4 th Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) 4 th (CS) 2 /HEP Workshop,

Slides:



Advertisements
Similar presentations
Brute Force Attack Against Wi-Fi Protected Setup
Advertisements

Part 1 3.Yes 5. C 25 H O 2 25CO H 2 O Part C 2 H 2 + 5O 2 4CO 2 + 2H 2 O 9. Complete: 1/10, Incomplete: Black deposit/product.
EURoma meeting September 2013, Sofia How to involve stakeholders for Roma inclusion under the European Code of Conduct on Partnership.
Operational Programme I – Cohesion Policy Event part-financed by the European Union European Regional Development Fund Evaluation Plan for Maltas.
Secure and Web Browsing Sébastien Dellabella – Computer Security Team.
How things go wrong. The lucky one and the unlucky one Dr. Stefan Lüders (CERN Computer Security Officer) 3 rd (CS) 2 /HEP Workshop, Grenoble (France)
Lampasas ISD Technology Updates Network Administrator
Technology & You! Download this PowerPoint at:
Brent Castagnetto, CBRM, CBRA, MABR Manager, Cyber Security Audits
Hands-on: install Mobile
Federated Identity Management for Research Communities: FIM 4 R CSC, Helsinki 2 nd October 2013 Bob Jones, CERN.
Khammar Mrabit Director Office of Nuclear Security
WVSOM Microsoft Office 2007 to Office 2013 Migration
Office 365 Info Instructions on how to login and create documents.
Operating Systems Operating Systems - Winter 2011 Dr. Melanie Rieback Design and Implementation.
Operating Systems Operating Systems - Winter 2012 Dr. Melanie Rieback Design and Implementation.
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
COMMUNITY CONNECTIONS: How MA Students Can Get Linked Into Volunteer Opportunities, Internships and Jobs A Presentation to MAPA Lauren Toker
There is a widespread problem in the housing sector whereby young people have a difficult time when moving into their first home on their own. Many young.
3 rd Control System Cyber-Security Workshop A Summary of this year’s meeting Dr. Stefan Lüders (CERN Computer Security Officer) with contributions from.
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
Managing Student Access. What will we cover Registration Options Student Uploads Login Options Alumni Access versus Student Access.
KIT – Universität des Landes Baden-Württemberg und nationales Forschungszentrum in der Helmholtz-Gemeinschaft STEINBUCH CENTRE FOR COMPUTING - SCC
©EverFi, Inc. All rights reserved. Please Contact: Sarah Pratt Ponder EverFi provides FREE online platforms High School:
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
LogMeIn.com By: Casey Davidson. What is it? Free Web-based VNC Client Remotely control any PC or Mac from anywhere in the world No network configuring.
Spring 2003, IEOR Experience and Interface Design For Engineers A New Engineering Direction Mohsen Ashraf Alice ChenJake Gessin Milan Lee Angela.
Company LOGO Internet Safety A Community Approach.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Installing and Troubleshooting Hardware Device and Drivers Chapter 6 powered by dj.
[Name / Title] [Date] Effective Threat Protection Strategies.
Director of Research, SANS Institute
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Anderson School of Management University of New Mexico.
Slide 1 Tomorrow’s Technology and You Chapter 10 Computer Security.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
Control System Cyber-Security Workshop A Summary of Yesterday’s Meeting Dr. Stefan Lüders (CERN IT/CO) with slides from P. Chochula (ALICE), S. Gysin (FNAL),
Control Systems Under Attack !? …about the Cyber-Security of modern Control Systems Dr. Stefan Lüders (CERN IT/CO) (CS) 2 /HEP Workshop, Knoxville (U.S.)
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Cluster Management Scorecard FITT (Fostering Interregional Exchange in ICT Technology Transfer)
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Use of CERN’s Computing Facilities Why is security important? What are the rules? HR Induction Programme.
SHAREPOINT PAKISTAN USER GROUP THE ONLY SHAREPOINT COMMUNITY IN PAKISTAN ONE OF THE OLDEST IN ASIA.
 You will need to be able to Discuss the use of networks both in the workplace and at home.  Because of this, you will need to: › identify different.
Cyber Security Awareness Why people are of N o 1 importance… CERN Computer Security Team (2009) L. Cons, S. Lopienski, S. Lüders, D. Myers “Protecting.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
TSQM Overall Merged Data Analysis by Industry Analysis by Company Size July 10, 2006 Vicki Deng.
Problems to Overcome Implementation Issues at CERN Dr. Stefan Lüders (CERN Computer Security Officer) (CS) 2 /HEP Workshop, Kobe (Japan) October 11th 2009.
Value judgements in (fiscal policy) auditing Sami Grönberg Jenni Jaakkola National Audit Office of Finland.
Control System Cyber-Security Workshop A Summary of Yesterday’s Meeting Dr. Stefan Lüders (CERN Computer Security Officer) with slides from B. Copy (CERN),
AARNet Copyright 2012 Commercial in Confidence 1 Internet Traffic Management and Accounting Workshop Brisbane August 28 th & 29 th, 2012.
3 rd Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) 3 rd (CS) 2 /HEP Workshop,
Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) (CS) 2 /HEP Workshop, Kobe (Japan)
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Building Our IT Security Lines of Defense Working together to protect Government’s IT systems.
Real Life Scenario An employee in the Finance and Business Operations receives a targeted phishing . Follows instructions and infects his or.
Rapid Research - Cybercrime
CompTIA CAS-003 Exam Study Material - CompTIA CAS-003 Exam Dumps Realexamdumps.com
Implementing and Auditing the Critical Controls
12 STEPS TO A GDPR AWARE NETWORK
System Management in a Windows based Control Environment
LO1 - Know about aspects of cyber security
World-Leading Research with Real-World Impact!
“Workplace Behaviour: Activating your greatest security asset”
WTF… About the unsecurity of IoT
Presentation transcript:

