1 Workshop on Research Directions for Security and Networking in Critical Real-Time and Embedded Systems Organizers: NC State University & UNC Chapel Hill.

Slides:



Advertisements
Similar presentations
Public Safety Related Applications Summary July, DRAFT -
Advertisements

Mark Heggli Consultant to the World Bank Expert Real-time Hydrology Information Systems Workshop Module 4: Data Management Solutions for a Modernized HIS.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
IS Network and Telecommunications Risks
Security Awareness: Applying Practical Security in Your World
National Security Brittany Haga Sean Bevans Kelsey Splinter.
Smart Grid Cyber Security Framework
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
SCADA – Are we self- sufficient? Presented by Jack McIntyre 15/05/2015Jack McIntyre2.
Secure Systems Research Group - FAU 1 SCADA Software Architecture Meha Garg Dept. of Computer Science and Engineering Florida Atlantic University Boca.
Critical Infrastructure Protection: A 21 st Century Challenge Professor Madjid Merabti PROTECT: Research Centre for Critical Infrastructure Computer Technology.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
GridWise ® Architecture Council Cyber-Physical System Requirements for Transactive Energy Systems Shawn A. Chandler Maseeh College of Electrical and Computer.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
1 IS 8950 Managing Network Infrastructure and Operations.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
7 Information Security.
TRUST NSF Site Visit, Berkeley, March, 2007 Sensor Networks: Technology Transfer Stephen Wicker – Cornell University.
 CS 5380 Software Engineering Chapter 11 Dependability and Security.
Cyber Terrorism Shawn Carpenter Computer Security Analyst
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Scott Charney Cybercrime and Risk Management PwC.
Security fundamentals Topic 10 Securing the network perimeter.
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
KEYNOTE OF THE FUTURE 4: PETER MAYNARD CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
ERCOT IT Update Ken Shoquist VP, CIO Information Technology Board Meeting February 2004.
TS workshop 2004U. Epting, M.C. Morodo Testa - TS department1 Improving Industrial Process Control Systems Security Uwe Epting (TS/CSE) Maria Carmen Morodo.
TRUST September 13, 2004 NSF STC Review TRUST:Team for Research in Ubiquitous Secure Technologies Developing Human Resources Connections to the Critical.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
Mobile Device Security Management Leyna Belinsky.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
Network System Security - Task 2. Russell Johnston.
Mark Heggli, Meteorologist/Hydrologist Expert Real-time Hydrology Information Systems Innovative Hydrology, Inc. Consultant to the World Bank HP-II Workshop.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Surveillance and Security Systems Cyber Security Integration.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Industrial Control Systems.
Security fundamentals
Risk management.
Network Security Basics: Malware and Attacks
Products/Solutions/Expertise of C-DAC Mumbai in Smart City Domain
How SCADA Systems Work?.
Data Management Solutions for a Modernized HIS
Network for connecting robots, sensors, drones, unmanned surface
Security for Safety: Enabling Digitalization of Railway Systems
Wenyu Ren, Timothy Yardley, Klara Nahrstedt
Moderator Mohamed M. K. Elhaj
Network Security Mark Creighton GBA 576 6/4/2019.
IT Applications with Emerging Techniques: Security Solutions
Adding security to your ICS environment? Fine! But how?!
Presentation transcript:

1 Workshop on Research Directions for Security and Networking in Critical Real-Time and Embedded Systems Organizers: NC State University & UNC Chapel Hill Agency support: NSF, DoD, DARPA Academic support: many universities Industry support: companies (large and small)

2 Objective Identify research problems in — Security & Networking for — Real-time/embedded systems Critical infrastructure — SCADA (supervisory control & data acquisition) systems — PCS (process control systems) Safety-critical systems — Aviation, automotive, … Mission-critical systems — UAVs, …

3 Challenges Network connectivity of critical infrastructure — Internal, external, maintenance access  hidden but not isolated (Modbus/TCP) Wireless data acquisition and sensor networks Real-time techniques for network security Real-time constraints on security provisions Trust in embedded systems & networks Cybersecurity “Security for SCADA … 5-10 years behind” (Fed. TSWG)

4 More Challenges Limited resources (embedded) Long life cycles of hardware/software (10-20 years) Hard to upgrade (ROM), default/same old passwords No protection (memory, network encryption, same port, firewalls)

5 Potential Threats Malfunctioning control devices Malicious tempering Worms, viruses on monitoring/control stations Terrorist attacks Targets — Power grid, power plants — Water plants, chemical plants — Gas and oil pipelines, refineries — Phone — Transportation (air traffic control, planes, rail, subway)  Loss of service/property, injury/death, environmental, financial…

6 Aims Identify risks and grand challenges Determine needs to — Enhance existing systems (medium term) — Design new systems from scratch (long term) Some old, some new — Learn from other fields & develop new solutions Bring together — Researchers, practitioners, funding agencies Summarize findings in workshop report — Open to public — Agencies: solicit funds — Industry  academia cooperation: ample opportunities now!

7 Let’s get started Program — Keynotes & short presentations — Panel & round table — Break-out sessions — Summary & round table Workshop report

8 Topics: Roundtable Discussion Firewalls Encyption Monitoring Honeypots Detection systems Timing constraints / timing checks RTOS enhancements & redesign: VRTX, LynxOS, QNX, TinyOS Network isolation vs. connectivity (and maintainability) Wired / wireless communication Compromised / malfunctioning sensors Hardware (ASICS, PLCs: programmable logic controllers) Software diversity Upgrade vulnerability Consider experiences and solutions (e.g., network security) Develop new solutions Topics: