for Vehicle Cyber Security

Size: px
Start display at page:

Download "for Vehicle Cyber Security"

Transcription

1 Guidelines for Vehicle Cyber Security Hiro Onishi Alpine Electronics Research of America, Inc. la.com 2013 Alpine Electronics, Inc. Not for commercial distribution. 1

2 INDEX 1. Cyber Physical System Risks 2. Vehicle Cyber Risks Vulnerabilities in maintaining vehicle cyber security 3. Vehicle Cyber Security Approaches Risk analysis Concept of system security 4. Vehicle Cyber Security Guidelines European project EVITA Japanese agency (IPA) sguide SAE committee s approach 5. Summary 2

3 1. Risks for Cyber Physical System Case 1 Davis Besse Nuclear Plant, Ohio (Jan. 25, 03) 16:00: Noticed network slow down 16:50: Safety Parameter Display System (SPDS) crashed 17:13: Plant process computer crashed (had analog backup) Reference: Edward Fok. (Dec. 7, 11) Introduction d i to Cyber Cb Security Issues for Transportation [Web seminar] 3

4 1. Risks for Cyber Physical System Case 2 Air plane manipulation (Apr. 13, US) + Security consultants pointed out: They were able to manipulate airplane s navigation system with android application *. + 4 days later, Dept. of Transportation denied the possibility **. Reference: *: ~ WIRED 04/11/android plane hijack **: ~ Information Weekly security /faa dismisses android app airplane takeo/

5 1. Risks for Cyber Physical System Case 3 Lodz, Poland (Jan. 08) 4 light rail trams derailed, 12 people injured Tool used: Converted television IRremote Exploit: Locks, disabling track changes when vehicle presented were not installed Reference: Edward Fok. (Dec. 7, 11) Introduction to Cyber Security Issues for Transportation [Web seminar] Pictures: Courtesy of EUROPICS 5

6 1. Cyber Physical System Risks Currently, Cyber physical b h i lsystem risks ik can be a serious social concern, as it may impact the following: + (Nuclear / chemical) plants + Military facilities and weapons + Government facilities and systems + Transportation (Trains, Airplanes, Vehicles, Ships, etc) + Utilities i (Electric grid, id Water line, etc) + Finance (ATM, Ticket machines, etc) + Medical / Health related equipment and others 6

7 2. Vehicle Cyber Risks Vehicles can be targets of cyber attacks, because + Vehicles can be used to inflict serious bodily injury + Vehicles are high value items + Vehicles are frequently parked in un secured locations + Vehicle could be targeted for anti social activity (ex. terrorism) Stop/control massive number of vehicles Cause massive panic through false information References: ~ A. Weimerskirch, Do Vehicles Need Data Security? SAE World Congress, Detroit, MI, Apr. 11 ~ Information Technology Promotion Agency. (Apr. 11) Movements of Vehicle Cyber Security, (Japanese) 7

8 2. Vehicle Cyber Risks Cruise control ABS Car Telephone?? Air Bag Telematics V2I communication Navigation ACC V2V communication Emergency call LDW Autonomous driving electronics based Modern cars can come with up to 80 CPUs, 2 miles of cable, several hundred MB of software, and 5 in vehicle networks, Vehicle is NO longer just a Mechanical System Reference: A. Weimerskirch ESCRYPT, Security Considerations for Connected Vehicles, in SAE Government and Industry Meeting, Washington DC, Jan. 12 8

9 2. Vehicle Cyber Risks Internet Smart-phone Hacker Music-player Computer Virus or malware carried in smart phones or music players can easily invade automotive electronics 9

10 2. Vehicle Cyber Risks Special risks CASE 1 Communication for crash avoidance Limited time (100ms order) CASE 2 Vehicles are only able to communicate externally through mobile phones Base station Vehicle Vehicle A Mobile phone Vehicle ce B 10

11 2. Cyber Risks for Vehicle Additional vulnerabilities, compared to computer/internet t tsecurity. VULNERABILITY 1: Limited vehicle external connectivity Difficulty in updating security software Difficulty in monitoring automotive electronics status VULNERABILITY2: Limitedcomputational performance, Due to high endurance and long vehicle life cycle (10 years) Vulnerability to compete against hacker s PC VULNERABILITY 3: Real time operation OEM VULNERABILITY 4: Vehicle consists of various components/parts. Large g industry pyramid from suppliers to OEM VULNERABILITY 5: Unpredictable attack scenarios and threats VULNERABILITY 6: Hazard to drivers and passengers lives Tier 1 Tier 2 Parts suppliers Reference: ~ Information Technology Promotion Agency (of Japanese government). (Apr. 11) 10 report: Movements of Vehicle Cyber security, (Japanese) ~ A. Weimerskirch, Security Considerations for Connected Vehicles, in SAE Government and Industry Meeting, Washington DC, Jan. 12 ~ P. Kleberger, T. Olovsson and E. Jonsson, "Security aspects of the in vehicle network in the connected car, Intelligent Vehicles Symposium (IV), 11 IEEE, vol., no., pp , 5 9 Jun

12 3. Vehicle Cyber Security Approaches Additional complicated vulnerabilities, compared to computer/internet security Industry expects both proper guidelines & competitive approaches. To dfi define proper guidelines, well defined risk analysis is required. 12

13 3. Vehicle Cyber Security Approaches Proper security requires well defined riskanalysis. Vehicle cyber security is vulnerable, but Risk = Vulnerability Inputs: Risk=function(Vulnerability, Hackers motivation/skills, Hazard) Vulnerability: Vulnerability of system security Hackers motivation/skills: Adversary ROI Investment /risk /return Hazard: aad Magnitude of hazards, when security is compromised. Reference: ~ D. Etue (SafeNet), web seminar Cyber Security in Highly Innovative World, (Jul, 13) 13

14 3. Vehicle Cyber Security Approaches Risk analysis: Hackers motivations/skills New types Aims Hacker Type Target Approaches Type (potential) ) Skill Financial Financial, Harm to individual Harm to individual Damage to community Vehicle, Components/parts Driver, Driver s property Driver Community Classic: Steal vehicle, components or parts Acquire driving log or history and physically attack drivers or steal/damage drivers property Manipulate single or small number of vehicles to cause (severe) accidents Manipulate large number of (e.g. police) vehicles to cause (severe) accidents and damage to community Individual, Group Individual, Group Individual, Group Group, Organization (i.e. terrorism) Low, Medium Medium Medium, High High + In general, the person who invents a tool to break security possesses a much higher skills than the person who is only using the tool. e.g.: the case of immobilizer cutter + Inside hackers possess deeper knowledge about the security mechanism. References: ~ A. Weimerskirch, Do Vehicles Need Data Security? SAE World Congress, Detroit, MI, Apr. 11 ~ Information Technology Promotion Agency. (Apr. 11) Movements of Vehicle Cyber Security, (Japanese) ~EVITA deliverable D2.3 Security requirements for automotive on board networks based on dark side scenarios ( 09) 14 14

15 3. Vehicle Cyber Security Approaches * Risk analysis: Hazard assessment ISO 26262(Automotive Functional Safety) ) Functions CD/DVD control Sample of hazard assessment Vehicle center console Sample Malfunctions CD/DVD is not working Erroneous guidance, Navigation e.g. opposite direction on freeway Emergency call is not placed at accident Rearview camera When backing up, image of rear view (Monitoring) camera freezes (shows old image) Air conditioner Heater is not working during the winter in Canada Exposure Controllability Severity ASIL E3 C1 S1 QM E2 C2 S3 Emergency Call E1 C3 S3 A E3 C2 S2 A Control E3 C3 S3 Turn signal Shows signal activation in cluster, In cluster panel though actual signal is not working E1 C2 S3 ** Power window Unwanted window closing E2 C2 S3 A Air bag Fault activation during driving E4 C3 S3 A C QM D Reference: *: H. Onishi, Approach for Vehicle Cyber Security with Functional Safety Concept in SAE World Congress, Detroit, MI, Apr. 13 **: R. Hamann et al., ISO Release Just Ahead: Remaining Problems and Proposals for Solutions" in SAE World Congress, Detroit, MI, Apr

16 3. Vehicle Cyber Security Approaches Concepts of system security + 6 security phases should be covered by both process/management and technologies ~CIP(Critical Infrastructure Protection)byNERC(North American Electric Reliability Corporation) * 6 phases Analysis and Assessment Remediation Indications and Warnings Mitigation ii i Incident Response Reconstitution + New concept: Trustworthy (computing)design approaches ** Initialdesignsystem system in consideration of Security, Privacy, Reliability and Business Integrity. e.g. Brake should be reliable Rf References: *: **: Craig Mundie (Microsoft CTO and Senior VP), ( 02) 16

17 4. Vehicle Cyber Security Guidelines Guidelines samples for cyber physical systems Guideline Name Publisher IEC62443 (Industrial network & system security) Domain Industrial system Contents Process Technology Description Cover broader industrial systems NIST Guide to Industrial Control System security CIP (Critical Infrastructure Protection) NIST NERC PC/internet & Industrial system Industrial system PC/internet & Industrial system (mainly) (part of) Handle incidents (including attack analysis, recovery, etc) Cover broader industrial systems, from management & technical sides Cover broader critical infrastructures, Considering, 6 phases (e.g. mitigation, recovery) EVITA deliverables Vehicle information security guide EU agency IPA Vehicle Vehicle Outputs from research project J3061(Cyber security Guidebook for Cyber Physical Automotive Systems) ) ** Vehicle Under development References: *: **: 17

18 4. Vehicle Cyber Security Guidelines European project EVITA Created possible attack trees for selected use cases (18 use case for 6 groups). Attack goal Attack methods Sample of attacktree Compromise driver s privacy Reference: ~EVITA deliverable D2.3 Security requirements for automotive on board networks based on dark side scenarios ( 09) 18

19 4. Vehicle Cyber Security Guidelines European project EVITA Provide security requirements, based on the identified attack trees. Sample of security requirements Privacy/confidentiality Reference: ~EVITA deliverable D2.3 Security requirements for automotive on board networks based on dark side scenarios ( 09) 19

20 4. Vehicle Cyber Security Guidelines European project EVITA Provide reference architecture including HSW(Hardware( Security Module) ) + Development of Hardware Security Modules deployed with ECUs Key protection Trusted computing base Secured Storage Cost effective + In car cryptographic protocols to secure ECU ECU and sensor communication + Software framework integrating authentication, encryption & access control, etc Reference: ~ B. Weyl, et al., The EVITA Project: Securing the Networked Vehicle in escar (Dresden, Gemany 11) 20

21 4. Vehicle Cyber Security Guidelines Japanese agency (IPA) s guide + Covers whole life cycle of vehicle ( Planning ~ Disposal ). + Covers all players related to vehicle life cycle. Information Technology Promotion Agency Reference: ~ 21

22 4. Vehicle Cyber Security Guidelines Japanese agency (IPA) s guide Vehicle system model of IPA guideline Categorized functions in 3 groups Reference: ~ 22

23 4. Vehicle Cyber Security Guidelines Japanese agency (IPA) s guide Threats and countermeasures (based on vehicle system model) : Direct threats thru physical I/O : Indirect threats thru vehicle bus :Potentialeffective countermeasures Reference: ~ 23

24 4. Vehicle Cyber Security Guidelines SAE Electrical system security committee s approach Automotive Security Guidelines & Risk Management Taskforce (under Vehicle Electrical System Security committee ) + Creates Cyber security Guidebook for Cyber Physical Automotive Systems Complies with Risk Methodology in ISO Functional Safety Standard Contains automotive cyber security framework and processes Evaluates Threat Analysis and Risk Assessment (TARA) methods Follows simple approach to allow effective implementation across the automotive industry Contains elements of existing industry security standards Provides definitions, Acronyms and sample templates + Expected to be completed by Mid 2014 Reference: ~L. Boran (SAE Committee Chair) Automotive Cyber Security, escar (Nov, 13, Frankfurt, Germany) 24

25 5. Summary Vulnerabilities in vehicle cyber security: Limited vehicle external connectivity Limited computational performance Real time operation Various components/parts from various suppliers Unpredictable attack scenario and threats Hazardto driversand passengers lives Proper security requires well defined riskanalysis Risk depends on hackers motivation/skills, magnitude of hazard and vulnerability of security. Many guidelines have been issued or are under development for the automotive industry. EVITA(E safety vehicle intrusion protected applications) guideline IPA(Information ( Promotion Agency) guideline SAE guideline under development 25

26 Thank you for your attention!! Hiro Onishi Alpine Electronics Research of America, Inc. la.com Tel: Slide design: Mari Hatazawa la.com l 26

Paradigm Change of Vehicle Cyber Security

Paradigm Change of Vehicle Cyber Security 2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of this publication for

More information

The relevance of cyber-security to functional safety of connected and automated vehicles

The relevance of cyber-security to functional safety of connected and automated vehicles The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction

More information

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing

More information

Cybersecurity And The Automotive Industry

Cybersecurity And The Automotive Industry Cybersecurity And The Automotive Industry Dr Andrew Brown, Jr PE, FESD, FSAE, NAE Vice President & Chief Technologist Delphi 2014 Global Symposium on Connected Vehicles & Infrastructure April 21-23, 2014

More information

Security risk analysis approach for on-board vehicle networks

Security risk analysis approach for on-board vehicle networks 1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle

More information

Automotive and Industrial Data Security

Automotive and Industrial Data Security André Weimerskirch Cybersecurity for Cyber-Physical Systems Workshop April 23-24, 2012 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions Communication

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process By Andreas Lindenthal and Franz Walkembach, Wind River The concept of autonomous vehicles or unmanned

More information

Security in Vehicle Networks

Security in Vehicle Networks Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development

More information

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security

More information

- Toward Trustful IoT Life -

- Toward Trustful IoT Life - CCDS Introduction - Toward Trustful IoT Life - Connected Consumer Device Security Council (CCDS) Kosuke Ito, Secretary General Copyright 2015 Connected Consumer Device Security Council Proprietary 1 ISSUE:

More information

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

Vehicular Security Hardware The Security for Vehicular Security Mechanisms escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security

More information

Automotive Software Development Challenges Virtualisation and Embedded Security

Automotive Software Development Challenges Virtualisation and Embedded Security Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive

More information

Symphony Plus Cyber security for the power and water industries

Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries

More information

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards A Concise Model to Evaluate Security of SCADA Systems based on Security Standards Nasser Aghajanzadeh School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran Alireza Keshavarz-Haddad

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software

Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software 133 Hitachi Review Vol. 63 (2014), No. 2 Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software Yoshinobu Fukano, Dr. Sci. Kosei Goto Masahiro Matsubara

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Cyber Security Seminar KTH 2011-04-14

Cyber Security Seminar KTH 2011-04-14 Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid [email protected] Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon

More information

Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security

Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile

More information

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH Arthur Carter, Frank Barickman, NHTSA Electronic Systems Safety Research Division Electronic Systems Safety (ESS) Research Division conducts research to ensure

More information

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The

More information

CTR System Report - 2008 FISMA

CTR System Report - 2008 FISMA CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

Challenges for the European Automotive Software Industry

Challenges for the European Automotive Software Industry Challenges for the European Automotive Software Industry Viewpoint of a safety supplier 28 th April 2010 Franck Lesbroussart What Trends do we see? Integration of functions Functionalities are expanding

More information

Connected and Automated Vehicles and the Cybersecurity Threat

Connected and Automated Vehicles and the Cybersecurity Threat Connected and Automated Vehicles and the Cybersecurity Threat How the Industry is Responding Dr Andrew Brown, Jr, PE, FESD, FSAE, NAE Vice President & Chief Technologist CAR Breakfast Briefing Series February

More information

PEDESTRIAN AND BICYCLE ACCIDENT DATA. Irene Isaksson-Hellman If Insurance Company P&C Ltd.

PEDESTRIAN AND BICYCLE ACCIDENT DATA. Irene Isaksson-Hellman If Insurance Company P&C Ltd. PEDESTRIAN AND BICYCLE ACCIDENT DATA Irene Isaksson-Hellman If Insurance Company P&C Ltd. Vulnerable road users 2 Number Number Official accident statistics 45 35 4 3 35 25 3 25 2 2 15 15 1 1 5 5 5 4 5

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

future data and infrastructure

future data and infrastructure White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal

More information

Nuclear Security Requires Cyber Security

Nuclear Security Requires Cyber Security Nuclear Security Requires Cyber Security A. DAVID MCKINNON, PH.D., MARY SUE HOXIE Cyber Physical Security Team, National Security Directorate Project on Nuclear Issues (PONI) Fall 2015 Conference PNNL-SA-113027

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis

Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis Andreas Fuchs and Roland Rieke {andreas.fuchs,roland.rieke}@sit.fraunhofer.de Fraunhofer Institute for

More information

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance

More information

Car Connections. Johan Lukkien. System Architecture and Networking

Car Connections. Johan Lukkien. System Architecture and Networking Car Connections Johan Lukkien System Architecture and Networking 1 Smart mobility, TU/e wide Cooperative Driving (platooning), A270: Helmond-Eindhoven, 2011 (Mechanical Engineering/TNO) Full electric:

More information

Information Security Awareness Training

Information Security Awareness Training Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information

More information

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder [email protected] Winter School in Information Security, Finse May

More information

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations

More information

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded

More information

Pervasive Computing und. Informationssicherheit

Pervasive Computing und. Informationssicherheit Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing

More information

Thatcham Research The Insurers Automotive Research Centre

Thatcham Research The Insurers Automotive Research Centre Thatcham Research The Insurers Automotive Research Centre 15 th October 2014 Mike Briggs- Vehicle Crime Research Manager Overview of Thatcham The Motor Insurance Research Centre Owned by the major UK Motor

More information

Document ID. Cyber security for substation automation products and systems

Document ID. Cyber security for substation automation products and systems Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has

More information

www.siemens.com / gridsecurity Cyber Security Global solutions for energy automation Answers for infrastructure and cities.

www.siemens.com / gridsecurity Cyber Security Global solutions for energy automation Answers for infrastructure and cities. www.siemens.com / gridsecurity Cyber Security Global solutions for energy automation Answers for infrastructure and cities. Cyber Security: Security from the very start More and more, we are networking

More information

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca

More information

Who s Doing the Hacking?

Who s Doing the Hacking? Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from

More information

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security A Holistic Security Risk Management Approach www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security This white paper discusses current

More information

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored

More information

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems. 1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood

More information

Safety and security related features in AUTOSAR

Safety and security related features in AUTOSAR Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

This is a preview - click here to buy the full publication

This is a preview - click here to buy the full publication TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

Cyber Security for NERC CIP Version 5 Compliance

Cyber Security for NERC CIP Version 5 Compliance GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...

