Chapter 10 Monitoring Systems. Most examples here monitor physical systems Alarms PrePayment Meters Taximeters, Tachographs, Truck Speed Limiters.

Slides:



Advertisements
Similar presentations
1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
Advertisements

Ethics, Privacy and Information Security
Control and Accounting Information Systems
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Physical Security John Schwertfeger Security Manager Duane Arnold Energy Center.
Chapter 5 Enhancing Security Through Physical Controls
©1999 Addison Wesley Longman Slide 13.1 Information System Security and Control 13.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
© GMV, 2011 FROM SKIMMING TO THE LOGICAL FRAUD, THE NEWCOMING ATM RISK IT & Security Forum - Bucharest Bucharest, 11/10/2011 Reference: GMV-DESCOR-PR-0048.
Security+ Guide to Network Security Fundamentals
FIA Protection Against Mileage Fraud by Common Criteria UNECE Informal document GRSG (108th GRSG, 4-8 May 2015, agenda item 3)
Chapter 9 Banking and Book keeping Protecting yourself from you.
Chapter 12 Security Seals and Printing. Security Printing Money Primary or first level inspection Secondary or Second level inspection Tertiary or Third.
INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Chapter 2 Modern Private Security
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Geneva, 14/05/2007 Introduction of the Digital Tachograph By Leo Huberts (EC-DG TREN) Introduction of the Digital Tachograph By Leo Huberts (EC-DG TREN)
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
A Secure Frontline September 25, 2003
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.
Traditional and Electronic Payment Methods Chapter 3.
Introduction + Route Me GPS Tracking System Route Me offers a full range of software for commercial fleet.
Your Hospital What are sensing circuits ?
By: Diana Ornelas.  A LAN that is inside & around the vehicle  Is a branch under VANET  4 types of communication:  Vehicle-to-vehicle  Intra-vehicular.
 CS 5380 Software Engineering Chapter 11 Dependability and Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Chapter 3 Forming Online Identities Online Communication.
Presents The NetBotz Homeland Security Solution A Texas Company Protecting Texans.
What is Network and Security Research? Network and Security Research, or Information Communication Technology (ICT) Research involves: the collection,
CHAPTER 17 INTERNATIONAL MARKETING IN E-COMMERCE.
Chap1: Is there a Security Problem in Computing?.
Session title: Protection of Smart Utility Grids Group edited strategy.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
SMART GRID A smart grid for intelligent energy use. By: Suhani Gupta.
Bruce Schneier. Article to read mann mann Systems must fail smartly.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
The New Reality, Security in an Unsettled World Jeanne Elliott Northwest Airlines AFA MEC Chair- Air Safety, Health and Security Association of Flight.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
1 DIRECTORATE-GENERAL FOR ENERGY AND TRANSPORT Digital Tachograph : Information Seminar Budapest, 25-26/02/20009 Digitac.
IRU_Yokohama_April_20041 CV IR/ Dr. Lehmann © How will Technology permit harmonized Implementation and Enforcement of Social Regulations? 1.Question/ Answers.
“La Sécurité Porte un Nom”” Professional Security Services S.A Angle Avenue John Brown (Lalue) et Avenue Christophe Port-au-Prince, Haiti.
Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS.
ARTEMIS Industry Association Title Presentation - 1 ASP 6 Report by: Sandro Etalle
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 draft-urien-eap-smartcard-06.txt “EAP-Support in Smartcard”
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
UNIT V Security Management of Information Technology.
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
Module 5: Designing Physical Security for Network Resources
INFORMATION SYSTEMS SECURITY AND CONTROL.
History and Status Tallinn, 18 May 2005 Leo Huberts
Security Measures Module 7 Section 1.
INFORMATION SYSTEMS SECURITY and CONTROL
Cybersecurity Threats and Opportunities in Latin America
Networking for Home and Small Businesses – Chapter 8
The MobileIron® Threat Detection difference:
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Challenges Of Network Security
Presentation transcript:

Chapter 10 Monitoring Systems

Most examples here monitor physical systems Alarms PrePayment Meters Taximeters, Tachographs, Truck Speed Limiters

Alarms Threat Model Who is your attacker See page examples Deter – Detect – Alarm – Delay – Respond Sensors Page 211 Eliminating false positives Layers of defenses -- barriers

Attacks Sensors Feature interactions Attacks on Communications Physical security

Prepayment meters Purchase one place use it in another location Protect against forgery and duplication Petty fraud acceptable risk Systematic fraud is not Great study of prepayment meter pages It is cool to read and think about these systems

Taximeters, Tachographs, Speed limiters. Odometer in cars Taximeters Black Boxes What goes wrong with Tachographs? 70% procedural 20% tamper with supply to tachograph 6% tamper with instrument hightech

Tachosmart European Union Designing smart card based system Does little to eliminate procedural fraud Issues of enforcement between countries Use of GPS units (privacy) Turnover time to equip trucks Digital open to additional fraud Resurrected Duckling

Discussion articles Prepayment meters Other uses of Resurrected Duckling

List of Resources Alarms SecProdPub.nsf/frame?open&redirect= / odpub.nsf/PubHome/180E42469D7AD8A CE634?Opendocument SecProdPub.nsf/frame?open&redirect= / odpub.nsf/PubHome/180E42469D7AD8A CE634?Opendocument

List of Resources Alarms and network security 0-6/features/police.html 0-6/features/police.html Secure Tachographs cho.pdf cho.pdf Tamper resistance

List of resources Tachosmart =A =A Resurrected Duckling ckling.html ckling.html Meter Security htm htm