious issues which still needs to be addressed in order for the system to achieve its desired goals. For instance, it is still argued that the main driver behind the launch of smart metering is mostly due to the reduction of costs that are related to the operation of the system and electricity consumption (AlAbdulkarim and Lukszo, 2009). This is believed to prevent a full exploitation of the system as it obstructs a more inventive approach to designing the system s operation and functionality. Examples of other issues include lack of regulation, lack of standardisation, the absence of a means to provide consumers with proper and useful feedback, and the need for a more innovative approach to the system s development to ensure a maximum utilisation of the system s capabilities. However, aside from these issues, perhaps a very significant problem associated with the smart metering system is how to ensure and preserve the security of its information. This becomes crucial when considering the severe consequences of information security breaches of the system. The smart metering system

4 190 L. AlAbdulkarim and Z. Lukszo produces and maintains a massive amount of information and the violation of its confidentiality can lead to a wide spectrum of drastic consequences including financial, legal or, in some cases, an entire failure of the system. The main components of the smart metering system as illustrated in Figure 1 are described below. Figure 1 Main components of the smart metering system 2.1 Advanced metering infrastructure Smart metering installation A smart metering installation refers to the device installed at remote households which, among other tasks, keeps track of electricity, gas and water consumption in an advanced manner. A smart metre differs from a conventional one in the wide range of highly developed services that it offers such as remote activation/deactivation of connections and a two-way communication between the metre installation and service providers where the latter is extremely important due to the rising awareness of the significance of public engagement and interaction among involved parties as opposed to top-down communication where the public are treated as passive recipients rather than having a more active role (Owens and Driffill, 2008). The instruments used for the Dutch smart metering system must be in compliance with the requirements of the Metrology Act, the electricity metering code, and the gas metering conditions Data concentrators A data concentrator is a device that is usually located at substations to manage its data which is gathered from the different smart metres at remote households. Mainly, these data concentrators act as a link between metres and the rest of the components of the advanced metering infrastructure by assuming a store-and-forward role as they collect

5 Integrating information security requirements in critical infrastructures 191 data related to energy consumption from metres at remote households, transmit the data to control stations and supply the data to the billing system (Sustainable Buildings Smart Meters, 2008). In addition to that, data concentrators are capable of detecting and configuring newly installed smart metres and creating repeating chains for signal amplification if necessary (DC-100 Data Concentrator, 2008). In general, data concentrators automatically manage a portion of the infrastructure s functionality such as monitoring the operation of the power grid and smart metres in an ongoing basis, reporting disruptions and failures (Sustainable Buildings Smart Meters, 2008), and detecting and reporting of theft of electricity and tampering attempts at metres (DC-100 Data Concentrator, 2008). Data concentrators are not capable of accepting incoming calls from other components of the system; however, if a connection is dropped, the concentrators are capable of initiating and establishing contacts Central access servers A central access server is defined in the Netherlands Technical Agreement as a central application that takes care of the data collection, control and parameterization commands, and the centralized authorization for access to the metering installation. Each grid operator maintains a cluster of servers as part of the smart metering system operation. The servers can be roughly divided into three categories based on the applications they host. In addition to databases that store the system s data, these servers also host the different softwares and applications that are necessary for the operation of the system. Furthermore, these servers also act as web portals through which clients can access their profiles and can monitor their consumption rates for example Communication ports To facilitate communication among the system components and market players, the smart metering system has a number of ports through which information can flow. In principle, the NTA 8130 standard lists four ports, namely: P1, P2, P3 and P4 as illustrated in Figure 1. Throughout the literature, a fifth port, P0, which is located in the metre installation and is mentioned sometimes, is used for configuration purposes. Below, we give a brief description of each of the four main ports of the system as mentioned in the NTA 8130 standard: 3 Port P1 This is a read-only port that is mainly used to link the metering installation to an external device. Port P2 Through this port, the smart metering installation is linked to the grid operator s equipment up to four metering devices. Port P3 This two-way communication port is used to connect the metering installation to the central access servers through a series of intermediate nodes. Port P4 This port differs from the others in the sense that it is not located in the metering installation but rather on the Central Access Server (CAS) to which authorised market players are given access via this port.

