Risk and Security Assessment. Zbigniew Kalbarczyk

Similar documents
SCADA System Overview

Cyber Security and Privacy - Program 183

Working to Achieve Cybersecurity in the Energy Sector

!! "# $%!& $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565

Airports and their SCADA Systems. Dr Leigh Armistead, CISSP. Peregrine Technical Solutions

Introduction to Cyber Security / Information Security

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

William Hery Research Professor, Computer Science and Engineering NYU-Poly

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT

future data and infrastructure

Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif

IEEE-Northwest Energy Systems Symposium (NWESS)

Improving SCADA Control Systems Security with Software Vulnerability Analysis

Cybersecurity in a Mobile IP World

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

SCADA Security Measures

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

The VIKING Project: An Initiative on Resilient Control of Power Networks

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE

Understanding SCADA System Security Vulnerabilities

Smart Grid Cybersecurity

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Cyber security. Protecting critical infrastructure in a changing world

NERC CIP VERSION 5 COMPLIANCE

Intrusion Detection for Grid and Cloud Computing

Vendor System Vulnerability Testing Test Plan

Facilitated Self-Evaluation v1.0

Claes Rytoft, ABB, Security in Power Systems. ABB Group October 29, 2009 Slide 1

Models for Cyber Security Analysis

STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Cybersecurity Risk Assessment in Smart Grids

Opportunities to Overcome Key Challenges

The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Bridging the knowledge gap between power engineering and cyber security: Imparting the interdisciplinary knowledge in cyber security for power systems

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Evolution of Control for the Smart Transmission Grid

How can the Future Internet enable Smart Energy?

Intrusion Detection for SCADA Systems

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

UNIDIRECTIONAL SECURITY GATEWAYS. Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments

A Systems Engineering Approach to Developing Cyber Security Professionals

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

What Risk Managers need to know about ICS Cyber Security

Goals. Understanding security testing

Cisco Advanced Services for Network Security

A Test Bed for Digital I&C and Cyber Security for NPPs

Concept and Project Objectives

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Next Generation Grid Data Architecture & Analytics Required for the Future Grid

Cyber Security & Compliance Briefing

DeltaV System Cyber-Security

Firewalls Overview and Best Practices. White Paper

Ovation Security Center Data Sheet

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Safe Network Integration

Redefining MDM for a Smart Grid Enabled

How To Secure Cloud Computing

Synchronized real time data: a new foundation for the Electric Power Grid.

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

APPENDIX - A. Tools Used. 1. Qualnet Simulator. 2. TRMSim-WSN Simulator. 3. SnetSim Simulator. 4. EDX SignalPro. 5.

Cyber-Physical Systems Security for Smart Grid

Design Document. Team Members: Tony Gedwillo James Parrott David Ryan. Faculty Advisor: Dr. Manimaran Govindarasu

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

A General-purpose Laboratory for Large-scale Botnet Experiments

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report.

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

NERC CIP Version 5 and the PI System

1. Simulation of load balancing in a cloud computing environment using OMNET

Symphony Plus Cyber security for the power and water industries

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

The Importance of Cybersecurity Monitoring for Utilities

Transcription:

Risk and Security Assessment Zbigniew Kalbarczyk 1

TCIPG Cluster Arrangement Communication and Data Delivery for Wide-Area Monitoring and Control Trustworthy cyber infrastructure and technologies for wide-area monitoring and control Wide-Area Monitoring and Control Applications TCIPG Trustworthy cyber infrastructure and technologies for active demand management Component Technologies Advanced monitoring and control for distribution networks Responding to and managing cyber events Design of semi-automated intrusion detection and response techniques Risk and security assessment Model-based Assessment Tools Experiment-based Assessment Tools 2

Cluster Overview Cyber infrastructure for power grid constitutes a large-scale heterogeneous system that provides critical services on the continuous basis Many players contribute to robustness of the infrastructure: energy producers and providers, users, equipment manufacturers, standardization bodies This cluster builds methods and associated tools to support design and quantitative assessment of devices, hardware/software architectures, protocols, applications, and monitoring and protection mechanisms/algorithms used to provide security and reliability in the context of power grid 3

Cluster Problem Areas The cluster focuses on issues associated with providing techniques to analyze and measure power grid resiliency to Malicious attacks and accidental errors Potential volatility of energy sources Cluster directly addresses technical issues in: Designing, testing, and evaluating applications, protocols, and devices employed to permit uninterrupted energy delivery Analyzing integrity of security policies Reasoning about vulnerabilities being in applications or security policies Assessing resiliency of different system configurations Analyzing reliability and economics in smart grid settings 4

Cluster Objectives Provide methods and tools that use simulation, modeling and experimentation to Characterize system resiliency in presence of malicious attacks and accidental errors Measure and quantify the system security/reliability Evaluate effectiveness and performance of novel mechanisms for continuous monitoring and defense against potential intruders and failures Analyze and assess interplay between economics, renewable energy sources and demand response 5

Cluster Activities (with more details in posters) Ongoing Automatic verification of network access control policy implementations Modeling methodologies for power grid control system evaluation Quantifying the impacts on reliability of coupling between power system cyber and physical components Analysis of impacts of smart grid resources on economics and reliability of electricity supply Test-bed driven assessment: experimental validation of system security and reliability Trustworthiness enhancement tools for SCADA software and platforms Tools for assessment and self-assessment of ZigBee networks Fuzz-testing of proprietary SCADA/control network protocols New Starts Security and robustness evaluation and enhancement of power system applications Completed Vulnerability assessment tool using model checking 6

Cluster Accomplishments and Impacts Developed software tool (NetAPT) to analyze security policy implementation for conformance with global security policy specification for industrial control networks NetAPT has been released to select industry partners for evaluation NetAPT was used for an internal audit and vulnerability assessment at a major utility, for a network with nearly 100 firewalls and several thousand hosts Close interaction with utility partners and NERC CIP auditors 7

Cluster Accomplishments and Impacts, cont. Developed generic tools (software and hardware) for on-line system assessment Hot-patching tool (Katana) Lightweight in-kernel intrusion-detection system (Autoscopy Jr.) First generation tools for 802.15.4/ZigBee Networks assessment Developed methods and tools for experimental assessment of power grid applications & hardware configurations using testbed Built experimental setup to mimic current generation substation/scada Created fault/error injection tool to simulate impact of malicious errors 8

Cluster Accomplishments and Impacts, cont. Developed high fidelity simulation engine Virtual machine (OpenVZ) based high functional & temporal fidelity network simulation with good scalability Parallel network simulator that enables interactive communication with emulation analysis of various application scenarios in a large-scale setting Developed formal tools for vulnerability assessment A technique and a tool to discover vulnerabilities in an application using symbolic execution and model checking 9

Cluster Accomplishments and Impacts, cont. Developed simulation to analyze impact of smart grid resources on economics and reliability of electricity supply Evaluated impact of renewable generation, energy storage, and demand response on markets and energy delivery Developed simulation (MATLAB based) to characterize the impact of GPS clock spoofing attack on phase shift error on PMU data Load shedding can be cheaper than purchasing reserve generation capacity 10

Cluster Directions for Coming Year Release of NetAPT to SERC for use in audits Work with INL to interface NetAPT with Sophia Design of electricity contracts viewing electricity as a service or product with multi-attributes rather than a commodity Full characterization of the impact of attacks as a function of the number of spoofed satellites Characterization of transient error and attack propagation and impact on power equipment and applications in substation and SCADA Experimental validation of bad data (due to GPS clock spoofing) detection algorithm Work on transitioning Autoscopy Jr. (an intrusion detection system) into real devices used in power grid settings Work on integration of the simulation capabilities with the test bed environment for experimental system evaluation 11

12 Questions and Discussion