More information

Claes Rytoft, ABB, 2009-10-27 Security in Power Systems. ABB Group October 29, 2009 Slide 1

Claes Rytoft, ABB, 2009-10-27 Security in Power Systems. ABB Group October 29, 2009 Slide 1 Claes Rytoft, ABB, 2009-10-27 Security in Power Systems October 29, 2009 Slide 1 A global leader in power and automation technologies Leading market positions in main businesses 120,000 employees in about

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM

ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM Domain I: Feasibility Study - identify, scope and justify the automation project Task 1: Define the preliminary scope through currently

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID 15-0454 Abstract

An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID 15-0454 Abstract An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Authors(s): Arthur Carter, David Freeman, and Cem Hatipoglu National Highway Traffic Safety Administration (NHTSA) Paper

More information

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios Lucie Langer and Paul Smith [email protected] AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September,

More information

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing

More information

Crucial Role of ICT for the Reinvention of the Car

Crucial Role of ICT for the Reinvention of the Car Joint EC / EPoSS / ERTRAC Expert Workshop 2011 Electric Vehicle System Integration and Architecture Crucial Role of ICT for the Reinvention of the Car Karl-Josef Kuhn Siemens Corporate Research and Technologies

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

Data Security Concerns for the Electric Grid

Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical

More information

GE Measurement & Control. Cyber Security for Industrial Controls

GE Measurement & Control. Cyber Security for Industrial Controls GE Measurement & Control Cyber Security for Industrial Controls Contents Overview...3 Cyber Asset Protection (CAP) Software Update Subscription....4 SecurityST Solution Options...5 Centralized Account

More information

Effective Defense in Depth Strategies

Effective Defense in Depth Strategies Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the

More information

How To Make A Car A Car Into A Car With A Car Stereo And A Car Monitor

How To Make A Car A Car Into A Car With A Car Stereo And A Car Monitor Designing 1000BASE-T1 Into Automotive Architectures Alexander E Tan Ethernet PHY and Automotive PLM [email protected] Ethernet IP & Automotive Tech Day October 23 & 24th, 2014 Agenda What Does 1000BASE-T1

More information

8/27/2015. Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354. Don t Wait Another Day

8/27/2015. Brad Schuette IT Manager City of Punta Gorda bschuette@pgorda.us (941) 575-3354. Don t Wait Another Day Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354 2015 FRWA Annual Conference Don t Wait Another Day 1 SCADA Subsystems Management Physical Connectivity Configuration Mgmt.

More information

Breakthrough Cyber Security Strategies. Introducing Honeywell Risk Manager

Breakthrough Cyber Security Strategies. Introducing Honeywell Risk Manager Breakthrough Cyber Security Strategies Introducing Honeywell Risk Manager About the Presenter Eric D. Knapp @ericdknapp Global Director of Cyber Security Solutions and Technology for Honeywell Process

More information

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]

More information

Smart Grid Security: A Look to the Future

Smart Grid Security: A Look to the Future Smart Grid Security: A Look to the Future SESSION ID: TECH-W03A Gib Sorebo Chief Cybersecurity Technologist Leidos @gibsorebo Overview Distributed Energy Plug-in Vehicles Evolving Threats: Market Manipulation,

More information

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc. Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Testing the Internet of Things

Testing the Internet of Things Presentation to TMF Testing the Internet of Things Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing What is the IoT? Wikipedia The Internet of

More information

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution

More information

The Importance of Information Technology (IT) for Transportation Security

The Importance of Information Technology (IT) for Transportation Security The Importance of Information Technology (IT) for Transportation Security John C. Falcocchio and Rae Zimmerman WISSP10, Abu Dhabi, October 4, 2010 This presentation is for use at WISSP10, and not for further

More information

OCIE CYBERSECURITY INITIATIVE

OCIE CYBERSECURITY INITIATIVE Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

U.S. Department of Homeland Security s National Cybersecurity and Communications Integration Center

U.S. Department of Homeland Security s National Cybersecurity and Communications Integration Center U.S. Department of s National Cybersecurity and Communications Integration Center Rick Lichtenfels Director, Assist and Assess Branch National Cybersecurity and Communications Integration Center (NCCIC)

More information