Report by: Katiuscia Zedda

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

Validating the Evaluation of Adaptive Systems by User Profile Simulation Javier Bravo and Alvaro Ortigosa {javier.bravo, Universidad.
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
By Lauren Felton. The electric grid delivers electricity from points of generation to consumers, and the electricity delivery network functions via two.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Smart Grid Market in China Order this report by calling or Send an to with your contact details.
Annarita Giani, UC Berkeley Bruno Sinopoli & Aakash Shah, Carnegie Mellon University Gabor Karsai & Jon Wiley, Vanderbilt University TRUST 2008 Autumn.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Smart Cities & Smart Utility
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
Lessons Learned in Smart Grid Cyber Security
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 ● Plant Automation Security Review of Cyber Security Attack at Maroochy Water Services ● Bradley Yager ● National Business Development Manager – Telemetry.
Summary Device protocols tied intimately to applications. A need to significantly reduce critical data update times. Current network bandwidth consumption.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
Consumer Empowerment Consumer Empowerment May 15, 2012 Presented by: Alparslan Bayraktar Commissioner Energy Market Regulatory Authority of Turkey (EPDK)
Dependable ICT for Utilities Proposal for DESIRE activities The CRIS Institute Hans Ottosson The International.
Nikos HATZIARGYRIOU – Greece – BETA SESSION 4b: Integration of RES+DG Barcelona May 2003 BETA SESSION 4b: Integration of Renewable Energy Sources.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
UK Cyber Security Caley Robertson
Frankfurt (Germany), 6-9 June 2011 G. Dondossola, F. Garrone, J. Szanto RSE  Research context  Test bed architecture  Attack model  Attack experiments.
Enterprise Systems Business Planning & Logistics Site Manufacturing Operations and Control Area Supervisory Control Basic Control Safety- Instrumented.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Customs and Border Protection Communications Written by: Bill Brown, President/CEO Metric Systems Corporation 1315 Hot Spring Way, Suite 106 Vista California.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
Developing a Security Program. Exercise Plan Develop/Update Plan Review/Revisit Plan.
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Smart Grid Schneider Electric Javier Orellana
Athena Innovation. Knowledge. Experience Peretz Gurel FCT : Urban security topic 2 Contribution as a partner.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
ASP-1 Results from Break-Out Session 1. ARTEMISIA Association Title Presentation ideas  6 clusters  Safe transport technologies (1)  Safety.
ARTEMIS Industry Association Title Presentation - 1 UR:BS eUropean Renaissance: Beyond Smart cities José J. De las Heras/Miguel Peñate.
ARTEMIS Industry Association Title Presentation - 1 ASP 6 Report by: Sandro Etalle
Some Great Open Source Intrusion Detection Systems (IDSs)
Surveillance and Security Systems Cyber Security Integration.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Industrial Control Systems.
Eric Peirano, Ph.D., TECHNOFI, COO
Security and resilience for Smart Hospitals Key findings
Proactive Incident Response
Complete Plant Solution from Mitsubishi
Eric Peirano, Ph.D., TECHNOFI, COO
Security of In-Vehicle Software
Agenda Control systems defined
and Security Management: ISO 28000
Information Technology Sector
The Internet of Things (IoT) and Analytics
How SCADA Systems Work?.
Detection and Analysis of Threats to the Energy Sector (DATES)
National Mining University
Proactive Cyber Security Ian Glover
RESEARCH, EDUCATION, AND TRAINING FOR THE SMART GRID
C4I, Internet of Things and Critical Infrastructure Protection
Peter Erning, PSP-T11, Power Gen 2010
Cyber Security in New Jersey State Government
Cyber Security and the National Broadband Strategy
Smart Cities Uroš Merljak.
Smart business growth tool for smart industry era (Industry 4.0)
Final Conference 18 Set 2018.
Reinhard Scholl, GTSC-7 Chairman
Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time?
Presentation transcript:

Report by: Katiuscia Zedda ASP 6 Project 2 Report by: Katiuscia Zedda katiuscia.zedda@akhela.com

Proposal 3: New generation of Secure SCADA allowing for intelligent threat monitoring Critical Infrastructure (think: harbour, refinery, big plants) are characterised by: SCADA systems very vulnerable to cyber-attacks Attackers know this and they are already using it Actual Standard signature-based detection systems don’t work There are no signatures to start with Human errors can cause as much damage as cyber attacks Many distributed NODES difficult to manage and configure They rely on legacy systems Different makers with non inter-operable system New systems should work for long time (20 years) Mistakes/misuses can and do happen wrong sequence of operations + attacker deliberately issues commands

Proposal 3: New generation of SCADA allowing for intelligent threat monitoring Technology Objectives Giving to the SCADA system the capability to collect logs in the ‘standard’ format interoperable from different makers Intrusion detection methods for remote SCADA Proprietary protocols & Signature-less Techniques for automatic detection of strange/anomalous configuration Make the system easily update/upgrade to face new threats Market Innovation Objectives Target customers : medium and large organizations Manufacturing Industries, Process Industries, Electric Power and Grid or more general in the Monitoring and Control Market (M&C). that M&C is expected to continue to grow at 7% per year. This is driven by increasing demand related to increased safety, security, energy or environmental concerns.

Interested Parties Akhela (IT) Utwentesandro.etalle@utwente.nl (NL) (+ industrial partners) Mondragon University ( + industrial partners) (ES) CIMNE, carbajosa@cimne.upc.edu(ES) Hi iberiargimenez@hi-iberia.es(ES) Visual-Tools, fgomez@visual-tools.com(ES) Universidad Politecnica de Madrid (ES) Control system producer Scada systems developer End users (water or energy suppliers…) Security experts

Thank you, Katiuscia Zedda katiuscia.zedda@akhela.com