Penetration Testing of Industrial Control Systems
|
|
|
- Alexia Montgomery
- 10 years ago
- Views:
Transcription
1 SF-1075-SUR (8-2005) SANDIA REPORT SAND P Unlimited Release Printed March, 2005 Penetration Testing of Industrial Control Systems David P. Duggan Prepared by Sandia National Laboratories Albuquerque, New Mexico and Livermore, California Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under Contract DE-AC04-94AL Approved for public release; further dissemination unlimited.
2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency thereof, nor any of their employees, nor any of their contractors, subcontractors, or their employees, make any warranty, express or implied, or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represent that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government, any agency thereof, or any of their contractors or subcontractors. The views and opinions expressed herein do not necessarily state or reflect those of the United States Government, any agency thereof, or any of their contractors. Printed in the United States of America. This report has been reproduced directly from the best available copy. Available to DOE and DOE contractors from U.S. Department of Energy Office of Scientific and Technical Information P.O. Box 62 Oak Ridge, TN Telephone: (865) Facsimile: (865) Online ordering: Available to the public from U.S. Department of Commerce National Technical Information Service 5285 Port Royal Rd. Springfield, VA Telephone: (800) Facsimile: (703) Online order:
3 Penetration Testing of Industrial Control Systems David P. Duggan Michael Berg John Dillinger Jason Stamp March 7, 2005 Copyright 2005, Sandia National Laboratories.
4 [Page intentionally left blank]
5 INTRODUCTION Performing network penetration testing on Industrial Control Systems (ICS) should not be taken lightly. There are many things that can go wrong. These systems were designed and built to control and automate some real world process or equipment. Given the wrong instructions, they could perform an incorrect action causing waste, equipment damage, injury, or even deaths. These types of systems include systems also known as Supervisory Control and Data Acquisition (SCADA) systems, Electric Management Systems (EMS), Distribution Control Systems (DCS), or Process Control Systems (PCS). The next three paragraphs provide real examples of the danger. While a ping sweep was being performed on an active SCADA network that controlled 9-foot robotic arms, it was noticed that one arm became active and swung around 180 degrees. The controller for the arm was in standby mode before the ping sweep was initiated. Luckily, the person in the room was outside the reach of the arm. On a PCS network, a ping sweep was being performed to identify all hosts that were attached to the network, for inventory purposes, and it caused a system controlling the creation of integrated circuits in the fabrication plant to hang. The outcome was the destruction of $50K worth of wafers. A gas utility hired an IT security consulting company to conduct penetration testing on their corporate IT network and carelessly ventured into a part of the network that was directly connected to the SCADA system. The penetration test locked up the SCADA system and the utility was not able to send gas through its pipelines for four hours. The outcome was the loss of service to its customer base for those four hours. Identifying the vulnerabilities within a SCADA system requires a different approach than in a normal IT network. In most cases, systems on an IT network can be rebooted, restored, or replaced with little interruption of service to their customers. Their world is mostly virtualbased, connecting only peripherally to the physical world. SCADA systems control physical processes and therefore have real world consequences associated with their actions. Some actions are time critical, while others have a more relaxed timeframe. One shouldn t connect a test machine to the network and perform scans of a SCADA system without understanding the possible consequences of this testing. APPROACH The first question to ask is Why is penetration testing necessary for this system? First identify the threats of concern. Is the threat from people, rogue hosts, or something else? Is it malicious or accidental? Would this penetration test likely identify vulnerabilities that can be exploited by the threats of concern? When performing a penetration test of an IT system, there are several steps that are generally used. Depending upon the tools used, one or more of these steps may be integrated together. They are:
6 1. Identify hosts, nodes, and networks. 2. Identify services available on items from #1, above. 3. Identify possible vulnerabilities for items found in #2, above. There are usual actions associated with each step, above. In the table below, we provide the usual list of actions, along with other actions that may be taken instead, making the outcomes of any testing safer. These new techniques may make the job a little harder, but are intended to mitigate problems associated with active penetration testing. Activity Usual Actions for IT Preferred Actions for SCADA Ping Sweep (e.g. nmap) 1. Examine CAM tables on switches. 2. Examine router config files or route tables. 3. Physical verification (chasing wires). 4. Passive listening or IDS (e.g. snort) on network. Identification of hosts, nodes, and networks Identification of services Port Scan (e.g. nmap) 1. Local port verification (e.g. netstat). 2. Port scan of a duplicate, development, or test system. Identification of vulnerabilities within a service Vulnerability Scan (e.g. nessus, ISS, etc ) 1. Local banner grabbing with version lookup in CVE. 2. Scan of duplicate, development, or test system. The common theme of all the preferred actions is that there is no active component to put traffic on an operational network or against an operational system. The activities involved in an IT penetration test are only one way to obtain the information of interest. There are other less intrusive ways to gather most, if not all, of the same information. These other methods will allow collection of the information necessary for understanding the vulnerability of the SCADA system, without the risk of causing a failure, while testing. While any assessment of the SCADA system is being performed, SCADA operations personnel must be aware that testing is occurring, and be prepared to immediately address any problems that arise. If manual control of the system is possible, personnel capable of performing manual control must be present during the security testing. Some of the factors to consider when choosing active vs. passive testing of SCADA systems is that these systems have very limited resources as compared to normal IT systems. Since these
7 systems have longevity much greater than their IT counterparts, the CPU s are typically generations behind the state-of-the-art and can be easily overtaxed. They usually are run on legacy networks at slow speeds, which can be overwhelmed by the volume of traffic generated during active testing. Since they are special purpose, sloppy programming may go unnoticed through regular use and only be identified when scanned over a wide range of use as IT scanning tools provide. Network stacks on most SCADA systems fall into this category. While these flaws need to be identified and addressed, this should be done on test equipment and not on operational systems controlling critical processes. Because of the limitations of these systems to defend themselves against attacks, there must be design considerations used to protect them from outside influences. Complete separation of the SCADA system from other IT systems and networks is the best method for accomplishing the protection. However, this is unpractical in a great number of cases since data from the SCADA system is used to provide input to business decisions and is needed on an almost instantaneous basis. Development of secure data exchange methods between components of the SCADA system and the IT system is required, with the goal of preventing any direct connection from the IT system to any SCADA system components. A security examination of a SCADA system should not cause more problems for the operation of the system than absolutely necessary. Since these systems are different than regular IT systems, they require special handling when security, or any other, testing is performed. There isn t a security tester that wants to be known as the person that turned out the lights in a city, flooded a valley, or released a toxic cloud of chemicals into the air. SCADA systems are in transition, as legacy systems are replaced with more modern systems vulnerability and risk assessment methods may need to change. However, with the diverse installations that currently exist, vigilance is required on the part of the auditor. The auditor needs to understand the SCADA system under test, the risk involved with the test, and the consequences associated with unintentional stimulus or denial of service to the SCADA system.
Dynamic Vulnerability Assessment
SANDIA REPORT SAND2004-4712 Unlimited Release Printed September 2004 Dynamic Vulnerability Assessment Cynthia L. Nelson Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,
Laser Safety Audit and Inventory System Database
SAND REPORT SAND2003-1144 Unlimited Release Printed May 2003 Laser Safety Audit and Inventory System Database Arnold L. Augustoni Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185
IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary
SANDIA REPORT SAND2015-20815X Unlimited Release January 2015 IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary Version 1.0 James Mark Harris, Robert M. Huelskamp Prepared by Sandia
This document was prepared in conjunction with work accomplished under Contract No. DE-AC09-96SR18500 with the U. S. Department of Energy.
This document was prepared in conjunction with work accomplished under Contract No. DE-AC09-96SR18500 with the U. S. Department of Energy. DISCLAIMER This report was prepared as an account of work sponsored
Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems
PNNL-19266 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems SV Singh AI Thronas January
Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment
SANDIA REPORT SAND2007-7328 Unlimited Release November 2007 Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Raymond C. Parks Prepared by Sandia National Laboratories Albuquerque,
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
Early Fuel Cell Market Deployments: ARRA and Combined (IAA, DLA, ARRA)
Technical Report NREL/TP-56-588 January 3 Early Fuel Cell Market Deployments: ARRA and Combined (IAA, DLA, ARRA) Quarter 3 Composite Data Products Jennifer Kurtz, Keith Wipke, Sam Sprik, Todd Ramsden,
Shock Response of Diamond Crystals
SANDIA REPORT SAND2001-3838 Unlimited Release Printed December 2001 Shock Response of Diamond Crystals Marcus D. Knudson, James R. Asay, Scott C. Jones and Yogi M. Gupta Prepared by Sandia National Laboratories
Measurement of BET Surface Area on Silica Nanosprings
PNNL-17648 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Measurement of BET Surface Area on Silica Nanosprings AJ Karkamkar September 2008 DISCLAIMER This report was prepared
Drupal Automated Testing: Using Behat and Gherkin
PNNL-23798 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Drupal Automated Testing: Using Behat and Gherkin Thomas Williams [email protected] Carolyn Wolkenhauer [email protected]
Situated Usability Testing for Security Systems
PNNL-20201 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Situated Usability Testing for Security Systems FL Greitzer February 2011 DISCLAIMER This report was prepared as an
Help for the Developers of Control System Cyber Security Standards
INL/CON-07-13483 PREPRINT Help for the Developers of Control System Cyber Security Standards 54 th International Instrumentation Symposium Robert P. Evans May 2008 This is a preprint of a paper intended
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
W. C. Reinig. Savannah River Laboratory E. I. du Pent de Nemours and Company Aiken, South Carolina 298o1
.*. *.-a /dp73j/3~ DP-MS-68-48 calforn1um-252: A NEW SOTOPC SOUR(!EFOR NEUTRON RADOGRAPHY by W. C. Reinig Savannah River Laboratory E.. du Pent de Nemours and Company Aiken, South Carolina 298o1. SRL7
Security Metrics for Process Control Systems
SANDIA REPORT SAND2007-2070P Unlimited Release September 2007 Security Metrics for Process Control Systems Annie McIntyre, Blair Becker, Ron Halbgewachs Prepared by Sandia National Laboratories Albuquerque,
API Cybersecurity Conference Industrial Control Systems Workshop. Sponsored by Alpine Security
API Cybersecurity Conference Industrial Control Systems Workshop Sponsored by Alpine Security www.alpinesecurity.com Intro Incidents ICS Overview Lab Environment ICS Discovery ICS Vulnerability Scanning
LEADERSHIP DEVELOPMENT STUDY
SANDIA REPORT SAND 25-28 Unlimited Release Printed April 25 LEADERSHIP DEVELOPMENT STUDY Success Profile Competencies and High-Performing Leaders at Sandia National Laboratories Deborah R. Mulligan, Ph.
Process for Selecting Engineering Tools Applied to Selecting a SysML Tool
SANDIA REPORT SAND2010-7098 Unlimited Release February 2011 Process for Selecting Engineering Tools Applied to Selecting a SysML Tool Kent de Jong, Mark J. De Spain, Marjorie E. Hernandez, Debbie S. Post,
How To Manage A Security System
SANDIA REPORT SAND2008-81438143 Unclassified Unlimited Release Printed December 2008 Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures Calvin D. Jaeger,
Y-12 EMBOS Medical Lab Interface Batch Loader
DOE-FIU SCIENCE & TECHNOLOGY WORKFORCE DEVELOPMENT PROGRAM STUDENT SUMMER INTERNSHIP TECHNICAL REPORT June 4, 2012 to August 10, 2012 Y-12 EMBOS Medical Lab Interface Batch Loader Principal Investigators:
Regional Field Verification Operational Results from Four Small Wind Turbines in the Pacific Northwest
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Regional Field Verification Operational
WeaselBoard: Zero-Day Exploit Detection for Programmable Logic Controllers
SANDIA REPORT SAND2013-8274 Unlimited Release Printed October, 2013 WeaselBoard: Zero-Day Exploit Detection for Programmable Logic Controllers John Mulder, Moses Schwartz, Michael Berg, Jonathan Roger
Systems Engineering Management Plans
SANDIA REPORT SAND2009-7836 Unlimited Release Printed October 2009 Systems Engineering Management Plans Tamara S. Rodriguez Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,
New Era in Cyber Security. Technology Development
New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security
Optical Blade Position Tracking System Test
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Optical Blade Position Tracking
Small PV Systems Performance Evaluation at NREL's Outdoor Test Facility Using the PVUSA Power Rating Method
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Small PV Systems Performance
The Production Cluster Construction Checklist
ARGONNE NATIONAL LABORATORY 9700 South Cass Avenue Argonne, IL 60439 ANL/MCS-TM-267 The Production Cluster Construction Checklist by Rémy Evard, Peter Beckman, Sandra Bittner, Richard Bradshaw, Susan Coghlan,
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Elastomer Compatibility Testing of Renewable Diesel Fuels
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Elastomer Compatibility Testing
Derived Intervention Levels for Tritium Based on Food and Drug Administration Methodology Using ICRP 56 Dose Coefficients (U)
.' I Keywords: Retention: Tritium ICRP 56 Dose Coefficients Derived Intervention Level Lifetime Derived Intervention Levels for Tritium Based on Food and Drug Administration Methodology Using ICRP 56 Dose
Who is Watching You? Video Conferencing Security
Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative
NEAMS Software Licensing, Release, and Distribution: Implications for FY2013 Work Package Planning
ORNL/TM-2012/246 NEAMS Software Licensing, Release, and Distribution: Implications for FY2013 Work Package Planning Preliminary Report (NEAMS Milestone M4MS-12OR0608113) Version 1.0 (June 2012) David E.
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
Automated Transportation Management System
- BOE/RL-93-52 Rev. 1 Automated Transportation Management System (ATMS) Configuration Management Plan /, MAR 2 2 1995 OSTI 1 United States Department of Energy Richland, Washington - Approved for Public
NREL Job Task Analysis: Crew Leader
NREL Job Task Analysis: Crew Leader Chuck Kurnik National Renewable Energy Laboratory Cynthia Woodley Professional Testing Inc. NREL is a national laboratory of the U.S. Department of Energy, Office of
Improving a Gripper End Effector
PNNL-13440 Improving a Gripper End Effector OD Mullen CM Smith KL Gervais January 2001 Prepared for the U.S. Department of Energy under Contract DE-AC06-76RL01830 DISCLAIMER This report was prepared as
Energy Systems Integration
Energy Systems Integration A Convergence of Ideas Ben Kroposki, Bobi Garrett, Stuart Macmillan, Brent Rice, and Connie Komomua National Renewable Energy Laboratory Mark O Malley University College Dublin
Patch Management Marvin Christensen /CIAC
Patch Management Marvin Christensen /CIAC US DOE Cyber Security Group 2004 Training Conference May 26, 2004 Management Track 11:00 am 11:45 pm UCRL-CONF-204220 CIAC 04-099 This work was performed under
Isolation of Battery Chargers Integrated Into Printed Circuit Boards
LLNL-TR-646864 Isolation of Battery Chargers Integrated Into Printed Circuit Boards J. S. Sullivan November 26, 2013 Disclaimer This document was prepared as an account of work sponsored by an agency of
WET BULB GLOBE TEMPERATURE MEASUREMENT AT THE Y-12 NATIONAL SECURITY COMPLEX
WET BULB GLOBE TEMPERATURE MEASUREMENT AT THE Y-12 NATIONAL SECURITY COMPLEX Thomas E. Bellinger, CCM Y-12 National Security Complex Oak Ridge, Tennessee 1. INTRODUCTION To better serve the needs of the
Framework for SCADA Security Policy
Framework for SCADA Security Policy Dominique Kilman Jason Stamp [email protected] [email protected] Sandia National Laboratories Albuquerque, NM 87185-0785 1 Abstract Modern automation systems used
A New Empirical Relationship between Thrust Coefficient and Induction Factor for the Turbulent Windmill State
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy A New Empirical Relationship
Attachment for IBM Internet Security Systems Products and Services
IBM Customer Agreement IBM Ireland Limited Registered in Dublin: No. 16226 Registered Office: Oldbrook House 24-32 Pembroke Road Ballsbridge, Dublin 4. Attachment for IBM Internet Security Systems Products
Network Security Infrastructure Testing
Network Security Infrastructure Testing Version 1.2 October 12, 2005 Prepared by: Sandia National Laboratories Center for SCADA Security Project Lead Ray Parks Technical Lead Jason Hills Technical Support
How to build a security assessment program. Dan Boucaut
How to build a security assessment program Dan Boucaut Agenda 1 Problem statement 2 Business case 3 How to avoid creating more problems Problem statement Security assessments are hard, costly and may take
Wind Forecasting stlljectives for Utility Schedule and Energy Traders
NREUCP 500 24680 UC Category: 1210 Wind Forecasting stlljectives for Utility Schedule and Energy Traders Marc N. Schwartz National Renewable Energy Laboratory Bruce H. Bailey A WS Scientific, Inc. Presented
Risk D&D Rapid Prototype: Scenario Documentation and Analysis Tool
PNNL-18446 Risk D&D Rapid Prototype: Scenario Documentation and Analysis Tool Report to DOE EM-23 under the D&D Risk Management Evaluation and Work Sequencing Standardization Project SD Unwin TE Seiple
Threat Analysis Framework
SANDIA REPORT SAND2007-5792 Unlimited Release September 2007 Threat Analysis Framework David P. Duggan and John T. Michalski Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,
Nuclear Engineering Enrollments and Degrees Survey, 2013 Data
Nuclear Engineering Enrollments and Degrees Survey, 2013 Data Number 72 Oak Ridge Institute for Science and Education 2014 SURVEY UNIVERSE The survey includes degrees granted between September 1, 2012
Sandia Data Archive (SDA) file specifications
SANDIA REPORT SAND2015-1118 Unlimited Release Printed March 2015 Sandia Data Archive (SDA) file specifications Daniel H. Dolan and Tom Ao Prepared by Sandia National Laboratories Albuquerque, New Mexico
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson
Nessus A short review of the Nessus computer network vulnerability analysing tool Authors: Henrik Andersson Johannes Gumbel Martin Andersson Introduction What is a security scanner? A security scanner
Penetration Testing. Presented by
Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing
How To Find Out If The Winds From The Oak Ridge Site Are Calm
EVALUATING THE WIND DATA FROM THE AUTOMATED SURFACE OBSERVING SYSTEM IN OAK RIDGE, TENNESSEE - IS KOQT THE CALMEST SITE IN THE US? Thomas E. Bellinger, CCM Y-12 National Security Complex Oak Ridge, Tennessee
CREATING A EUROPEAN SCADA SECURITY TESTBED
Chapter 17 CREATING A EUROPEAN SCADA SECURITY TESTBED Henrik Christiansson and Eric Luiijf Abstract Supervisory control and data acquisition (SCADA) systems are commonly used to monitor and control critical
Using Virtualization to Help Move a Data Center
Using Virtualization to Help Move a Data Center Jim Moling US Treasury, Financial Management Service Session 7879 Tuesday, August 3, 2010 Disclaimers The opinions & ideas expressed herein are those of
Advanced & Persistent Threat Analysis - I
Advanced & Persistent Threat Analysis - I Burak Ekici [email protected] Department of Computer Engineering, Yaşar University, Turkey. April 21, 2012 Burak Ekici (Dept. of Comp. Eng.) Advanced & Persistent
Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad
Vulnerability Assessment and Penetration Testing CC Faculty ALTTC, Ghaziabad Need Vulnerabilities Vulnerabilities are transpiring in different platforms and applications regularly. Information Security
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
Secure SCADA Communication Protocol Performance Test Results
PNNL-17118 Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability
Industrial Security Solutions
Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats
McAfee Certified Assessment Specialist Network
McAfee Certified Assessment Specialist Network Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 4 Recommended Exam Preparation 4 Exam Objectives 4 Sample
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
WinMagic Encryption Software Installation and Configuration
WinMagic Encryption Software Installation and Configuration Don Mendonsa, Faranak Nekoogar, Harry Martz Lawrence Livermore National Laboratory Livermore, CA 94551 Work performed on the Science & Technology
Requesting Nodes, Processors, and Tasks in Moab
LLNL-MI-401783 LAWRENCE LIVERMORE NATIONAL LABORATORY Requesting Nodes, Processors, and Tasks in Moab D.A Lipari March 29, 2012 This document was prepared as an account of work sponsored by an agency of
Protecting VMs in a Multi-Tenancy Environment
Protecting VMs in a Multi-Tenancy Environment Prepared by: XenServer Engineering www.citrix.com Table of Contents 1. Executive Summary... 3 2. Introduction... 4 3. Preventing Vulnerabilities with XenServer...
Nuclear Engineering Enrollments and Degrees Survey, 2014 Data
Nuclear Engineering Enrollments and Degrees Survey, 2014 Data Number 74 Oak Ridge Institute for Science and Education 2015 SURVEY UNIVERSE The 2014 survey includes degrees granted between September 1,
This document was prepared in conjunction with work accomplished under Contract No. DE-AC09-96SR18500 with the U. S. Department of Energy.
This document was prepared in conjunction with work accomplished under Contract No. DE-AC09-96SR18500 with the U. S. Department of Energy. DISCLAIMER This report was prepared as an account of work sponsored
Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn
Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Overview Assurance & Evaluation Security Testing Approaches
Course Title: Penetration Testing: Network & Perimeter Testing
Course Title: Penetration Testing: Network & Perimeter Testing Page 1 of 7 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics
CARVER+Shock. Jeffrey J. Danneels Department Manager Sandia National Laboratories Albuquerque, NM
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
COST AND PERFORMANCE ANALYSIS OF PHYSICAL SECURITY SYSTEMS. M. J. Hicks
t 3532 @olo'f4478g /Og-..q ~~~~~~ COST AND PERFORMANCE ANALYSIS OF PHYSICAL SECURITY SYSTEMS M. J. Hicks Security Systems Analysis and Development Department, 5845 Sandia National Laboratories,Albuquerque,
What is Cyber Liability
What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
OPEN SOURCE SECURITY
OPEN SOURCE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
