SCADA – Are we self- sufficient? Presented by Jack McIntyre 15/05/2015Jack McIntyre2.

Slides:



Advertisements
Similar presentations
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Advertisements

SCADA Security, DNS Phishing
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
CHAPTER 4 Information Security. Announcements Project 2 – due today before midnight Tuesday Class Quiz 1 – Access Basics Questions/Comments.
Stuxnet Malware Attribution Mike Albright CS 591 Fall 2010.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Cyber Threats/Security and System Security of Power Sector Workshop on Crisis & Disaster Management of Power Sector P.K.Agarwal, AGM Power System Operation.
Autonomic Security Management of Industrial Systems Sherif Abdelwahed Electrical and Computer Engineering Mississippi State University.
STUXNET. Summary What is Stuxnet? Industial Control Systems The target/s of Stuxnet. How Stuxnet spreads. The impact of Stuxnet on PLC’s.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
Critical Information Infrastructure Protection: Urgent vs. Important Miguel Correia 2012 Workshop on Cyber Security and Global Affairs and Global Security.
SCADA and Telemetry Presented By:.
SUBSTATION SECURITY WHY FIREWALLS DON’T WORK! ©Copyright 1998, Systems Integration Specialists Company, Inc. All Rights Reserved Presented by:
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
NW Security and Firewalls Network Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
ECE 578: COMPUTER NETWORK AND SECURITY
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
Proposed mid-term Security Strategies for CERN Prepared by ad-hoc working group members: Lionel Cons, Francois Fluckiger, Denise Heagerty, Jan Iven, Jean-Michel.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
הקריה למחקר גרעיני - נגב Nuclear Research Center – Negev (NRCN) Society of Electrical and Electronics Engineers in Israel (SEEEI) 2012 Eran Salfati, Amir.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Maritime Cyber Vulnerabilities in the Energy Sector Center for Joint Operations of the Sea ODU Maritime Institute Students Crow, Fresco, Lee.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
By: Nathan Narvaez. A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
2: Operating Systems Networking for Home & Small Business.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Cybersecurity Disaster Recovery Plan. What is a Disaster Recovery Plan? A documented plan designed to maintain normal day to day operations in the event.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Office of Technical Assistance (OTA)1 Financial Intelligence Unit Development and the application of technology.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Industrial Control System Cybersecurity
Chris D Hicks Director of IT MCSE, MCP + Internet Security
Chapter 11: It’s a Network
Teaching Computing to GCSE
Cyber Security of SCADA Systems
Digital Pacman: Firewall Edition
Propagation, behavior, and countermeasures
Security Essentials for Small Businesses
Intrusion Detection system
Cyber Security For Civil Engineering
Anatomy of Industrial Cyber Attacks
Presentation transcript:

SCADA – Are we self- sufficient? Presented by Jack McIntyre 15/05/2015Jack McIntyre2

SCADA – Are we self-sufficient? What is SCADA? Where is SCADA implemented? Is SCADA secure? How can SCADA be attacked? Has SCADA already been attacked? What can be done to prevent attacks? Is the UK self-sufficient in preventing attacks? 15/05/2015Jack McIntyre3

What does it stand for? Supervisory Control And Data Acquisition What does that mean? 15/05/2015Jack McIntyre4

Where is SCADA? Waking up Getting ready Going to work Being at work 15/05/2015Jack McIntyre5

Where is SCADA? Residential / Commercial Properties National Grid Water & Gas Networks Manufacturing 15/05/2015Jack McIntyre6

What is SCADA? Monitors and connects logical processes Physical Devices PLC RTU HMI 15/05/2015Jack McIntyre7

SCADA system requirements Windows 2000 Windows XP Windows Vista 300 Mhz processor 128mb RAM 1.5gb storage 800x600 resolution display CD-ROM/DVD drive USB port Ethernet port Not very “State-of-the-art” 15/05/2015Jack McIntyre8 “State-of-the-art”

SCADA communications Satellite Telephone Wire Radio Wave Microwave Power-line 15/05/2015Jack McIntyre9

SCADA connectivity 15/05/2015Jack McIntyre10

Is SCADA protected? Insecure devices Design based around speed, reliability, connectivity Little or no security concerns 15/05/2015Jack McIntyre11

How is SCADA protected? Strong perimeter defence IDS IPS Firewalls 15/05/2015Jack McIntyre12

How can SCADA be attacked? Denial of Service Man-in-the-middle (MITM) Web Application Weaknesses Vulnerability exploitation Poor configuration 15/05/2015Jack McIntyre13

Denial of Service Extremely effective Time critical systems Target enumeration is difficult 15/05/2015Jack McIntyre14

Man-in-the-Middle Radio wave interception Power-line modulation detection Satellite interception Expensive and often dangerous 15/05/2015Jack McIntyre15

Web application weaknesses SQL Injection XSS Authentication bypass Brute force attacks Rare, relatively easy to protect against 15/05/2015Jack McIntyre16

Poor configuration Default passwords Open ports No authentication 15/05/2015Jack McIntyre17

Vulnerability exploitation Zero-day threats Specialist equipment needed Requires in-depth engineering knowledge Targeted attacks requiring key intelligence Stuxnet 15/05/2015Jack McIntyre18

Stuxnet Targeted Iranian nuclear centrifuges Introduced physically Designed to spread Only targets specific controllers 15/05/2015Jack McIntyre19

Stuxnet Manipulated system operation over time Sophisticated Stealthy Wasn’t detected until it was too late 15/05/2015Jack McIntyre20

What can be done? New systems New standards Secure by design OR Continue to add perimeter defence 15/05/2015Jack McIntyre21

Issues with upgrading equipment Cost Downtime Backwards-compatibility 15/05/2015Jack McIntyre22

When will it happen? When a major incident occurs 15/05/2015Jack McIntyre23

Are we self-sufficient? The UK Shares One power connection Two gas connections So far we have survived But for how long? 15/05/2015Jack McIntyre24

15/05/2015Jack McIntyre25 Questions ? Contact: