Security Aspects of SCADA and Corporate Network Interconnection: An Overview
|
|
|
- Arron Hicks
- 10 years ago
- Views:
Transcription
1 Security Aspects of SCADA and Corporate Network Interconnection: An Overview Paulo S. Motta Pires Luiz Affonso H.G. Oliveira Departamento de Engenharia de Computação e Automação Universidade Federal do Rio Grande do Norte Natal, , RN, BRAZIL (pmotta, affonso)@dca.ufrn.br Abstract SCADA (Supervisory Control and Data Acquisition) systems play an important role in industrial process. In the past, these used to be stand-alone models, with closed architecture, proprietary protocols and no external connectivity. Nowadays, SCADA rely on wide connectivity and open systems and are connected to corporate intranets and to the Internet for improve efficiency and productivity. SCADA networks connected to corporate networks brought some new seecurity related challenges. This paper presents an overview of the security aspects of this interconnection. 1: Introduction SCADA (Supervisory Control and Data Acquisition) systems accomplish functions that include supervision and real-time control of local or remote processes. These systems are composed of computers, software and devices used for data acquisition and digital input/output in order to perform process interaction. SCADA systems have a strategic importance since they are adopted by the industries of a country s infrastructure. The applications of SCADA technology reach virtually the entire spectrum of the productive sector. Just to name a few, we can find these systems being used on chemical, petrochemical and electric power production and distribution; water distribution; oil and gas pipelines, nuclear plants, intelligent buildings and vehicle traffic control. From monolithic systems, based on mainframes with closed architectures, vendordependent and with limited connectivity, SCADA systems have evolved to open systems with an architecture strongly based on connectivity. It is frequent, in this new model, the interconnection of SCADA networks with corporate networks, and with the Internet. This interconnection of networks with distinct characteristics and purposes is done aiming the increase of corporate efficiency, competitiveness and productivity.
2 It is very important to point out that the interconnection of SCADA networks, which are essentially directed to supervision and process control, and the corporate networks, directed to processing, storage and retrieval of information, incorporates some security problems which can compromise or interrupt the operation of critical processes. Eventual security problems, that were restricted to each one of the network environments, are now shared. The compromising of one of the networks can have catastrophic consequences. In this paper we present an overview of security aspects that can result from the interconnection of a SCADA network and a corporate network. The paper is organized in four sections. In Section 2, we present an overview of SCADA systems. In this section, security problems that can be found in SCADA systems are emphasized, considering they are isolated from other networks. In Section 3, we present the aspects that must be considered regarding the security of corporate networks. The comprehension of the security problems of each one of the networks isolated can make it possible to foresee the security procedures that must be considered seeking the protection of the interconnection. In Section 4, we present an architecture that is commonly used to integrate both networks, and also analyze some security aspects that is consequence of the integration of these systems. In Section 5, we make considerations, present the conclusions and ideas aiming futures works. 2: SCADA Systems SCADA systems are composed of a central processing unit, called Central Station or MTU (Master Terminal Unit), and some Remote Stations, called RTU (Remote Terminal Unit). These components exchange data through a communication media. The operator interacts with the system through a graphics visualization unit available in the Central Station. This interface, known as the HMI (Human-Machine Interface), is updated in real-time with the data collected from the industrial plants by the RTUs. By using the Central Station, the operator has access to a graphic representation of the processes that are being supervised or controlled, as well as the graphic representation of variables that are being monitored. The operator also has access to other functionalities, such as report generation and command operations over the plant devices, for example. The Remote Stations are composed of sensors for data acquisition, of a component that carries out the communication between the Remote Station and the Central Station, and of a component responsible for executing instructions coming from the Central Station. Usually, SCADA systems have a software, which runs on one or more workstations, and is responsible for coordinating the functions of acquisition and real-time data storage of the several remote devices. Data stored on workstation are processed and presented to the operators through that graphic interface previously mentioned. Figure 1 shows the simplified architecture of a SCADA system. Once they are physically and logically independent of other corporate systems, SCADA systems were traditionally implemented to be strictly operational, therefore concerns about security were not part of projects. This statement was proven when procedures that have potential security problems were analyzed and considered safe thanks to the
3 Figure 1. Simplified Architecture of a SCADA system. The system is composed of a Central Station and some Remote Stations, connected through of communication media. isolation of initial SCADA systems. Some of these procedures, presented in [1], are: User authentication based only on a common password; Data transferred in plain text; Use of protocols considered a priori safe due to the fact they are proprietary; Used protocols do not implement any kind of authentication; Communication and control channels (dedicated lines, dial-up lines or communication channels through radio or satellite) are property of third-parties, and Software that is part of a SCADA system are implemented in operational systems considered unsafe. Problems related to security became still more important considering the evolution that is occurring on SCADA systems. SCADA is becoming less logically isolated and evolving to open architectures strongly centered on connectivity. With the goal of increasing the efficiency, competitiveness and productivity on corporations, SCADA networks are being connected to corporate networks and, consequently, to the Internet itself. In next section, we present a brief description of the most common security problems inherent to corporate networks. 3: Corporate Networks Security SCADA networks, as seen on previous paragraphs, with aim towards process control and management. This way, security measures should guarantee that a security failure does not result in disastrous consequences and also guarantee that the system is reliable
4 and controllable [2]. Reliability is the guarantee that the system and its components will perform its duties under certain conditions for all the time these conditions remains; controllability is the guarantee that the system, if well-fed by its actuators, will perform the functions that it was developed to do. Corporate networks, though, is supposed to perform the processing, storage and retrieval of corporate data. These networks have characteristics and purposes that are different from those of SCADA networks. Security procedures on corporate networks are implemented with the goal of guaranteeing confidentiality, integrity and availability of the data [3]. Confidentiality is the guarantee that the information will only be shared among authorized personnel. Confidentiality presupposes the previous classification of users and of the information to be protected, and also requires adoption of reliable tools for identifying and authenticating users. Integrity is the guarantee that the information is authentic and complete. The available information can not suffer any kind of modification, accidental or malicious. This context includes the guarantee that the information was generated by a trustworthy source. The third factor, availability, is the guarantee that the information is accessible whenever it is necessary. A security failure in corporate network is a breach of at least one of these guarantees. Security breaches may allow a user privileged access to data it is not supposed to be authorized to access. It can also allow that a malicious user degrade network services or interfere in some dangerous way on the operation of these systems. There are several ways to exploit security breaches or degrade network services. The following ones stand out: Propagation of malicious code; Denial of services; Vulnerability exploitation of the operational system or applications, and Bad configuration of services. Among malicious codes, we can stand out the viruses, the worms and the Trojan horses. Viruses need a host application to be effective. They are activated only when the host application is activated. Potentially more dangerous, worms are independent, autonomous software and can be spread by themselves or using other ways of transportation, such as attachments on electronic messages/mail [4]. Trojan horses are software that disguises itself as useful software. Like the viruses, they are only activated after user interaction. Most of them install backdoors that allows access for the malicious user to the target machine. Several arrangements can be made in order to avoid or minimize the effects of security vulnerabilities exploitations for the corporate network. Among them, we can mention: Development and implementation of a security policy; Installation, in strategic places in the network, of mechanisms against malicious codes; Allowance to remote access only with encrypted sessions; Use of cryptography to protect sensitive files;
5 Systematic installation of operational systems and applications software updates, and Investments in training the personnel. To increase even more the protection level of the systems, some procedures must also be motivated: Maintenance of time sync among all network equipment; Establishment of consistent backup policies; Physical and logical segmentation of the network; Storage and analysis of logs; Enabling of only strictly necessary services; Use of firewalls; Use of intrusion detection systems, and Creation of a team of analysis and response to security incidents. More information can be found on [5, 6, 7]. In next section, we will discuss the security problems that can arise from the interconnection of the SCADA network with the corporate network. 