Critical Infrastructure Protection: A 21 st Century Challenge Professor Madjid Merabti PROTECT: Research Centre for Critical Infrastructure Computer Technology.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Team Dec13_11: Cole Hoven Jared Pixley Derek Reiser Rick Sutton Adviser/Client: Prof. Manimaran Govindarasu Graduate Assistant: Aditya Ashok PowerCyber.
Introduction to Cyber Physical Systems Yuping Dong Sep. 21, 2009.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.
Cascading failures in interdependent networks and financial systems -- Departmental Seminar Xuqing Huang Advisor: Prof. H. Eugene Stanley Collaborators:
1 Workshop on Research Directions for Security and Networking in Critical Real-Time and Embedded Systems Organizers: NC State University & UNC Chapel Hill.
1 Telstra in Confidence Managing Security for our Mobile Technology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
National Security Brittany Haga Sean Bevans Kelsey Splinter.
Lecture 11 Reliability and Security in IT infrastructure.
Critical Infrastructure Interdependencies H. Scott Matthews March 30, 2004.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Critical Infrastructure Interdependencies H. Scott Matthews March 3, 2003.
Secure Systems Research Group - FAU 1 SCADA Software Architecture Meha Garg Dept. of Computer Science and Engineering Florida Atlantic University Boca.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Disaster & Smart City in Aging Society – Designing a secure and resilient smart city Smart City and Resiliency Jirapon Sunkpho College of Innovation Thammasat.
Space Systems as Critical Infrastructure Iulia-Elena Jivanescu 1st Space Retreat, Tenerife, Spain, 8-22 January, 2013.
Securing Information Systems
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Funded by EC contract FP Workshop on Software and Service Development, Security & Dependability July 2007, Maribor Run-time Dynamic Security.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Pushing the Security Boundaries of Ubiquitous Computing ACSF 2006 —————— 13 th July 2006 —————— David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Analysis and Detection of Access Violations in Componentised Systems David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith Advances in Computer Security.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Exploring the Network.
Accompanying notes to presentation What you need to know This presentation is part of the Art of connecting. There are four themes in total, each with.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Trust Propagation using Cellular Automata for UbiComp 28 th May 2004 —————— Dr. David Llewellyn-Jones, Prof. Madjid Merabti, Dr. Qi Shi, Dr. Bob Askwith.
Maritime Cyber Vulnerabilities in the Energy Sector Center for Joint Operations of the Sea ODU Maritime Institute Students Crow, Fresco, Lee.
Networked Embedded and Control Systems WP ICT Call 2 Objective ICT ICT National Contact Points Mercè Griera i Fisa Brussels, 23 May 2007.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Security Vulnerabilities in A Virtual Environment
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Lecture 19 Page 1 CS 236 Online Prolog to Lecture 19 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Protecting Against Cyber Challenges Pacific Operational Science & Technology Conference 15 March 2011 Rob Wolborsky Chief Technology Officer Space and.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Surveillance and Security Systems Cyber Security Integration.
Chapter 1 Characterization of Distributed Systems
Report by: Katiuscia Zedda
Securing Information Systems
Home Internet Vulnerabilities
Presentation transcript:

Critical Infrastructure Protection: A 21 st Century Challenge Professor Madjid Merabti PROTECT: Research Centre for Critical Infrastructure Computer Technology and Protection School of Computing and Mathematical Sciences Liverpool John Moores University, Byrom Street, Liverpool L3 3AF, UK Web:

Critical Infrastructures We Live in a High Connected World Power grid Financial system Air traffic control network Water supply system Oil infrastructure Telecommunications infrastructure Transport system

A Typical Critical Infrastructure Power Grid and its Components

Critical Infrastructures Features

Complexity

A Computer Control System The SCADA system

–In 1990 the AT&T PSTN network suffered a fault due to human error causing nationwide problems Interdependency

Interdependency –Siberian Pipeline Explosion (1982):Trojan inserted into SCADA software that caused explosion –Roosevelt Dam (1994): Hacker breaks into floodgate SCADA systems –GAZPROM (2000):Hackers gain control of Russian natural gas pipeline –August 2003: CSX Train Signaling System and the Sobig Virus –June 2009 : insider/employee attack on US hospital SCADA systems.

C RITICAL I NFRASTRUCTURE P ROTECTION C HALLENGES

A Real Threat –The Stuxnet a Cyber Attack

Increasing Cyber Attacks/Threats We must learn to defend, delay, attack and manoeuvre in cyberspace, just as we might on the land, sea or air and all together at the same time. Future war will always include a cyber dimension and it could become the dominant form. At the moment we don't have a cyber command and I'm very keen we have one”. He added: Whether we like it or not, cyber is going to be part of future warfare, just as tanks and aircraft are today. It's a cultural change. In the future I don't think state- to-state warfare will start in the way it did even 10 years ago. It will be cyber or banking attacks - that's how I'd conduct a war if I was running a belligerent state or a rebel movement. It's semi-anonymous, cheap and doesn't risk people [dailymail.co.uk] General Sir David Richards Head of UK arm forces

Attack on a Power Grid Attack on a Power Grid

Other Issues –Cascading vulnerability problem –The blackouts of North America happened due to a cascade of failures. It affected the power generation system, water supply, transportation, communication system, and industry –The convergence of control networks with public and critical networks potentially exposes the control systems to additional security vulnerabilities –Use of wireless technology in critical systems expose vulnerable to attacks

Other Issues –Developing new virtual environments where the characteristics of critical infrastructures and their complexity could be mapped and visualized.

A System of Systems Problem

Crisis Management –Any crisis (natural or human made) impose high damage risk to Critical Infrastructure –Japan tsunami 2011

C RITICAL I NFRASTRUCTURE P ROTECTION S OLUTIONS

System Modelling

Systems-of-Systems Design Models systems interactions Check properties –Of individual devices –Of topological structure –Test against security patterns Highlight potential security vulnerabilities

Security Research in critical infrastructures should cover all the security aspects e.g. –Intrusion detection –Vulnerability analysis –Data protection solutions ANIKETOS project –Comprised of 17 partners from across the EU –A €13.9 million project

Crisis Management Solution

R ESEARCH C ENTRE FOR C RITICAL I NFRASTRUCTURE C OMPUTER T ECHNOLOGY AND P ROTECTION (PROTECT)

PROTECT Vision Networked Appliances Laboratory (NAL) –Home networking and entertainment systems –Ubiquitous computing and biofeedback processing –Sensor networking and environmental monitoring Network and Information Security Technology Laboratory (NISTL) –Identity management and system-of-systems security –Trust management and system monitoring –Security interfaces and reputation schemes –Computer forensics and digital rights management

PROTECT Vision Computer Games Research Laboratory (CGRL) –Game and middleware engine development –Online game development and deployment –Peer-to-peer technologies and applied artificial intelligence –Interaction techniques between real and virtual environments –Serious games technologies applied to education and training, and digital interactive storytelling

3D Modelling

System of System Security

Conclusion Critical Infrastructure Challenges –Critical infrastructures strongly rely on systems and networks built over computing technologies and information systems. –These systems need to be protected and redesigned to cope against serious incidents and attacks. –Complexity and Interdependency between systems exist at every level. –Joint efforts of researchers from different disciplines is the way forward Our vision –New modelling, design, and protection approaches –Regroup many research disciplines such as: distributed systems, digital communication, gaming technology data and system modelling