4 th Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) 4 th (CS) 2 /HEP Workshop, San Francisco (California) October 6 th, 2013

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Dr. Stefan Lüders 4 th CS2/HEP Workshop October 6 th 2013 Attackers vs. Defense There is no 100% security. Security is as good as weakest link: Attacker chooses time, place, method Defender needs to protect against all…

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Dr. Stefan Lüders 4 th CS2/HEP Workshop October 6 th 2013 Attackers vs. Defense There is no 100% security. Security is as good as weakest link: Attacker chooses time, place, method Defender needs to protect against all… Targeted attackers ( APTs) are focused and keen, have better skills/networks, are better financed/resourced The untargeted/stupid attackers might be caught… Automatisms, at least, can be fought. Defense usually lacks money/resources/networks. (International) Law is always a step behind. Anonymous is a handful of geniuses surrounded by a legion of idiots. Cole Stryker

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Dr. Stefan Lüders 4 th CS2/HEP Workshop October 6 th 2013 Attackers vs. Defense

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Dr. Stefan Lüders 4 th CS2/HEP Workshop October 6 th 2013 A small quiz. Quiz: Which URL leads you to ? %2e%31%33%38%2e%31%33%37%2e%31%37%37/p?uh3f223d co_partnerid=2&usage=0&ru=http%3A%2F%2Fwww.ebay.com&rafId=0 &encRafId=default

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Dr. Stefan Lüders 4 th CS2/HEP Workshop October 6 th 2013 From the Newsroom

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Dr. Stefan Lüders 4 th CS2/HEP Workshop October 6 th 2013 Scope: All security aspects related with HEP control systems Control PCs, control software, controls devices, accounts, … Planning aspects, implementation aspects, operational aspects, … Objectives: Raise awareness Exchange of good practices, ideas, and implementations Discuss what works & what not, pros & cons Report on security events, lessons learned & successes Update on the progress made since the last workshop If there are questions, feel free to ask at anytime!!! The agenda is very flexible to accommodate any changes ! (CS) 2 in HEP The Objectives

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Dr. Stefan Lüders 4 th CS2/HEP Workshop October 6 th 2013 (CS) 2 in HEP The Agenda conferenceDisplay.py ?confId=217457