4: The Interconnection of Networks Frequently, SCADA networks and corporate intranets are connected. This integration of networks with distinct characteristics and purposes happens with the goal of increasing the corporate efficiency, competitiveness and productivity. One of the used architectures to accomplish the integration of the SCADA network with the corporate intranet is shown on Figure 2. In this Figure, the Internet connection, usually made through the corporate network, is not represented. In this architecture, the interconnection of the SCADA network with the corporate intranet is accomplished through the use of a Gateway, an equipment that has at least two network interfaces. Some variations of this architecture are based on functions that the Gateway performs. For example, to make it possible for the data generated from the SCADA network to be accessed by corporate users, the Gateway should store some data available on the SCADA server. This data can be collected by a script that accesses a standard service on SCADA server (such as FTP, for example), or accesses a service on SCADA server that was specifically developed to retrieve the necessary data. The presentation of SCADA data to corporate users is usually made through the use of the HTTP (Hypertext Transport Protocol) client-server technology. On the Gateway, automatic operations are performed in order to process the acquired data and, after some necessary transformations, these are presented to the user in form of pages coded in a script language (HTML, PHP, ASP, JavaScript). The user accesses the information by using
6 Figure 2. Interconnection of SCADA and corporate network. The networks are connected through a Gateway. a regular browser, which is a HTTP client software. In this particular kind of solution, it is not allowed to the corporate user any kind of mismanagement over the processes that are being supervisioned or monitored [8]. Information can be accessed at any time and from any corporate network equipment. Therefore, the results of multiple control centers can be accessed and visualized in a monitor of a common corporate workstation. This solution does not depends on operational systems and can be implemented once the hardware and software on corporate network support a browser, and once a HTTP server can be installed on the Gateway. Another possibility is to enhance the Gateway with a convenient middleware in order to make it possible for the corporate user also to interact directly with the processes that are being supervisioned or controlled [9]. The interconnection of SCADA and corporate networks brought to the former some situations that was before restrict to the corporate environment, or, as seen on section 2, was not considered problematic on the operation of isolated SCADA networks. Aspects such as the access permission to corporate users, the possibility of executing remote commands, the use of unsafe communication protocols, bad configuration of equipments, the use of public networks to transmit sensitive data, transmission of plain text data, malicious code spreading and the possibility of exploiting programming bugs became part of the universe of a system that was not affected before because it was isolated. Now, with its interconnection, the possibility of occurring a security incident greatly increases. Besides, it should be taken into consideration the impact that the monitor processes may suffer in case of exploitation of a security breach in any one of the two involved environments. As usually SCADA networks are responsible for supervising and monitoring critical processes, a slight security problem can have more serious consequences. Once there is a compromising of a system placed on the corporate network or on the SCADA network, any device or equipment that is accessible from those may also be compromised. Considering the SCADA network as the target, the main risks are [10]:
7 Use a denial of service attack in order to compromise the SCADA server service or the network in which the server is on; Compromise the SCADA server itself. This will allow that any command that is available to the operator be also available to the attacker, and that the data can be deleted, altered or corrupted, or still that sniffers, key-loggers, or rootkits be installed, and The use of the SCADA server itself to perform attacks against some third party. It is important to mention the fact that in SCADA networks it is common to see the coexistence of new systems with old ones, many of them with known vulnerabilities. This facilitates the intrusion and is consequence of the fact that performing updates usually implicates in stopping processes, or is dependent of an authorization from the manufacturer or the vendor. We have shown that the interconnection between the SCADA network and the corporate network implicates in some new technical challenges. They should now implement mechanisms and defense rules and should perform operations that were restrict to IT personnel. It also brings to IT professionals the responsibility of acting on a network with distinct characteristics from those they are used to deal with. 5: Conclusions In this work we presented an overview of the security aspects that must be taken into consideration in the interconnection of SCADA networks to corporate networks. It is important to stand out that this is an irreversible tendency. However, as we showed, this convergence of technologies may also bring complications, mostly in the security subject. The consequences of security vulnerability exploitation can be catastrophic because SCADA networks are usually responsible for supervising and controlling processes, and those are fundamental to the productive infrastructure. This work reinforces that we are dealing with the integration of two networks with completely distinct characteristics and goals