Cyber Attacks: An Emerging Threat to Satellites



Similar documents
Electronic Signature Policy

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Attachment A. Identification of Risks/Cybersecurity Governance

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

OCIE CYBERSECURITY INITIATIVE

Homeland Security Red Teaming

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

IBM Managed Security Services Vulnerability Scanning:

Recommended IP Telephony Architecture

FREQUENTLY ASKED QUESTIONS

For more information or call

Security Risk Assessment

Secure application programming in the presence of side channel attacks. Marc Witteman & Harko Robroch Riscure 04/09/08 Session Code: RR-203

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design

SAFECode Security Development Lifecycle (SDL)

How To Pass A Credit Course At Florida State College At Jacksonville

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Protection profile of an industrial firewall

Firewalls & Intrusion Detection

External Supplier Control Requirements

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

OSI Seven Layers Model Explained with Examples

MS In Forensic Computing (MSFC) Saint Joseph s College. (33 Credits, including a Practicum/Internship)

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

USB Portable Storage Device: Security Problem Definition Summary

Protection profile of an industrial firewall

What is Really Needed to Secure the Internet of Things?

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Firewalls Netasq. Security Management by NETASQ

White Paper Strengthening Information Assurance in Healthcare

IIABSC Spring Conference

Chapter 6: Fundamental Cloud Security

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

SAST, DAST and Vulnerability Assessments, = 4

Overview Commitment to Energy and Utilities Robert Held Sr. Systems Engineer Strategic Energy August 2015

90% of data breaches are caused by software vulnerabilities.

Angel Investing in Cybersecurity: Understanding the Technology

Arbor s Solution for ISP

Technical Brief Distributed Trusted Computing

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Policy. London School of Economics & Political Science. Encrypted Authentication IMT. Jethro Perkins. Information Security Manager. Version 1.

Bellevue University Cybersecurity Programs & Courses

Firewall Security. Presented by: Daminda Perera

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

TeleTrusT Bundesverband IT-Sicherheit e.v.

The case for continuous penetration testing

VOICE OVER IP SECURITY

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Analyzing the Security Significance of System Requirements

Introduction to Security

Computing Infrastructure Risk

Product Standard General Interworking: Internet Server

SIP Security Controllers. Product Overview

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

Agenda , Palo Alto Networks. Confidential and Proprietary.

Using the Domain Name System for System Break-ins

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Introduction to Cyber Security / Information Security

Full Drive Encryption Security Problem Definition - Encryption Engine

How To Secure Cloud Computing

A New Standards Project on Avoiding Programming Language Vulnerabilities

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Chapter 5. Data Communication And Internet Technology

CERT.AZ description as per RfC 2350

544 Computer and Network Security

Privacy & Security of Mobile Cloud Computing (MCC)

Automating Security Testing. Mark Fallon Senior Release Manager Oracle

The Security Scenario 2005: The Future of Information Security

Web Application Security Considerations

Patch and Vulnerability Management Program

IY2760/CS3760: Part 6. IY2760: Part 6

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Basics of Internet Security

Architecture Overview

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

USB Portable Storage Device: Security Problem Definition Summary

Novell. ZENworks Patch Management Design, Deployment and Best Practices. Allen McCurdy Sr. Technical Specialist

Network Service, Systems and Data Communications Monitoring Policy

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Architecting Information Security Services for Federate Satellite Systems

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Transport Layer Protocols

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved

PUF Physical Unclonable Functions

A Survey on Requirements and Design Methods for Secure Software Development*

Ethical Dilemmas in Teaching Computer and Internet Security

Importance of Web Application Firewall Technology for Protecting Web-based Resources

noway.toonux.com 09 January 2014

Application Denial of Service Is it Really That Easy?

