Rocking the Pocket Book: Hacking Chemical Plants for Competition and Extortion. Marina Krotofil
|
|
|
- Elwin Glenn
- 10 years ago
- Views:
Transcription
1 Rocking the Pocket Book: Hacking Chemical Plants for Competition and Extortion Marina Krotofil Black Hat, Las Vegas, USA
2 Industrial Control Systems (aka SCADA) Physical application Curtesy: Compass Security Germany GmbH
3 Cyber-physical systems Cyber-physical systems are IT systems embedded in an application in the physical world Interest of the attacker is in the physical world
4 Industrial Control Systems
5 My research focus Complex continuous processes (e.g. chemical plants) Non-opportunistic attacker I do not research into (but consider) cyber vulnerabilities in communication protocols and control equipment What the attacker can do to the process? What she needs to do and why? What needs to be programmed into a final payload? Are traditional cyber-security measures adequate?
6 Control systems hacking Ralph Langner: The pro s don t bother with vulnerabilities; they use features to compromise the ICS
7 Security science Security is not a fundamental science It is application driven Security solutions exist in the context of the application
8 Early adopter: E-commerce Parkerian hexad Security influences design decisions o Attackers (mis)use functionality of web browsers o Novel approaches to designing web applications o Novel security controls in browsers Application dictates security properties o Information-theoretic security properties o CIA triad Parkerian hexad
9 Failed to adopt Wireless sensor networks o A big hype for about a decade o Conferences, solutions, promising applications o Remained a promising technology with limited deployment Downfall reasons o Deficiencies in the attacker models and security requirements o Unrealistic assumptions about physics of wireless communication D. Gollmann, M. Krotofil, H. Sauff. Rescuing Wireless Sensor Networks Security from Science Fiction (WCNS 11)
10 Control equipment vulnerabilities ICSA A: Siemens SIMATIC HMI Devices Vulnerabilities (Update A) ICSA : Schneider Electric Vijeo Historian Web Server Multiple Vulnerabilities ICSA : Schneider Electric Telvent SAGE RTU DNP3 Improper Input Validation Vulnerability ICSA : Siemens SCALANCE X-200 Authentication Bypass Vulnerability ICSA : Emerson AMS Device Manager SQL Injection Vulnerability ICSA : ABB AC500 PLC Webserver CoDeSys Vulnerability ICS-ALERT : Advantech EKI-6340 Command Injection ICSA : Yokogawa HART Device DTM Vulnerability
11 ICS-CERT recommendation ICSA : Siemens SCALANCE X-200 Authentication Bypass Vulnerability IMPACT Successful exploitation of this vulnerability may allow attackers to perform administrative operations over the network without authentication. Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.
12 Impact evaluation What exactly the attacker can do with the vulnerability? Any further necessary conditions required? How severe the potential physical impact? Answering these questions requires understanding how the attacker interacts with the control system and the process
13 Incident data unavailability Due to various schemes for reputation management and data sharing laws, the majority of Operational Technology attacks over the last 20 years have not been made public, making even a catalogue of recent reference events difficult to assemble. A key requirement for an insurance response to cyber risks will be to enhance the quality of data available and to continue the development of probabilistic modelling. We can and should conduct own research on cyber-physical exploitation
14 Control systems security Control system design flaw 1 2 Industrial systems can be controlled without modifying the contents of the messages o Can be effective even if the traffic is signed or even encrypted Process data can be spoofed to make it look like everything is normal o Can be done despite all traditional communication security put in place Overlooked data security property M. Krotofil, J. Larsen. What You Always Wanted and Now Can: Hacking Chemical Processes. Hack in the Box, Amsterdam (2015)
15 Process control
16 Process control automation (Nest because it s so cute!) Set point Running upstairs to turn on your furnace every time it gets cold gets tiring after a while so you automate it with a thermostat
17 Control loop Physical process Actuators Sensors Adjust themselves to influence process behavior Control system Computes control commands for actuators Measure process state
18 Control system Error in desired temperature e(t) = SP - PV Controller output, CO Signal to actuator (valve) Adjusted fuel flow to furnace Set point (SP) Desired temp + - Termostat controller Furnace fuel valve House heating system Heat into house Measured temp (Process variable, PV) Temperature sensor Heat loss (e.g. through windows) Jacques Smuts Process Control for Practitioners
19 Control equipment In large-scale operations control logic gets more complex than a thermostat One would need something bigger to handle it all Most of the time this is a programmable logic controller (PLC)
20 PLC internals Sensors 1. Copy data from inputs to temporary storage 2. Run the logic 3. Copy from temporary storage to outputs Actuators Inputs Outputs
21 Control logic It is programmed graphically most of the time Note to the control guys: logic and given examples do not match, they picked randomly. Thank you for noticing ;-) If Input 1 and (Input 4 or Input 11) then Output 6 If tank pressure in PLC 1 > 1800 reduce inflow in PLC 3
22 PID Control PID: proportional, integral, derivative most widely used control algorithm on the planet The sum of 3 components makes the final control signal PI controllers are most often used Jacques Smuts Process Control for Practitioners
23 Field communication Communication media o 4-20 ma o 0-10 v o Air pressure Usually process values are scaled into meaningful data in the PLC Wires are run from sensors and actuators into wiring cabinets
24 PLC cannot do it alone PLC does not have the complete picture and time trends Human operators watch the process 7/24 Most crucial task: resolution of alarms
25 SCADA hacking
26 Why to attack ICS Industry means big business Big business == $$$$$$$
27 Why to attack ICS Industry means big business Big business == $$$$$$$ Alan Paller of SANS (2008): In the past two years, hackers have successfully penetrated and extorted multiple utility companies that use SCADA systems. Hundreds of millions of dollars have been extorted, and possibly more. It's difficult to know, because they pay to keep it a secret. This kind of extortion is the biggest untold story of the cybercrime industry.
28 Why to attack ICS Source: simentari.com Attack goal: persistent economic damage
29 Here s a plant. What is the plan?
30 What can be done to the process Equipment damage Equipment overstress Violation of safety limits Production damage Product quality and product rate Operating costs Maintenance efforts Compliance violation Safety Pollution Contractual agreements Paracetamol Purity Relative price, EUR/kg 98% 1 99% 5 100% 8205 Source:
31 Attack considerations Equipment damage o Comes first into anybody s mind (+) o Irreversible ( ) o Unclear collateral damage (-) o May transform into compliance violation, e.g. if it kills human (-) ± Equipment damage Production damage Compliance violation Compliance violation o Compliance regulations are public knowledge (+) o Unclear collateral damage (-) o Must be reported to the authorities ( ) o Will be investigated by the responsible agencies (-) ±
32 Plants for sale From LinkedIn More plants offers:
33 Car vs. plant hacking It is not about the size It is about MONEY Plants are ouch! how expensive
34 Vinyl Acetate Monomer plant (model)
35 Acknowledgement Behind great woman is a great man
36 Acknowledgement Process Automation Consultant Student Cyber-physical hacker Chemical Engineer Professor Programmer
37 Acknowledgement Alexander Isakov awesome software engineer Alexander Winnicki very good student Dieter Gollmann most supportive professor Jason Larsen cyber-physical hacking guru Pavel Gurikov chemical engineer who believes in hackers William Horner experienced automation expert
38 Stages of cyber-physical attacks
39 Attack payload Attack objective Cyber-physical payload
40 Stages of SCADA attack Access Cleanup Discovery Damage Control J. Larsen. Breakage. Black Hat Federal (2007)
41 Stages of SCADA attack Access Cleanup Discovery Damage Control
42 Stages of SCADA attack Access Cleanup Discovery Damage Control
43 Access
44 Traditional IT hacking 1 0day 1 Clueless user Repeat until done No security Move freely AntiVirus and Patch Management Database links Backup systems
45 Modern IT hacking Select a vulnerability from the list of ICS-CERT advisories Scan Internet to locate vulnerable devices Exploit E. Leverett, R. Wightman. Vulnerability Inheritance in Programmable Logic Controllers (GreHack 13) D. Beresford. Exploiting Siemens Simatic S7 PLCs. Black Hat USA (2011)