and that they are, today, operated and managed by professional with different visions and qualification. Therefore, to the industrial network professional it should be given the opportunity of being trained in security technologies that are today adopted on corporate networks, and also, to the IT professional, it should be given training in industrial network technologies in order to perform its duties understanding this special environment needs. Adequate, continuous training can be extended to the whole corporation in order to decrease the possibility of occurring security breaches. Another verification is that the corporate security policy also must now includes SCADA networks, respecting its distinct characteristics and the specific training of its operators. An adequate policy will allow, for example, that a security update to be performed in corporate network also be performed on SCADA network. It is important to point out that any preventive mechanism that happens to be installed must take into consideration the processing characteristics performed on SCADA networks. The implementation of security mechanisms may decrease the system perfor-
8 mance, making the adoption unfeasible. Penetration tests and scanners should be used very carefully in a SCADA network in order to maintain the operational integrity of the system. We also verified the importance of investments aiming the establishment of standards and procedures to be adopted when performing the evaluations components and systems present in the interconnected network. There are already some initiatives aiming the building of national laboratories acting in identifying vulnerabilities, developing methodologies and proposing actions aiming the increase on SCADA systems security and its integration with other systems. The reader is refered to [11] to find detailed security considerations for industrial protocols and some case studies. On Department of Computer Engineering and Automation of Federal University of Rio Grande do Norte, there are works being developed in tools for risk evaluation of integrated systems (SCADA and the corporate network), use open source software to integrate SCADA and corporate systems, and analysis of security measures in use of convergent industrial and corporate networks. ACKNOWLEDGMENTS Authors would like to express their gratitude to the Department of Computer Engineering and Automation (DCA) of Federal University of Rio Grande do Norte (UFRN) and to the REDIC (Instrumentation and Control Research Network) for the support received along the development of this work. The authors would like to thank the reviews for their comments, which greatly improved the quality of this paper. References [1] W.F. Rush, J.A. Kinast, How to protect SCADA Systems from Cyber-Attacks: Recognizing Risks is the First Step in Protecting SCADA Systems, available on articles/july03b.htm, in October, [2] A. Tilch, M. Ames, SCADA Security - Why the IT Security Approach Fails, AusCERT Conference 2004, May [3] M. Bishop, Computer Security: Art and Science, Addison-Wesley-Longman, June [4] N. Weaver, W. Paxson, S. Staniford, R. Cunnigham, A Taxonomy of Computer Worms, available on in October, [5] C. Kaufman, R. Perlman, M. Speciner, Network Security: Private Communication in a Public World, Prentice Hall, 2nd. Edition, 2002 [6] S. Northcutt, J. Novak, Network Intrusion Detection, New Riders Publishing, 3rd. Edition, [7] E.E. Schultz, R. Shumway, Incident Response: A Security Guide to Handling Systems and Network Security Breaches, New Riders Publishing, [8] M. Wollschlaeger, Intranet-Based Management Framework for Industrial Communication Systems, 7th. IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, Vol. 2, pp , October, [9] W. Kastner, C. Csebits, M. Mayer, Linux in Factory Automation? Internet Controlling of Fieldbus Systems!, 7th. IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, Vol. 1, pp , October, [10] J. Pollet, Safety Considerations for SCADA/DCS Cyber Attacks, available on http: // ContentDisplay.cfm&ContentID=31538, in October, [11] D. Dzung, M. Naedele, T.P. Von Hoff, M. Crevatin, Security for Industrial Communication Systems, Proc. IEEE, Vol. 93, No. 6, pp , June, 2005.
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
Security in SCADA solutions
Security in SCADA solutions Green Hills Software Peter Hoogenboom Engineering Manager - EMEA 2011 Green Hills Software D&E Event, 22 Sep 2011, Evoluon Eindhoven (NL) Slide 1 Security in SCADA solutions
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Critical IT-Infrastructure (like Pipeline SCADA systems) require cyber-attack protection
Critical IT-Infrastructure (like Pipeline SCADA systems) require cyber-attack protection Tobias WALK ILF Consulting Engineers GmbH Germany Abstract Pipeline Supervisory Control And Data Acquisition (SCADA)
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Solutions and IT services for Oil-Gas & Energy markets
Solutions and IT services for The context Companies operating in the Oil-Gas & Energy sectors are facing radical changes that have a significant impact on their business processes. In this context, compliance
(Self-Study) Identify How to Protect Your Network Against Viruses
SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses
Down the SCADA (security) Rabbit Hole. Alberto Volpatto
Down the SCADA (security) Rabbit Hole Alberto Volpatto Alberto Volpatto Security Engineer & Team Leader @ Secure Network Computer Engineer Application Security Specialist What is SCADA? Supervisory operators,
How Secure is Your SCADA System?
How Secure is Your SCADA System? Charles Drobny GlobaLogix, Inc. Houston, TX, USA Our Industry is a Target 40% of cyber attacks on Critical Infrastructure targets are aimed at the Energy Industry The potential
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems
, pp. 49-56 http://dx.doi.org/10.14257/ijsh.2013.7.5.05 A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems Minkyu Choi 1 and Ronnie D. Caytiles 2 1 Security Engineering Research
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions
SCADA Systems March 2012 / White paper by Schneider Electric Telemetry & Remote SCADA Solutions Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 Field Instrumentation...
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
Enterprise K12 Network Security Policy
Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005
AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System
Network Security in Power Systems Maja Knezev and Zarko Djekic Introduction Protection control Outline EMS, SCADA, RTU, PLC Attacks using power system Vulnerabilities Solution Conclusion Introduction Generator
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
Vulnerabilities in SCADA and Critical Infrastructure Systems
International Journal of Future Generation Communication and Networking 99 Vulnerabilities in SCADA and Critical Infrastructure Systems Rosslin John Robles 1, Min-kyu Choi 1, Eun-suk Cho 1, Seok-soo Kim
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
SCADA Security Measures
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA SCADA Security Measures
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
IQware's Approach to Software and IT security Issues
IQware's Approach to Software and IT security Issues The Need for Security Security is essential in business intelligence (BI) systems since they have access to critical and proprietary enterprise information.
HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK
HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK Prepared By: Raghda Zahran, Msc. NYIT-Jordan campus. Supervised By: Dr. Lo ai Tawalbeh. November 2006 Page 1 of 8 THE WAR AGAINST BEING AN INTERMEDIARY
Protection profile of an industrial switch
Version 1.0 short-term GTCSI July 13, 2015 Preface In the whole document, the acronym ToE (Target of Evaluation) designates the component being evaluated. Text in red differs from the mid-term version
Improving SCADA Control Systems Security with Software Vulnerability Analysis
Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791
Security for. Industrial. Automation. Considering the PROFINET Security Guideline
Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Understanding SCADA System Security Vulnerabilities
Understanding SCADA System Security Vulnerabilities Talking Points Executive Summary Common Misconceptions about SCADA System Security Common Vulnerabilities Affecting SCADA Networks Tactics to Strengthen
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
SCADA System Security, Complexity, and Security Proof
SCADA System Security, Complexity, and Security Proof Reda Shbib, Shikun Zhou, Khalil Alkadhimi School of Engineering, University of Portsmouth, Portsmouth, UK {reda.shbib,shikun.zhou,khalil.alkadhimi}@port.ac.uk
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:
1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 3 Firewalls Specific Instructional Objectives On completion of this lesson, the students will be able to answer: What a firewall is? What are the design goals of Firewalls
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing
E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi etieghi@visionautomation.
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems Enzo M. Tieghi [email protected] Security IT & Control System Security: where are we?
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Cyber Security Implications of SIS Integration with Control Networks
Cyber Security Implications of SIS Integration with Control Networks The LOGIIC SIS Project Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Zach Tudor is a Program
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Computer System Security Updates
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
Chapter 8 A secure virtual web database environment
Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
UNIDIRECTIONAL SECURITY GATEWAYS. Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments
UNIDIRECTIONAL SECURITY GATEWAYS Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments 2010 Introducing: Waterfall Security Solutions Ltd Located in Rosh-Ha ayin,
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Ohio Supercomputer Center
Ohio Supercomputer Center Security Education and Awareness No: Effective: OSC-6 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