6 192 L. AlAbdulkarim and Z. Lukszo 2.2 Information assets The information exchanged over the smart metering system varies in nature; it can take the form of standard messages, ad hoc messages with a maximum of 1024 characters or, simply, metre readings which can be daily, monthly or on-request readings. The metre readings are being stored in daily/monthly registers on the metering installation and sent to the CAS for storage in predefined time intervals. The smart metering system retains a massive amount of information which is either generated by the system or is necessary for its functionality; the main categories of this information are mentioned in later sections of this article. 2.3 Functionality In principle, smart metering systems can offer a wide range of services which vary from one provider to another. However, aside from the value added services, a minimum set of basic functionality strictly related to electricity and gas at the early stages of the system that must be satisfied by the system was defined in the NTA 8130 standard. 3 The main functions are listed in Table 1. These functions belong to grid operators, consumers, suppliers or sometimes to all of them. Table 1 Main functions delivered by the smart metering system Function Generates remotely readable real time metre readings either on a periodic basis or on demand. The readings indicate the amount of energy consumed or supplied to the system in case of decentralised generation. This helps in improving administrative processes. Facilitates promotion of energy saving awareness among consumers Enables safe and remote activation/deactivation of electricity and gas connections, either collectively or individually Enables remote electricity threshold changing Allows energy suppliers to work with differentiated tariffs Facilitates prepaid electricity Monitors distribution networks and generates alerts of service disruptions or fraud detection Measures and detects power quality remotely Allows online interaction between suppliers and consumers Actor(s) involved Consumer Consumer Grid operator Grid operator Grid operator, Consumer Consumer Grid operator Grid operator Grid operator, consumer, supplier From a technical perspective, the system needs to provide a number of functionalities; the most important of which is the two-way communication network that supports the functionality listed in Table 1 (DC-1000 Data Concentrator, 2008). To carry out these functions among others, the system facilitates the exchange of messages among grid operators, suppliers and independent service providers, and consumers. These messages are mainly related to the status of the metering installation and the control of its settings. For example, authorised parties can request via ports P1, P3 or P4 the current status of the metering installation such as the actual tariff indicator, actual breaker position and actual threshold. 3

7 Integrating information security requirements in critical infrastructures 193 Grid operators and energy suppliers display via port P3 (also available via port P1) the status information in the form of standard messages on the display of the metre installation. These messages mainly cope with reasons for deactivation, limitation of the threshold and its level, and impending shortage of prepaid credit. 3 Another form of communication that can occur between grid operators and the metering installations at remote households is the update of firmware installed on the metres. 3 Smart metering system s limitations The launch of smart metering systems in a number of member states of the EU is faced by numerous issues which are adding to the limitations of the system and jeopardising its success. 3.1 Innovation and feedback One of the main problems that can prevent the system from satisfying few of the desired outcomes is the lack of innovation. By offering more innovative services to consumers such as the ability to steer consumer behaviour with respect to selling and producing export electricity to the grid from solar panels, the utilisation of the system can be maximised, and in addition to its intended goals, the system can achieve more targets. Another problem is proper consumer feedback. In the current situation in Italy for example, grid operators are the only ones benefiting from the deployment of the smart metering system with fraud detection (Parliamentary Office of Science and Technology, 2008) and accuracy of billing (European Regulator s Group for Electricity and Gas, 2007) as their main drivers for smart metering. With such a focus, other desired effects, such as demand response, are difficult to achieve which, in turn, negatively affect energy saving and efficiency. In order for the system to help achieve these goals, consumers must be given access to and provided with effective feedback regarding their electricity consumption. Feedback must be provided via attractive interfaces available in different forms such as real time and online portal access for a detailed analysis of their electricity consumption. 3.2 Information security breaches The rapid developments in information and communication technologies lead to the emergence of intelligent infrastructures that are highly reliant on IT infrastructures. Despite the obvious advantages to the incorporation of IT systems within other critical infrastructures to support its functionality, these infrastructures have now become exposed to new risks that jeopardise these systems operations. One prominent risk is compromising the security of the information maintained by these systems, in which case, these systems turn into a security disaster waiting to happen (Viega et al., 2002). The significance of securing the information of smart metering system arises from the grave consequences that may occur should a security breach take place such as the following:

8 194 L. AlAbdulkarim and Z. Lukszo fraud by altering metre reading to reduce it below the actual consumption levels gaining control over certain devices which could result in disconnecting their power supply, e.g., shutting down certain appliances within a household such as a washing machine or a refrigerator maliciously monitoring users electricity consumption rates (low rates indicate that the user is away from home, possibly for extended periods of time, which could result in theft) shutting down the entire grid (this would result in electricity supply down-time throughout the entire system). In the software requirements engineering discipline, security and privacy requirements are regarded, among others, as Nonfunctional Requirements (NFR). Functional requirements are those that describe what the system needs to do, whereas NFRs describe constraints on the solution space and describe how functional requirements should be delivered. Security requirements are considered complex and hard to manage, and they are often addressed as second class requirements that are ignored or unmet in the final product (Yu and Cysneiros, 2002). Many systems are developed initially without security in mind (Bettencourt da Cruz et al., 2003). This results in retrofitting information security requirements into these systems at later stages. Current system development practices address security as an afterthought in an ad hoc manner. They range from poor practice of coding security measures during implementation or even after implementation as a cycle of penetrate and patch to adding security requirements in later stages of system development at best (Crook et al., 2002; Haley et al., 2004). In both cases, the final product is rendered with a questionable level of information security. Apart from the obvious consequences, e.g., risking the confidentiality of information that belongs to a different stakeholder, this poor level of security can result in a wide range of other consequences that are not less severe. Examples of such consequences are given below. From a financial point of view, retrofitting security into systems can be extremely expensive. Addressing security at an early stage helps avoid the excessive costs of expensive fixes or alteration to the existing code (due to overlooking security requirements) at final phases of the system development rather than at the requirements gathering and analysis phase (Chung, 1993; Chung et al., 1994; Cysneiros et al., 2001; Yu et al., 2008). Another drawback to retrofitting information security is that it is time-consuming, causing delays in launching the system or a rushed implementation of security requirements to meet predefined deadlines, in which case, the system becomes compromised and less trust worthy. Both are consequences that can lead sometimes to huge financial losses, regulatory violations or legal implications (Bettencourt da Cruz et al., 2003; Cleland-Huang et al., 2005). From a technical perspective, attempting to retrofit security into the system after its implementation results in an increased level of activities in the system deployment and maintenance phase of the system s development life cycle. This is true considering that when security is addressed at this point of time, it is usually in the form of penetrate and patch cycles which is an exhaustive process that should be carried out on components across the entire system. This results in an increased number of updates to be deployed

9 Integrating information security requirements in critical infrastructures 195 across the system (Bettencourt da Cruz et al., 2003). Furthermore, as retrofitting security mostly requires the change of the existing code of the system, this causes a degraded level of maintainability of the system s code (Bettencourt da Cruz et al., 2003; Cysneiros et al., 2001). Additionally, the complex nature of information security requirements, affecting all parts of the system at all levels of detail, combined with the interconnectedness of the system implies that fixes are often not localised into a certain component but rather propagate and require a series of fixes across other components of the system (Bettencourt da Cruz et al., 2003). But perhaps the worst case scenario could be that the incorporation of security aspects at later stages requires an enormous amount of changes to the extent where the system needs to be redesigned and reimplemented. The effects of retrofitting information security from an operational standpoint can vary in severity. It ranges from compromising the system s efficiency or availability resulting from system down-times if security is implemented after system s deployment to a more drastic case of the system s failure which, in turn, can cost organisations high financial and legal losses (Cysneiros et al., 2001; Cleland-Huang et al., 2005). For example, the smart metering system could not be successfully mandated in the Netherlands in the first chamber of parliament due to information security issues and violation of consumers privacy (EnergieGids.nl, 2009). In the light of the abovementioned drawbacks to addressing information security at later stages of the system development, we propose to address security as early as the requirements gathering and analysis phase of the software engineering process. In Section 5 of this article, we present our information security assurance model for smart metering where we demonstrate how security should be tackled as early as possible. 4 Information security threats and consequences In this section, we give an introduction of the different types of information security breaches which threaten the confidentiality of the information maintained by the system along with the consequences that could result from these breaches. 4.1 Information security threats Threats or breaches are the potential for abuse of a system s assets by intruders (Haley et al., 2004). The degree of a threat depends on the attacker s skills, knowledge, resources, authority, and motives and intentions. A security threat to the information assets of the smart metering system can have serious consequences. The severity of these consequences depends mainly on the sensitivity and the worth of the information. The protection of this information is rather crucial to ensure a normal and uninterrupted operation of its services and to preserve the consumers right to privacy. Table 2 illustrates the main information categories of the smart metering system and some possible threats targeting this information.

10 196 L. AlAbdulkarim and Z. Lukszo Table 2 The main categories of information in the smart metering system and possible threats Type of information Description Possible threat Consumer profile Meter readings System maps Prepaid credit Confidential system information The consumers personal data such as their name and address Daily and monthly meter readings Information that is related to the architecture of the system, the layout of its components and their interconnectedness A method of payment for energy consumption that is mostly used by consumers with poor finances Information that is related to the operation of the system, e.g., encryption keys Risk to the safety of consumers and violation of their right to privacy upon unauthorised possession of this information Theft by penetrating the communication medium, mimicking a device and finally altering genuine meter readings Tapping and penetration of communication mediums and data repository points and possible vulnerabilities within the system Information related to this method of payment is stored on the system s servers; access to credit information may result in credit theft Interruption of service, loss of system control or system shutdown In addition to raw data and information, the system also contains a number of critical functions that allow the monitoring and controlling of the system among other things. The unauthorised access to these functions can result in more severe consequences than those resulting from violating the confidentiality of information assets. Examples of security breaches to the smart metering system functionality include the following: disconnecting consumers should an attacker gain access to the smart metering system via port P4 (this is the port through which relevant actors can gain access to the central access servers as illustrated in Figure 1) injecting Power Line Communication (PLC) signals on the communication medium causing communication disturbance initiating a denial of service attack on port P4 gaining control over the entire system should attackers gain access to critical information related to the operation of the system (this can be regarded as the most disastrous scenario). 4.2 Types of security threats The following are the types of security threats (Tanenbaum et al., 2002): interception Information interception or theft is the act of unlawfully seizing confidential information that is being transmitted across a communication medium among the different components of the system.

11 Integrating information security requirements in critical infrastructures 197 interruption Interruption or vandalism refers to situations where an attacker aims to make information or services unavailable or inaccessible to its legitimate users. An example of such an attack is denial of service or corrupting a data file. modification A modification attack is the action of performing an unauthorised change of information or tampering with the services of the system in a way that they no longer comply with their original state. fabrication Fabrication is a form of data falsification where the attacker generates and adds false information to the system or initiates some abnormal behaviours. An example of such an attack would be addition of an entry to an existing password file to gain unauthorised access to system resources. impersonation Impersonation is the act of assuming a false identity to gain unauthorised access to information resources of the system or to seize control of the system s functionality or part of it. 4.3 Consequences of information security threats The effects of information security breaches in critical infrastructures span beyond the obvious consequence of violating consumers privacy to other consequences that may be less obvious but equally drastic. Below is a list of the most dominant outcomes of information security breaches in the smart metering system; some of which were mentioned in The Information Security Policy (2006) as impacts to government operations from security breaches: loss of productivity A security breach can have an impact on the productivity of the system, the severity of which depends on the extent of the attack. system instability As the security of the system is compromised by an unauthorised access of intruders, this may cause some abnormal activities across the system which, in turn, result in an unstable and unreliable operation. damages to assets Unauthorised access to the system can result in damages to system s assets whether they are physical or logical. loss of control Operators may lose the abilities to monitor and control the system or parts of it as intruders gain unauthorised access and seize the system.

12 198 L. AlAbdulkarim and Z. Lukszo system shutdown System shutdown is the total or partial shut down of the smart metering system, causing interruption of services. violation of privacy Disclosure of personal information to unauthorised parties results in compromising individuals right to privacy which, in turn, is a violation of Article 8 of the European Convention for the Protection of Human Rights, i.e., right to respect private and family life. threat to public safety The possession of personal or confidential information by intruders may pose serious threats to public safety or individuals well-being. damages to reputation The violation of consumers right to privacy and interruption of services caused by information security breaches have a tremendous impact on the reputation of grid operators as owners of the system. loss of consumers trust Security breaches that result in the violation of consumers right to privacy of personal information result in the loss of confidence in the grid operators and their commitment to ensure consumers privacy. financial losses Liable parties, mainly grid operators, may suffer financial losses as a result of financial penalties or other losses related to damage control. legal consequences Legal consequences entail legal action taken by afflicted individuals against liable parties. regulatory contraventions An invasion of the smart metering system s security and the subsequent circumstances may lead to infraction of laws and regulations of the domain in which the system operates. The consequences of information security breaches of the smart metering system mentioned above can be classified in a number of ways such as direct versus indirect or major versus minor depending on the severity of the impact of the breach. Moreover, most of these outcomes are interrelated and they affect or cause one another, e.g., damages to reputation or violation of right to privacy can lead to loss of consumers trust, system shutdown can result in productivity and financial losses, and regulatory contraventions may damage the reputation and threaten the organisation s licence to operate.

13 Integrating information security requirements in critical infrastructures 199 These relationships and others, which exist among the consequences of security breaches, are best illustrated in Table 3 where the association is that a consequence in a row triggers another in a column. The table depicts the above-mentioned consequences and the complex relationships that exist among them and the asymmetrical nature of most of these relationships except for a few instances where a feedback may exist between two consequences. Table 3 The interrelatedness among information security breaches consequences Control Financial Legal Privacy Safety System shutdown System instability Productivity Regulatory violation Damage to reputation Loss of trust Damage to assets Control Financial Legal Privacy Safety Shutdown Instability Productivity Regulatory violation Reputation Trust Damage to assets From the table, it is clear that reputation damages and financial losses are the consequences that are highly likely to occur as they are triggered by almost all other consequences. In reality, companies mostly identify damages to reputation as their number one concern as the impact on their reputation is significant in the sense that it will influence their profit and may affect their continuity. 5 Information security design and engineering In order to generate tight security systems to avoid the security breaches mentioned in Section 4 and their consequences as well as to ensure the confidentiality of the system s information, a proper security implementation is needed. This can be achieved by regarding information security as a design and engineering process rather than tackling it in an ad hoc manner.

14 200 L. AlAbdulkarim and Z. Lukszo The process of security design and engineering deals with the development of detailed plans and designs for security features, controls and systems. Its aim is to deliver plans and policies that satisfy predefined security requirements of a given system and ensure its security by preventing internal misuse or external malicious attacks on the system. The outcomes of this process are information security models which are schemes or plans through which the protection of informational assets is ensured against malicious attacks and exploitations of unauthorised parties. They are rules and guidelines that must be taken into consideration, beginning from the time of system design and implementation until the system becomes in a state of obsoleteness including all system development steps in between. Adhering to these models renders the resulting system to be secure. To ensure the highest level of information security, the security requirements of the system should be taken into consideration from the earliest stages of the system life cycle and throughout its subsequent stages. In our approach, we aim to ensure the security of the information of the smart metering system against the multiple dimensions which relate to different aspects of the system within an information security assurance model. 5.1 Time dimension A system [that] is measured secure today does not mean it will be secure tomorrow (Wang, 2005). The assurance of information security throughout smart metering systems requires a careful and thorough planning beginning from the early stages of system development. Currently, there is no time aspect associated with the current security definitions (Wang, 2005). Traditionally, software security has been treated as an afterthought leading to a cycle of penetrate and patch (Gilliam et al., 2003). Unfortunately, the same can be said about the smart metering system which obviously results in a questionable level of security considering the unstructured and ad hoc manner in which security is being implemented. In our approach, we place great emphasis on the importance of addressing security in all the stages of the smart metering system development including the time when the system becomes obsolete and is phased out of production. These stages are mentioned below in a variation of the Waterfall software development model (Sommerville, 2000). In general, this software engineering model was chosen as the smart metering system is based on an IT infrastructure which naturally involves a considerable number of software components. In particular, the Waterfall model was initially chosen considering its fame and simplicity which facilitates ease of communicating the proposed framework Requirements specification Security requirements must be gathered along with the functional and nonfunctional system requirements. This includes identifying the informational assets to be protected, the different information security levels (high, moderate, low (Centers for Medicare and Medicaid Services, 2002)), and who has access rights to what information. In the case of smart metering, the data to be protected is the periodic metre readings and the clients profile data stored either in the metering installation or the CAS servers. But that is not all; since processes are also resources (Harris, 2003), it is rather vital to

15 Integrating information security requirements in critical infrastructures 201 protect the on/off switching of services. This is considered of great importance considering the grave consequences of service down-time throughout the entire system should an intruder gain access System analysis and design This denotes identifying possible malicious attacks and system vulnerabilities and preparing countermeasures to overcome them to ensure the system s security and reliability System implementation As the system is being realised, information security should be implemented by choosing the most secure and suitable methods such as computer security protocols with strong encryption methods, firewalls, user access control mechanisms and choosing secure physical locations of system hardware components to avoid unauthorised tampering or penetration. The current implementation of the smart metering system uses computer security protocols for communication ports P2 and P3. Additionally, firewalls are used for the CAS servers as well as for user-access authorisation mechanisms on port P4 through which the data will be accessed by grid operators, suppliers and independent service providers System integration and testing After a full system implementation and before the system is put into use, the various components of the system should be integrated and put into testing. From a security perspective, testers must run penetration attacks to challenge the system s resilience against malicious attacks by using diverse hacking utilities such as those used by intruders. Corrective actions must be taken (if needed) based on the results of these tests. These tests must be carried out across all system components such as the metering installation, CAS servers, communication ports P1 to P4 and the different communication channels with their various communication mediums System deployment and maintenance The assurance of information security in this phase is an ongoing process. After the smart metering system is fully deployed for use, security must be ensured by running periodic system analyses and security audits to assess the system status and to ensure that it remains secure against malicious attacks. The purpose of security audits is to carry out thorough and comprehensive inspections of the smart metering system s physical and logical components. This includes, for example, the inspection of the security of the locations of physical equipment such as the CAS servers and the encryption methods used for the security protocols which are employed for the communication channels to examine their effectiveness and to explore the possibility of utilising newer and stronger encryption algorithms. Furthermore, security policies must be verified to ensure their validity.

16 202 L. AlAbdulkarim and Z. Lukszo These audits are extremely significant since new threats and attacks emerge every day and due to the evolving nature of IT system as a result of either the addition of new services or the adjustment of the implementation of existing ones. Based on the results of these assessments, security measures of the smart metering system (if needed) should be amended to accommodate the new security requirements. In addition to the processes mentioned above, it is crucial to include an additional phase to the system life span in which the system will be phased out of production and will go out of service permanently, in other words until it becomes obsolete System obsoleteness System obsoleteness is not part of the original Waterfall software development model and is often overlooked in other development models. However, we feel it is imperative to include this phase of the infrastructure s life cycle while addressing security concerns. What happens to the data after the system is no longer in use? Even when the system is no longer operational, its data is not normally disposed of; rather, it remains confidential and must be protected against unauthorised access and tampering. Procedures such as where the data is to be stored, who has access rights to it and what security measures are to be enforced must be carefully planned in advance regarding this scenario. Continuing to secure data after the system has become obsolete is equally important as when the system was operational. However, this crucial step is alarmingly neglected by system designers and engineers. Because of this, our information security framework extends the common Waterfall model with the notion of system obsoleteness. 5.2 System breadth dimension The system breath dimension implies that the assurance of information security is extended across all the IT-technical components comprising the smart metering system. These include the physical and logical components as well as the network the system is a part of. It also includes the interactions between these components. The importance of this dimension rises from the nature of IT systems which are highly interconnected and which facilitates the access from internal and external networks (Masera and Favino, 2007). Ensuring information security across the entire system requires identifying all logical and physical components of the smart metering system and carefully deciding on the appropriate tools or methods for each of these components to protect the information of the system. Below is a list of the major smart metering system components in which information security mechanisms should be enforced: smart metering installation CAS database server CAS application server smart metering web portal communication channels communication network hubs

