Joint Program Office for Special Technology Countermeasures Joint Program Office for Special Technology Countermeasures JPOSTCJPOSTC JPOSTCJPOSTC Briefing.

Slides:



Advertisements
Similar presentations
Remote Automation and Monitoring: PLC or RTU. Key Points PLCs and RTUs are similar devices with somewhat differing functionality.
Advertisements

Computer Sciences & Engineering Department
Public Safety Related Applications Summary July, DRAFT -
Lighting and Wastewater Controls Smithfield Foods Engineering.
Substation Automation (S.A) System Project Supervisor: Stuart Wildy.
Team Dec13_11: Cole Hoven Jared Pixley Derek Reiser Rick Sutton Adviser/Client: Prof. Manimaran Govindarasu Graduate Assistant: Aditya Ashok PowerCyber.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
IS Network and Telecommunications Risks
SCADA SYSTEM CLASSIFICATION
SCADA MODEL SYSTEM COMPONENTS
Toward Open Source Intrusion Tolerant SCADA Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania.
ABB Connectivity & Smart Grid Ahmed Fahmy,Senior Technical Promoter Novmber 2014 NEMA technical workshop.
 A system consisting of a number of remote terminal units (or RTUs) collecting field data connected back to a master station via a communications system.
Introduction to wind parks SCADA systems
Trends in SCADA Technology for Public Power
Secure Systems Research Group - FAU 1 SCADA Software Architecture Meha Garg Dept. of Computer Science and Engineering Florida Atlantic University Boca.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
INTRODUCTION Chapter 1.
© ELPRO Technologies NORCAL ISA Think Wireless…Think ELRPO Wireless Gateways Smart Wireless Gateways The 21 st Century modem Frank Williams May 1, 2007.
Title Month Year John Richmond
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Critical Information Infrastructure Protection: Urgent vs. Important Miguel Correia 2012 Workshop on Cyber Security and Global Affairs and Global Security.
SCADA and Telemetry Presented By:.
SUBSTATION SECURITY WHY FIREWALLS DON’T WORK! ©Copyright 1998, Systems Integration Specialists Company, Inc. All Rights Reserved Presented by:
The Vannet Group, LLC SCADA Made Simple
Storage Security and Management: Security Framework
SCADA FOR WATER DISTRIBUTION IC DEPT. GECGn SEC28.
JOINT EFFORTS OF MUNICIPAL CORPORATION FARIDABAD & S.A.S. SERVIZIO PVT. LTD. (formerly known as RAMSONS) MISSION STATEMENT To become ‘partners in progress’
1 ● Plant Automation Security Review of Cyber Security Attack at Maroochy Water Services ● Bradley Yager ● National Business Development Manager – Telemetry.
הקריה למחקר גרעיני - נגב Nuclear Research Center – Negev (NRCN) Society of Electrical and Electronics Engineers in Israel (SEEEI) 2012 Eran Salfati, Amir.
Software Aspects of PQ in a DG Context By Dr. Siri Varadan.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
 AUTOMATION  PLC  SCADA  INSTRUMENTATION  DRIVES & MOTORS.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
Unit 5 CONTROL CENTERS AND POWER SYSTEM SECURITY.
Topics of presentation
Overview Overview  Skills of AMERICAN TECHNOLOGIES Inc. CapabilitiesCapabilities  What is Spread Spectrum Technology?  ACT’s Products and Services.
Computers Are Your Future Eleventh Edition
Enterprise Systems Business Planning & Logistics Site Manufacturing Operations and Control Area Supervisory Control Basic Control Safety- Instrumented.
Oncor Electric Delivery Intelligent Grid at Oncor Electric Delivery SWEDE Conference Alan Bern – SCADA / Automation Manager May 1, 2008.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Wireless Intrusion Prevention System
Chapter2 Networking Fundamentals
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
James R. Cash SCADA System. Main Functions Acquire remote data Permit centralized control of pipeline Keep historical record of operation Provide automated.
NERC Lessons Learned Summary LLs Published in September 2015.
Programmable Logic Controllers LO1: Understand the design and operational characteristics of a PLC system.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
Water Horner APG, LLC June 4, What is SmartMQn Water? SmartMQn Water is a packaged monitoring solution that uses sophisticated and easy to use preconfigured.
IS3220 Information Technology Infrastructure Security
SCADA NETWORK SECURITY BY LICET 4-AUG-12.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
OPERATES SCADA OPERATION SYSTEM Explain the operational SCADA
SCADA SCADA TRAINING AJAY K BASU
Agenda Control systems defined
How SCADA Systems Work?.
Substation Automation IT
IS4550 Security Policies and Implementation
Substation Automation System
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Cyber Security For Civil Engineering
Process Dynamics and Control:
STATEL an easy way to transfer data
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Joint Program Office for Special Technology Countermeasures Joint Program Office for Special Technology Countermeasures JPOSTCJPOSTC JPOSTCJPOSTC Briefing Classification: Tri-Service Power Expo 2003 National Defense Industrial Association July 2003 Norfolk, Virginia Tri-Service Power Expo 2003 National Defense Industrial Association July 2003 Norfolk, Virginia UNCLASSIFIED Control Systems Vulnerabilities