46 Plants modernization Smart instrumentation o Converts analog signal into digital o Sensors pre-process the measurements o IP-enabled (part of the Internet-of-Things ) Old generation temperature sensor Sensor Computational element
47 Invading field devices Inserting rootkit into sensor s firmware Water flow Valve Pipe Shock wave Reflected shock wave Physical movement Valve closes Shockwave Reflected wave Attack scenario: pipe damage with water hammer effect J. Larsen. Miniaturization. Black Hat USA (2014)
48 Discovery
49 Process discovery What and how the process is producing How it is controlled How it is build and wired Operating and safety constraints Espionage, reconnaissance Target plant and third parties
50 Espionage Industrial espionage has started LONG time ago (malware samples dated as early as 2003)
51 Process discovery
52 Know the equipment Stripper is... Stripping column
53 Max economic damage? Reaction Refinement Final product Requires input of subject matter experts
54 Understanding points and logic Programmable Logic Controller Ladder logic Piping and instrumentation diagram Pump in the plant
55 Understanding points and logic HAVEX: Using OPC, the malware component gathers any details about connected devices and sends them back to the C&C. Programmable Logic Controller Ladder logic Piping and instrumentation diagram Pump in the plant
56 CC 1 PC TC LC 2 3 LC 4 PC 5 6 TC 7 LC 8 TC 9 TC 11 LC 12 TC 14 TC 16 CC CC TC 19 CC LC TC 21 TC LC LC Understanding control structure Control loop
57 Control loop configuration
58 Watch the flows! fixed HAc flows into two sections. Not good :(
59 Obtaining control!= being in control Control Loop XMV{1} XMV{2} XMV{3} Obtained controls might not be useful for attack goal How do I even speak to this thing?? K. Wilhoit, S. Hilt. The little pump gauge that could: Attacks against gas pump monitoring systems. Black Hat (2015) Attacker might not necessary be able to control obtained controls Huh???
60 Control Every action has a reaction
61 Physics of process control Once hooked up together, physical components become related to each other by the physics of the process If we adjust a valve what happens to everything else? o o Adjusting temperature also increases pressure and flow All the downstream effects need to be taken into account How much does the process can be changed before releasing alarms or it shutting down?
62 Process interdependencies
63 Process interdependencies
64 Understanding process response Operating practice Control strategy Control algorithm Controller tuning Sizing Dead band Flow properties Equipment design Process design Control loops coupling Set point Controller Final control element Process Disturbance Transmitter Type Duration Sampling frequency Noise profile Filtering
65 Understanding process response Operating practice Control strategy Control algorithm Controller tuning Sizing Dead band Flow properties Equipment design Process design Control loops coupling Set point Controller Final control element Process Disturbance Transmitter Type Duration Sampling frequency Noise profile Filtering Have extensively studied
66 Process control challenges Process dynamic is highly non-linear (???) UNCERTAINTY! Behavior of the process is known to the extent of its modelling o So to controllers. They cannot control the process beyond their control model This triggers alarms Non-liner response
67 Control loop ringing Amount of chemical entering the reactor Caused by a negative real controller poles Makes process unstable and uncontrollable Ringing impact ratio 1: 150
68 Types of attacks Step attack Periodic attack Recovery time Magnitude of manipulation
69 Outcome of the control stage I am 5 3 tall We should probably automate this process (work in progress)
70 Outcome of the control stage Sensitivity Magnitude of manipulation Recovery time High XMV {1;5;7} XMV {4;7} Medium XMV {2;4;6} XMV {5} Low XMV{3} XMV {1;2;3;6} Reliably useful controls
71 Alarm propagation To persist we shall not bring about alarms Alarm Steady state attacks Periodic attacks Gas loop 02 XMV {1} XMV {1} Reactor feed T XMV {6} XMV {6} Rector T XMV{7} XMV{7} FEHE effluent XMV{7} XMV{7} Gas loop P XMV{2;3;6} XMV{2;3;6} HAc in decanter XMV{2;3;7} XMV{3} The attacker needs to figure out the marginal attack parameters which (do not) trigger alarms
72 Damage
73 How to break things? Attacker needs one or more attack scenarios to deploy in final payload The least familiar stage to IT hackers o In most cases requires input of subject matter experts Accident data is a good starting point o Governmental agencies o Plants own data bases
74 Hacker unfriendly process Target plant may not have been designed in a hacker friendly way o There may no sensors measuring exact values needed for the attack execution o The information about the process may spread across several subsystems making hacker invading more devices o Control loops may be designed to control different parameters that the attacker needs to control for her goal
75 Measuring the process Analyzer Analyzer Analyzer Analyzer Chemical composition FT FT TT Reactor exit flowrate Reactor exit temperature No analyzer Measuring here is too late
76 Measuring attack success If you can't measure it, you can't manage it Peter Drucker I have a dream that one day I will find all the right KPI s
77 Technician vs. engineer Technician Engineer It will eventually drain with the lowest holes loosing pressure last It will be fully drained in 20.4 seconds and the pressure curve looks like this J. Larsen. SCADA triangles: reloaded. S4 (2015)
78 Technician answer Usage of proxy sensor Reactor with cooling tubes Only tells us whether reaction rate increases or decreases Is not precise enough to compare effectiveness of different attacks
79 Quest for engineering answer Code in the controller Optimization applications Test process/plant 0,00073; 0,00016; 0,0007
80 Engineering answer Vinyl Acetate production
81 Product loss Product per day: $ Product loss per day: ,70$
82 Outcome of the damage stage Product per day: $ Product loss, 24 hours Steady-state attacks Periodic attacks High, $ XMV {2} XMV {4;6} Medium, 5.000$ $ XMV {6;7} XMV {5;7} Low, 2.000$ $ - XMV {2} Negligible, 2.000$ XMV {1;3} XMV {1;2} Still might be useful
83 Clean-up
84 Socio-technical system Operator Maintenance stuff Plant engineers Process engineers. Controller Cyber-physical system
85 Creating forensics footprint Process operators may get concerned after noticing persistent decrease in production and may try to fix the problem If attacks are timed to a particular employee shift or maintenance work, plant employee will be investigated rather than the process
86 Creating forensics footprint 1. Pick several ways that the temperature can be increased 2. Wait for the scheduled instruments calibration 3. Perform the first attack 4. Wait for the maintenance guy being yelled at and recalibration to be repeated 5. Play next attack 6. Go to 4
87 Creating forensics footprint Four different attacks
88 Defeating chemical forensics If reactor deemed malfunctioning, chemical forensics will be asked to assist Know metrics and methods of chemical investigators Change attack patterns according to debugging efforts of plant personnel
89 ICCP Regulatory reporting Just-in-time manufacturing Wireless links Access Operator s screens Regulatory filings Point database Safety briefs Discovery Historian Small changes to the process Realtime data from sensors Safety systems Minimal process model Control Accident data SEC filings Process experts Custom research Custom operator spoofs Waiting for unusual events Log tampering Forensic footprint Cleanup Damage Final Payload
90 Postamble
91 State-of-the-art of ICS security TCP/IP
92 Take away SCADA hacking can be more sophisticated than simply blowing, breaking and crashing o Espionage attacks matter! They hurt later Better understanding what the attacker needs to do and why o Eliminating low hanging fruits o Making exploitation harder o Making cost of attack exceeding cost of damage Look for the attacker o Wait for the attacker where she has to go o Process control stage is done on live process
93 Thank you Marina Krotofil Damn Vulnerable Chemical Process TE: VAM:
Cyber-physical Systems Security An Experimental Approach
Cyber-physical Systems Security An Experimental Approach Dieter Gollmann, Marina Krotofil Security in Distributed Applications, Hamburg University of Technology helped by Pavel Gurikov, Alexander Isakov,
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
The Advantages of Enterprise Historians vs. Relational Databases
GE Intelligent Platforms The Advantages of Enterprise Historians vs. Relational Databases Comparing Two Approaches for Data Collection and Optimized Process Operations The Advantages of Enterprise Historians
Introduction To SCADA and Telemetry
Introduction To SCADA and Telemetry Joe Mullaney Senior I&C Engineer MSE Technology Applications, Inc. Tetragenics Division [email protected] Overview Definitions What is SCADA? What is Telemetry?
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
IT Security and OT Security. Understanding the Challenges
IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control
AutoLog ControlMan. Remote Monitoring & Controlling Service
AutoLog 1 AutoLog ControlMan Remote Monitoring & Controlling Service Web browser based HMI / SCADA interface Server is hosted by Internet server hosting company Control units communicate wirelessly via
SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions
SCADA Systems March 2012 / White paper by Schneider Electric Telemetry & Remote SCADA Solutions Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 Field Instrumentation...
SCADA Security @ City of Raleigh. Martin Petherbridge, CPA, CIA Internal Audit Manager Shirley McFadden, CPA, CIA Senior Internal Auditor
SCADA Security @ City of Raleigh Martin Petherbridge, CPA, CIA Internal Audit Manager Shirley McFadden, CPA, CIA Senior Internal Auditor Agenda 1. PLCs, SCADA and Stuxnet 2. Selecting Audit Standards 3.
Enhancing Process Control Education with the Control Station Training Simulator
Enhancing Process Control Education with the Control Station Training Simulator DOUG COOPER, DANIELLE DOUGHERTY Department of Chemical Engineering, 191 Auditorium Road, Room 204, U-222, University of Connecticut,
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
IoT IT Security and Secure Development Life Cycle
IoT IT Security and Secure Development Life Cycle Security BSides Ljubljana, 2015 By Christopher Scheuring, ERNW Germany #2 /whoami Christopher Scheuring Security Analyst @ ERNW Since 2010 IT Security
The Advantages of Plant-wide Historians vs. Relational Databases
GE Intelligent Platforms The Advantages of Plant-wide Historians vs. Relational Databases Comparing Two Approaches for Data Collection and Optimized Process Operations The Advantages of Plant-wide Historians
Using ISA/IEC 62443 Standards to Improve Control System Security
Tofino Security White Paper Version 1.2 Published May 2014 Using ISA/IEC 62443 Standards to Improve Control System Security Contents 1. Executive Summary... 1 2. What s New in this Version... 1 3. Why
Maximizing return on plant assets
Maximizing return on plant assets Manufacturers in nearly every process industry face the need to improve their return on large asset investments. Effectively managing assets, however, requires a wealth
ISA108 Intelligent Device Management (IDM)
ISA108 Intelligent Device Management (IDM) Intelligent Digital Devices - Have Self-Diagnostics and More Eight-channel two-wire temperature transmitter Intelligent two-wire on/off valve 2 Fully integrated
Monitoring & Control of Small-scale Renewable Energy Sources
Small Scale Renewable Energy Sources and Energy Saving: 6-17 th July 2009 Monitoring & Control of Small-scale Renewable Energy Sources Dr G A Taylor Brunel Institute of Power Systems Brunel University,
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
ThreatSpike Dome: A New Approach To Security Monitoring
ThreatSpike Dome: A New Approach To Security Monitoring 2015 ThreatSpike Labs Limited The problem with SIEM Hacking, insider and advanced persistent threats can be difficult to detect with existing product
Maximization versus environmental compliance
Maximization versus environmental compliance Increase use of alternative fuels with no risk for quality and environment Reprint from World Cement March 2005 Dr. Eduardo Gallestey, ABB, Switzerland, discusses
Industrial Steam System Process Control Schemes
Industrial Steam System Process Control Schemes This paper was developed to provide a basic understanding of the different process control schemes used in a typical steam system. This is however a fundamental
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION
Down the SCADA (security) Rabbit Hole. Alberto Volpatto
Down the SCADA (security) Rabbit Hole Alberto Volpatto Alberto Volpatto Security Engineer & Team Leader @ Secure Network Computer Engineer Application Security Specialist What is SCADA? Supervisory operators,
PLCs and SCADA Systems
Hands-On Programmable Logic Controllers and Supervisory Control / Data Acquisition Course Description This extensive course covers the essentials of SCADA and PLC systems, which are often used in close
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
Intelligent Device Management with DCS, PLC, and RTU
wp_dcs PLC RTU ra 2015-07-04 12:47:00 Intelligent Device Management with DCS, PLC, and RTU EDDL-based Intelligent Device Management (IDM) software part of the Asset Management System (AMS) can be used
SCADA/ICS Security in an. [email protected] Twitter: @RobertMLee
SCADA/ICS Security in an Insecure Domain [email protected] Twitter: @RobertMLee Introduction CYA The opinions held and expressed by Robert M. Lee do not constitute or represent an opinion or