17 Integrating information security requirements in critical infrastructures 203 Note that the communication channels employ different communication mediums where the choice of communication medium is entirely dependent on the technologies available to the grid operator at any given area across the Netherlands. In the current smart metering implementation, the security of the information flowing through communication ports P3 and P4 is ensured by employing computer security protocols, whereas the security of the CAS servers is being enforced by installing firewall software and applying user-access control mechanisms. The interactions among these components mostly take the form of exchanging information across network mediums. These interactions increase the level of exposure to malicious attacks since transmitted data is more vulnerable than immobile data. In light of this, we believe that it is required to pay special attention to securing both physical and logical means of interaction employed in the smart metering system to ensure that the information remains intact and confidential. We believe that the importance of the system breadth dimension is directly correlated to the degree of interconnectedness of the underlying infrastructure. In securing a component within the system, it is therefore crucial to also take into account the interaction with other components. Also, care must be taken that security is assured equally across all components of the system because failing to do so in a single component compromises all connected components. 5.3 System depth dimension Securing smart metering information along the system depth dimension involves ensuring the information security across all levels within each and every smart metering system component. Figure 2 illustrates the most common logical and physical layers within the smart metering system components. The physical layer denotes the hardware elements of the component, whereas the network layer encompasses physical and logical elements which facilitate the exchange of information among smart metering system actors by transmitting the information across communication mediums. The operating system layer holds the software that is designed to control the hardware of a system in order to allow users and application programs to make use of it. The supporting services layer includes a set of utilities which extends the operating system in order to support the running applications. And finally, the application layer holds all the software programs that are in operation to achieve the predefined goal of the system. Naturally, the different smart metering system components consist of various number of the layers depicted in Figure 2. The layers contained within the different smart metering system components are shown in Table 4. In addition to enforcing security measures across all smart metering system components identified in the system breadth dimension of our framework, we strongly believe that security must also be enforced along the depth of each component, that is, in each of its layers by using appropriate security tools for each layer. This proves most crucial when taking into account that securing data in one layer does not necessarily mean that it remains protected once it is passed on to the next layer.

18 204 L. AlAbdulkarim and Z. Lukszo Figure 2 Logical and physical layers in smart metering system components Table 4 Layers within smart metering system components System components Physical Network Component layers Operating system Smart metering installation X X X Supporting services Applications CAS application server X X X X X CAS database server X X X X X Smart metering web portal X X X X X Communication channels X X Network hubs X X 5.4 System actors dimension The importance of the system actors dimension stems from the notion that an infrastructure can be seen as a large integrated sociotechnical system which implies that actors are a key component of the system (Lukszo et al., 2008). To ensure a secure operation of the system, these actors must be taken into account and be addressed properly.

19 Integrating information security requirements in critical infrastructures 205 The key component under the system actors dimension is to provide the system s different actors a secure interface through which they can benefit from the available services offered by the smart metering system and perform certain tasks that may require accessing and occasionally manipulating a set of the system s information. This can be achieved by giving careful consideration to the following aspects from the early stages of the system design Defining informational assets The information stored in the CAS servers of the smart metering system is of a varying nature and sensitivity, and along with this variety comes also various degrees of required security. This implies that the information that is being generated and maintained by the smart metering system must be classified into different categories based on its level of confidentiality. Throughout the literature, there exists a number of different approaches for information classification, some of which can be found in independent efforts or in documents by government agencies such as the Security in the Government Sector article. Furthermore, classification of informational assets can be found in the ISO/IEC standard Defining user classes Defining the system s user classes requires identifying the different actors of the system along with their respective information access requirements. For the smart metering system, users include grid operators, energy suppliers and consumers. Each one of these users falls under a different user class depending on the set of information they are allowed to access and the level of information manipulation permitted for this user Defining roles The goal of this step is to combine the user classes with the information categories by using roles. This can be achieved by assigning to the smart metering system actors who are categorised in different user classes in Step 2 the appropriate access and manipulation privileges of the information classified in Step 1. This concept is illustrated in Figure 3. Figure 3 User classes tied to information categories via roles

20 206 L. AlAbdulkarim and Z. Lukszo Access rights to physical and logical assets In addition to the informational assets of the smart metering system, there exists a number of other valuable assets of the system which also require protection. By assuring the security of these assets, the smart metering information security is being assured in turn. These assets can be of a physical or logical nature; an example of the former is the server rooms, whereas an example of the latter is the operating system and applications that are running throughout the entire smart metering system. Access privileges must be allocated to the smart metering system s actors in a manner that permits them to gain access to assets (e.g., a database or a server room) that are required to carry out their system-related tasks and in a manner that prevents the users from viewing or manipulating other assets which are not part of their predefined access rights Security logs Security logs are automatically recorded events taking place across the system in order to provide an audit trail that can be used to understand system activity and to diagnose problems. Events logs play an important role in maintaining system security. They prove most useful in situations where security violations occur as a result of internal errors or malpractices. By referring to these, logs incidents can be analysed, countermeasures are put in action to restore system security and security policies are modified to prevent such scenarios from reoccurring Providing user training Providing users with training on how to use the system is an important part of system deployment. During this process, a number of customised training sessions are held for their respective different user classes. In these sessions, the users are presented with a certain scope of the system which they are allowed to view or manipulate. The system actors dimension ensures information security by defining the roles of actors within the system and by monitoring their behaviour to ensure legal usage of the system. The activities mentioned above limit access to the system, thereby decreasing the number of possible attack opportunities that may be exploited by malicious entities. 6 Conclusion Assuring information security in critical infrastructures is very crucial to ensure a successful operation of these infrastructures and delivery of their services. The best manner in which security can be implemented in the IT systems supporting these critical infrastructures is to regard security as a design and engineering process from the early stages of system development rather than an afterthought when the system has already been realised. In this paper, we presented the different kinds of information security threats that jeopardise the confidentiality of information maintained by the system and the consequences that may occur should these security breaches take place. We have also emphasised the importance of addressing security and integrating it into the system from the early stages of the system s development rather than retrofitting it at later stages,

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Introduction to Security

Introduction to Security 2 Introduction to Security : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l01, Steve/Courses/2013/s2/its335/lectures/intro.tex,

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Acceptance of Privacy-Sensitive Technologies: Smart Metering Case in The Netherlands

Acceptance of Privacy-Sensitive Technologies: Smart Metering Case in The Netherlands Third International Engineering Systems Symposium CESUN 2012, Delft University of Technology, 18-20 June 2012 Acceptance of Privacy-Sensitive Technologies: Smart Metering Case in The Netherlands Layla

More information

PRIVACY AND DATA SECURITY MODULE

PRIVACY AND DATA SECURITY MODULE "This project has been funded under the fourth AAL call, AAL-2011-4. This publication [communication] reflects the views only of the author, and the Commission cannot be held responsible for any use which

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

COSC 472 Network Security

COSC 472 Network Security COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

How To Test For Security On A Network Without Being Hacked

How To Test For Security On A Network Without Being Hacked A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Best Practices in ICS Security for System Operators. A Wurldtech White Paper Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

WEB 2.0 AND SECURITY

WEB 2.0 AND SECURITY WEB 2.0 AND SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Electronic Payment Schemes Guidelines

Electronic Payment Schemes Guidelines BANK OF TANZANIA Electronic Payment Schemes Guidelines Bank of Tanzania May 2007 Bank of Tanzania- Electronic Payment Schemes and Products Guidleness page 1 Bank of Tanzania, 10 Mirambo Street, Dar es

More information

PineApp TM Mail Encryption Solution TM

PineApp TM Mail Encryption Solution TM PineApp TM Mail Encryption Solution TM How to keep your outgoing messages fully secured. October 2008 Modern day challenges in E-Mail Security Throughout the years, E-Mail has evolved significantly, emerging

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Security Threats in Demo Steinkjer

Security Threats in Demo Steinkjer Security Threats in Demo Steinkjer Report from the Telenor-SINTEF collaboration project on Smart Grids Author(s) Inger Anne Tøndel, SINTEF Martin Gilje Jaatun, SINTEF Maria Bartnes Line, SINTEF/NTNU SINTEF

More information

Planning for and implementing security logging

Planning for and implementing security logging Life flows better with Visa Visa Europe Planning for and implementing security logging Introduction Most data security breaches have something in common; they are not overly technical, and in most cases

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

COMPUTER AND NETWORK USAGE POLICY

COMPUTER AND NETWORK USAGE POLICY COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY

More information

Guide for the attention of developers/hosts for merchant websites on the minimum level of security for bank card data processing

Guide for the attention of developers/hosts for merchant websites on the minimum level of security for bank card data processing Guide for the attention of developers/hosts for merchant websites on the minimum level of security for bank card data processing Foreword This guide in no way intends to replace a PCI DSS certification

More information

10 Hidden IT Risks That Threaten Your Financial Services Firm

10 Hidden IT Risks That Threaten Your Financial Services Firm Your firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your business without IT. Today,

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

EURODAC Central Unit. Inspection Report

EURODAC Central Unit. Inspection Report EURODAC Central Unit Inspection Report June 2012 Case file: 2011-1103 INDEX 1. INTRODUCTION... 3 1.1 The EURODAC system... 3 1.2 EDPS supervision of the EURODAC Central Unit... 3 1.3 Scope of the inspection...