UNCLASSIFIED Version 1.0 May 2012

LogRhythm and NERC CIP Compliance

Transcription:

Cyber Attacks: An Emerging Threat to Satellites This presentation does not contain any ITAR restricted material. Paul Wood Southwest Research Institute paul.wood@swri.org

Agenda Cyber Security Threat Environment Evolution Requirements Management for Cyber Security Risks New Tools and Techniques to Mitigate Cyber Security Risks Questions/Comments 2

Traditional Cyber Threat Environment Ground Segment was not networked S/C had obscure protocols & message formats Ground communications links were costly, large, and physically protected Assets were considered low value to attack Easier, more desirable soft targets were available Lightweight cyber attacks not practical 3

Current Cyber Threat Environment Ground Segment are networked S/C have better known protocols & message formats Lower cost, more portable communications links are possible All soft targets are on the radar 4

Emerging Cyber Threats Trends Terrestrial-like networking onboard S/C clusters with concepts for intra-cluster networking S/C may be an extension of the ground network, with network links to relay satellites on orbit Provenance of software, firmware, and components increasingly in question, Demand for capabilities exceeds budgets unless using lower provenance software/hardware 5

Requirements Management for Cyber Security Threats First: Need to recognize that threats exist Second: Need to analyze the risks Third: Need to develop requirements to address cyber security Can use a model similar to safety risk analysis Build a security risk matrix to support analysis and prioritizing of risks 6

Cyber Security Risk Matrix (Consequence + Frequency = Risk Class) Consequence Frequency Catastrophic Critical Marginal Negligible Frequent I I I II Moderate I I II II Occasional I II III III Remote II III III IV Unlikely III III IV IV Impossible IV IV IV IV "Better? Bulk Transfer Alternatives To CFDP 7

Interpreting the Matrix Code from matrix shows risk class once frequency and consequence are known Class I risks must be addressed Class II/III risks require cost/benefits analysis Class IV risks are ignored "Better? Bulk Transfer Alternatives To CFDP 8

Cyber Security Requirements Cyber security risks require product requirements similar to safety or reliability Requirements need to have the following characteristics Clear Concise Testable Tracked in design & verification 9

Example Cyber Security Requirements Weak The software shall incorporate a memory monitor that generates alerts in the event of abnormal memory use The software shall be free of memory stack overflow vulnerabilities Better The software shall incorporate a memory monitor that generates alerts in the event of increasing memory use once system initialization is complete The software shall use counted functions for all string operations 10

New Tools & Techniques to Mitigate Risks Static Code Analysis Many tools available Open source and commercial Greater focus on security in commercial tools Dynamic Analysis Instrumentation of code Test case generation Code coverage Boundary cases These tools generally focus on testing phase 11

Enhanced Compiler (DDFA) Instrument code to enforce security policy at runtime Supports a fight through paradigm Can protect against code with limited provenance or history DDFA = Dynamic Data Flow Analysis 12

Code Instrumentation in DDFA Only code with potential vulnerabilities requires instrumentation 13

Detailed DDFA Example 14

Example Cyber Security Risks Loss of data (denial of service) Resets, corruption of OFPs and control data Potential loss of asset EEPROM write life exhausted Propellant consumption Orientation corruption (pointing, excess spin) Use as weapon Compromise an orbit, hit another asset, deorbit 15

Examples for Mitigating Risks Encryption Geospatial Signatures Strong development processes Peer reviews Testing Active countermeasures DDFA 16

Conclusion Cyber Security is a Concern Threats are Emerging Due To Increasing networking of Space Systems Use of low-provenance software and hardware Identify System Security Requirements & Fix New Techniques & Tools Can Help Static & dynamic code analysis Code augmentation to fight through attacks 17

Questions? 18

Acronyms CCSDS CFDP FTP IETF OSI RFC SCPS SCPS-FP SCPS-TP SMTP TFTP Consultative Committee for Space Data Systems CCSDS File Delivery Protocol File Transfer Protocol Internet Engineering Task Force Open Systems Interconnection Request For Comments Space Communications Protocol Specification SCPS File Protocol SCPS Transport Protocol Simple Mail Transfer Protocol Trivial File Transfer Protocol "Better? Bulk Transfer Alternatives To CFDP 19