UNCLASSIFIED Contact Information Joint Program Office for Special Technology Countermeasures Naval Surface Warfare Center, Dahlgren Division Dahlgren, VA Mike Burks (540) Joint Program Office for Special Technology Countermeasures Naval Surface Warfare Center, Dahlgren Division Dahlgren, VA Mike Burks (540)

UNCLASSIFIED

Agenda Types of Control Systems Architecture Impact of Disruption Reducing Vulnerabilities

UNCLASSIFIED Supervisory Control and Data Acquisition SCADA Used in Electric Power, NG, POL, Water, Waste Water Older Systems - Primary Conduits of Raw Data In and Commands Out Newer Systems - Process and Store Significant Amount of Data Internally Local Control Augmented by Centralized Control Using SCADA

UNCLASSIFIED Distributed Control Systems DCS Control Large Manufacturing and Production Facilities Process and Store Significant Amount of Data Chemical Plant Processes Monitoring Power Plant DCS Linked to Energy Management Center Power Plant DCS Vulnerabilities Can Extent to Control Center

UNCLASSIFIED Programmable Logic Controllers PLC Used in Manufacturing Facilities, Industrial Facilities, Power Plants, Substations, Water Facilities, US NAVY Warships May Be used as a Remote Terminal Unit (RTU) for SCADA Older Systems - PLC Impact Localized Newer Systems - PLC Impact Widespread Networking PLC will Increase Vulnerabilities

UNCLASSIFIED Control System Architecture Central Monitoring Unit Communications Network Sensor Remote Terminal Unit 1 Remote Terminal Unit 2 Sensor Programmable Logic Controller Sensor Fiber, Radio, Modem, Microwave, Telephone, Wireless, Powerline Carrier

UNCLASSIFIED Requirements Highly Reliable Make Automated Changes to Processes Use Real Time Operating System High Performance High Functionality

UNCLASSIFIED Polled Communications System Polled System Master Polls Slaves in Sequence Slave Responds Only If Requested (Half- Duplex) No Digital Collisions on Network Slave To Master To Slave Communications

UNCLASSIFIED Interrupt Communications Systems Interrupt System (Report By Exception) Slave Monitors Inputs and Initiates Report Based On Change Erratic System Operation Caused by Digital Collisions on Network Master Polls After Slave Fails to Transmit Slave To Slave Communication

UNCLASSIFIED Software Vulnerabilities Use Insecure Industry-Wide Protocols (DNP3.0, Modbus, Profibus, etc.) Relying On Obscurity for Security Heavy Use of Clear Text or ASCII Protocol Analyzers Available to Decode Structures Architectures Common Across All Industries Operating Systems DOS, VMS, UNIX, NT, LINUX, SOLARIS Proprietary Software Discussed at Conferences and Periodicals Security Patches Impact Functionality and Performance

UNCLASSIFIED Representative RF Threats Man Portable RF Devices Surplus Military RF Devices

UNCLASSIFIED Communication Network Instrumentation Remote Station Central Monitoring Station LAN, WAN, INTERNET Communication Network Instrumentation Remote Station Central Monitoring Station Communication Network Instrumentation Remote Station Corporate Architecture

UNCLASSIFIED Corporate Network Highly Networked System Easy Access to Control Systems From Corporate Intranet Few Firewalls and Intrusion Detection at Operational Facilities (Power Plants & Substations) Remote Maintenance Performed by Vendors Direct Remote Access Not Protected by Corporate Security

UNCLASSIFIED Impacts of Disruptions Depends on Level of Sophistication of Intrusion Electric Power Outages (Hours to Days) and Equipment Damage Revert to Manual Operation of System Monetary Chemical/LNG Safety Related Safeguards Interrupted Potentially Catastrophic Monetary

UNCLASSIFIED Impacts of Disruptions Depends on Level of Sophistication of Intrusion Telecommunications Loss of Service (Hours) and Equipment Damage Monetary Water and Wastewater Contamination Public Confidence Monetary Manufacturing Equipment Damage Monetary

UNCLASSIFIED Example of Impact Bellingham, Washington June 1999 Pressure surge occurred during SCADA slowdown Control Room Operator Unable to Relieve Pressure 237,000 gallons of gasoline released from ruptured 16 “ gasoline pipeline SCADA data base modifications made before event System Administrator saw errors 18 minutes before rupture System Administrator did not notify operators Remote dialup access to SCADA for account holders Findings by National Transportation Safety Board faulted database modification

UNCLASSIFIED Reducing Vulnerabilities (Short Term) Assume All Control Systems are Vulnerable to Attack Eliminate Back Doors Used For Maintenance Implement a Business to Control System Security Policy Limit Access to Control Systems Install Security Patches and Insist Vendors Do the Same Install Firewalls and Intrusion Detection

UNCLASSIFIED Reducing Vulnerabilities (Long Term) Information Sharing Between Industries, (ISACs), and Government Support Development of Control System Security Technology Specifying Security Technology in New Purchases Firewalls Intrusion Detection Encryption Secure Real Time Operating Systems Join Technical Organizations and Consortiums to Influence Industry Consortium for Electric Infrastructure to Support a Digital Society (CEIDS) IEEE-Instrument, Systems and Automation Society (IAS) International Electrotechnical Commission (IEC)

UNCLASSIFIED Dahlgren Test Bed Citadelle Bastille Shielded Diagnostic Vans

UNCLASSIFIED Questions ?