More information

Network Security: Policies and Guidelines for Effective Network Management

Network Security: Policies and Guidelines for Effective Network Management Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. jgkolo@gmail.com, usdauda@gmail.com

More information

SURE 5 Zone DDoS PROTECTION SERVICE

SURE 5 Zone DDoS PROTECTION SERVICE SURE 5 Zone DDoS PROTECTION SERVICE Sure 5 Zone DDoS Protection ( the Service ) provides a solution to protect our customer s sites against Distributed Denial of Service (DDoS) attacks by analysing incoming

More information

Polish Financial Supervision Authority. Guidelines

Polish Financial Supervision Authority. Guidelines Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents

More information

Rulebook on Information Security Incident Management General Provisions Article 1

Rulebook on Information Security Incident Management General Provisions Article 1 Pursuant to Article 38 of the Law on State Administration (Official Gazette of the Republic of Montenegro 38/03 from 27 June 2003, 22/08 from 02 April 2008, 42/11 from 15 August 2011), The Ministry for

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3 OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Chapter 4 Information Security Program Development

Chapter 4 Information Security Program Development Chapter 4 Information Security Program Development Introduction Formal adherence to detailed security standards for electronic information processing systems is necessary for industry and government survival.

More information

Is your business at risk? DO YOU NEED TO KNOW?

Is your business at risk? DO YOU NEED TO KNOW? Is your business at risk? DO YOU NEED TO KNOW? Do you need Penetration Testing? The main issues our clients have faced in the operational running of the business Client-side attacks Another growing security

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

BEFORE THE BREACH: Why Penetration Testing is Critical to Healthcare IT Security

BEFORE THE BREACH: Why Penetration Testing is Critical to Healthcare IT Security BEFORE THE BREACH: Why Penetration Testing is Critical to Healthcare IT Security August 2014 w w w.r e d s p in.c o m Introduction This paper discusses the relevance and usefulness of security penetration

More information

Notes on Network Security - Introduction

Notes on Network Security - Introduction Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network

More information

Foundstone ERS remediation System

Foundstone ERS remediation System Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly

More information

Summary of CIP Version 5 Standards

Summary of CIP Version 5 Standards Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

Spillemyndigheden s Certification Programme Information Security Management System

Spillemyndigheden s Certification Programme Information Security Management System SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Introduction... 3 1.1 Spillemyndigheden s certification programme... 3 1.2 Objectives of the... 3 1.3 Scope of this document... 4 1.4 Definitions...

More information

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort

More information

Chapter 7 Information System Security and Control

Chapter 7 Information System Security and Control Chapter 7 Information System Security and Control Essay Questions: 1. Hackers and their companion viruses are an increasing problem, especially on the Internet. What can a digital company do to protect

More information

White Paper Secure Reverse Proxy Server and Web Application Firewall

White Paper Secure Reverse Proxy Server and Web Application Firewall White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security

More information

Cyber Security Issues - Brief Business Report

Cyber Security Issues - Brief Business Report Cyber Security: Are You Prepared? This briefing provides a high-level overview of the cyber security issues that businesses should be aware of. You should talk to a lawyer and an IT specialist for a complete

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Spillemyndigheden s Certification Programme Information Security Management System

Spillemyndigheden s Certification Programme Information Security Management System SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...

More information

Network Security 101 Multiple Tactics for Multi-layered Security

Network Security 101 Multiple Tactics for Multi-layered Security Security and Resilience for Utility Network Communications White Paper Communications networks represent a partial paradox. The very openness and ubiquity that make them powerful can also present a weakness.

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Deterrent and detection of smart grid meter tampering and theft of electricity, water, or gas

Deterrent and detection of smart grid meter tampering and theft of electricity, water, or gas Deterrent and detection of smart grid meter tampering and theft of electricity, water, or gas Jeff McCullough Introduction This white paper was inspired by real concerns regarding smart grid electric meters

More information

ICT Security. High-Quality Information and Know How Protection. Design and implementation of security. Covering almost all of ICT security

ICT Security. High-Quality Information and Know How Protection. Design and implementation of security. Covering almost all of ICT security ICT High-Quality Information and Know How Protection Design and implementation of security solutions optimised to meet the client s needs Implementing state-of-the-art hardware and software security products

More information

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

AMI security considerations

AMI security considerations AMI security considerations Jeff McCullough Introduction Many electric utilities are deploying or planning to deploy smart grid technologies. For smart grid deployments, advanced metering infrastructure

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0 SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY

More information

Four keys to effectively monitor and control secure file transfer

Four keys to effectively monitor and control secure file transfer Four keys to effectively monitor and control secure file transfer Contents: 1 Executive summary 2 Key #1 Make your data visible wherever it is in the network 2 Key #2 Reduce or even eliminate ad hoc use

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

This document has for purpose to elaborate on how Secomea have addressed all these topics with a solution consisting of the three components:

This document has for purpose to elaborate on how Secomea have addressed all these topics with a solution consisting of the three components: 10 reasons to select Secomea as your Remote Management partner Executive summary Prior to selecting an industrial communication solution that may be both strategic and mission critical to the business,

More information