Session 14: Functional Security in a Process Environment
Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the
NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER
NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER Understanding what a PAC is starts from the understanding of PLC. A PLC is a Programmable Logic while
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Degree programme in Automation Engineering
Degree programme in Automation Engineering Course descriptions of the courses for exchange students, 2014-2015 Autumn 2014 21727630 Application Programming Students know the basis of systems application
HC900 for Boiler Control Applications
HC900 for Boiler Control Applications Background Until recent years, only the largest boilers could justify sophisticated boiler controls. Now high fuel costs make it necessary to improve boiler efficiency
Technical Training Module ( 30 Days)
Annexure - I Technical Training Module ( 30 Days) Section 1 : Programmable Logic Controller (PLC) 1. Introduction to Programmable Logic Controller - A Brief History, Need and advantages of PLC, PLC configuration,
Agile Project Execution
ebook Agile Project Execution The future of Industrial Process Automation projects v1.4 EMK(VDS)-TR-EB-01 APEX ebook Table of Contents Intro Agile Project Execution Page 2. Chapter 1 Conventional Project
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems
, pp. 49-56 http://dx.doi.org/10.14257/ijsh.2013.7.5.05 A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems Minkyu Choi 1 and Ronnie D. Caytiles 2 1 Security Engineering Research
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids
CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Reducing operating costs of telecom base stations with remote management
Reducing operating costs of telecom base stations with remote management Whitepaper How remote management can be used to cut operating expenses of existing telecom infrastructure. HMS Industrial Networks
An Analysis of the Capabilities Of Cybersecurity Defense
UNIDIRECTIONAL SECURITY GATEWAYS An Analysis of the Capabilities Of Cybersecurity Defense Michael Firstenberg, Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
SCADA. The Heart of an Energy Management System. Presented by: Doug Van Slyke SCADA Specialist
SCADA The Heart of an Energy Management System Presented by: Doug Van Slyke SCADA Specialist What is SCADA/EMS? SCADA: Supervisory Control and Data Acquisition Retrieves data and alarms from remote sites
Testing Intelligent Device Communications in a Distributed System
Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) [email protected] United States Smart Grid systems
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Lambda Tuning the Universal Method for PID Controllers in Process Control
Lambda Tuning the Universal Method for PID Controllers in Process Control Lambda tuning gives non-oscillatory response with the response time (Lambda) required by the plant. Seven industrial examples show
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
The SCADA That Didn t Cry Wolf: Who s Really Attacking Your SCADA Devices
The SCADA That Didn t Cry Wolf: Who s Really Attacking Your SCADA Devices Kyle Wilhoit Sr. Threat Researcher Trend Micro 1 Glossary HMI: Human Machine Interface IED: Intelligent Electronic Device SCADA:
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
Holistic View of Industrial Control Cyber Security
Holistic View of Industrial Control Cyber Security A Deep Dive into Fundamentals of Industrial Control Cyber Security Learning Goals o Understanding security implications involving industrial control systems
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
SCADA Security: Challenges and Solutions
SCADA Security: Challenges and Solutions June 2011 / White paper by Metin Ozturk, Philip Aubin Make the most of your energy Summary Executive Summary... p 2 Protecting Critical Infrastructure Includes
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN
Security Issues and Quality of Service in Real Time Wireless PLC/SCADA Process Control Systems Dr. Halit Eren & Dincer Hatipoglu Curtin University of Technology (Perth Australia) 2/27/2008 1 PRESENTATION
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
2012 Data Breach Investigations Report
2012 Data Breach Investigations Report A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information
8/27/2015. Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354. Don t Wait Another Day
Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354 2015 FRWA Annual Conference Don t Wait Another Day 1 SCADA Subsystems Management Physical Connectivity Configuration Mgmt.
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
FUNDAMENTALS OF CONTROL ENGINEERING
EQUIPMENT FOR ENGINEERING EDUCATION EQUIPMENT FOR ENGINEERING EDUCATION ENGINEERING MECHANICS & MACHINE ELEMENTS Statics Strength of Materials Dynamics Fundamentals of Engineering Design Machinery Diagnosis
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
HMS Industrial Networks. Putting industrial applications on the cloud
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks Inc 35 E Wacker Drive,
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) 1. INTRODUCTION In today s world, cyber security is one
Overcoming PCI Compliance Challenges
Overcoming PCI Compliance Challenges Randy Rosenbaum - Security Services Exec. Alert Logic, CPISM Brian Anderson - Product Manager, Security Services, SunGard AS www.sungardas.com Goal: Understand the
How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System
Network Security in Power Systems Maja Knezev and Zarko Djekic Introduction Protection control Outline EMS, SCADA, RTU, PLC Attacks using power system Vulnerabilities Solution Conclusion Introduction Generator
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004)
Selecting Sensors for Safety Instrumented Systems per IEC 61511 (ISA 84.00.01 2004) Dale Perry Worldwide Pressure Marketing Manager Emerson Process Management Rosemount Division Chanhassen, MN 55317 USA
Mixing Valves. ARGUS Application Note: Mixing Valves
Mixing Valves Most radiant hot water heating systems in greenhouses use mixing valves to control the temperature of heating pipes. Both 3-way and 4- way valves are commonly used. Mixing valves provide
Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants
Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants Jung-Woon Lee, Cheol-Kwon Lee, Jae-Gu Song, and Dong-Young Lee I&C and HF Research Division, Korea Atomic Energy
Alarm Response Management
GE Intelligent Platforms Alarm Response Management Decreasing Disaster Exposure by Ensuring the Correct Response to Critical Alarms Alarm Response Management Introduction At best, too many alarms can be
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
Does function point analysis change with new approaches to software development? January 2013
Does function point analysis change with new approaches to software development? January 2013 Scope of this Report The information technology world is constantly changing with newer products, process models
Bioreactor Process Plant Powered by NI LabVIEW and NI CompactRIO
Bioreactor Process Plant Powered by NI LabVIEW and NI CompactRIO Segment: Industry Country: Singapore Author(s): Sanka Hettiarachchi, Providev Kevin Kho, Technologies Unlimited Products: NI crio-9075 (Integrated
The Peak of Chaos Shane D. Shook, PhD 10/31/2012
w h a c k e r n a v k n d n h m y a w h o? n r h p e n c n o s a n w s o v y i d u n n n r n m s r k d e a i k o w i r c d i o m u t w e t w s u t s i v i t c a Shane D. Shook, PhD 10/31/2012 Cyber Crime
Stronger than Firewalls And Cheaper Too
Stronger than Firewalls And Cheaper Too Andrew Ginter Director of Industrial Security Waterfall Security Solutions 2012 Emerging Threat: Low Tech, Targeted Attacks Night Dragon, Shady RAT, Anonymous Trick
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA
INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph 0925910 I MCA OVERVIEW Introduction Overview The IDS Puzzle Current State of IDS Threats I have a good firewall, why do I need an IDS? Expectations
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
SECTION 16926 CONTROL SOFTWARE
SECTION 16926 CONTROL SOFTWARE PART 1 GENERAL 1.01 SUMMARY: A. Contractor shall furnish a complete control software package for the Red River Wastewater Treatment Plant and the Northeast Wastewater Treatment
