Critical Information Infrastructure Protection: Urgent vs. Important Miguel Correia 2012 Workshop on Cyber Security and Global Affairs and Global Security.

Slides:



Advertisements
Similar presentations
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Advertisements

Challenges in Protecting Critical National Infrastructure from Cyber Attacks Singapore University of Technology and Design Aditya P Mathur September 27,
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Team Dec13_11: Cole Hoven Jared Pixley Derek Reiser Rick Sutton Adviser/Client: Prof. Manimaran Govindarasu Graduate Assistant: Aditya Ashok PowerCyber.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Telstra in Confidence Managing Security for our Mobile Technology.
IS Network and Telecommunications Risks
Network Security of The United States of America By: Jeffery T. Pelletier.
Smart Grid Cyber Security Framework
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Toward Open Source Intrusion Tolerant SCADA Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
SCADA – Are we self- sufficient? Presented by Jack McIntyre 15/05/2015Jack McIntyre2.
Secure Systems Research Group - FAU 1 SCADA Software Architecture Meha Garg Dept. of Computer Science and Engineering Florida Atlantic University Boca.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
Submitted by: Abhashree Pradhan CA (1)
BFT3W'091 Intrusion Tolerance: The Killer App for BFT (?) Alysson Bessani, Miguel Correia, Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo Universidade.
ELECTRICAL CRITICAL INFRASTRUCTURE SECURITY Charles Hookham, P.E., M.ASCE, VP, Utility Projects HDR Engineering 1.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Common Information Model and EPRI Smart Grid Research
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Parsons: Design – Build - Protect Securing Critical Infrastructure Phil Lacombe.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Exploring the Network.
Sandra C Security Advisor Energy Dan B Security Advisor Water
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
IS Network and Telecommunications Risks Chapter Six.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Frankfurt (Germany), 6-9 June 2011 G. Dondossola, F. Garrone, J. Szanto RSE  Research context  Test bed architecture  Attack model  Attack experiments.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Enterprise Systems Business Planning & Logistics Site Manufacturing Operations and Control Area Supervisory Control Basic Control Safety- Instrumented.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Smart Grid Network Transformation Arthur Locke, Alcatel-Lucent
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
Scott Charney Cybercrime and Risk Management PwC.
SAMI & IMCA MARITIME CYBER SECURITY WORKSHOP
MIT requirements from the TSO perspective MIDDLEWARE IMPROVED TECHNOLOGY (MIT) for increased resilience of Interdependent Critical Infrastructure ROME,
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
TÜBİTAK – BİLGEM – SGE Cyber Security Institute
Intrusion Tolerant Distributed Object Systems Joint IA&S PI Meeting Honolulu, HI July 17-21, 2000 Gregg Tally
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
Myongji University HMCL
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
CS457 Introduction to Information Security Systems
Cyber-physical systems: a security problem
STRIDE to a secure Smart Grid in a hybrid cloud
Suhankar Mishra1, Thang N. Dinh2, My T. Thai1, and Incheol Shin3
Agenda Control systems defined
Products/Solutions/Expertise of C-DAC Mumbai in Smart City Domain
How SCADA Systems Work?.
High Secured Inter-Cloud Connectivity via Public Networks
Substation Automation System
Cloud-Enabling Technology
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
Keeping the Lights on in a Dangerous World
Anatomy of Industrial Cyber Attacks
Presentation transcript:

Critical Information Infrastructure Protection: Urgent vs. Important Miguel Correia 2012 Workshop on Cyber Security and Global Affairs and Global Security Forum UPC – Barcelona – Jun. 2012

Critical Information Infrastructure July 15 th 96 American president signed Executive Order – introduced (or popularized?) the term critical infrastructures Identifies 8 classes of critical infrastructures: – telecommunications, electrical power systems, gas/oil storage and transportation, banking/finance, transportation, water supply systems, emergency services, continuity of government Critical information infrastructures – the ICT part of these infrastructures 2

Power grid Recent past: – Power grid undergone significant computerization and interconnection – Improved operation, but became exposed to cyber-threats Present/future: – Smart grid: smart metering, distributed generation… - ICT is core – More computerization and interconnection, higher exposure to cyber- threats 3

Power grid is under siege 2003: Davis-Besse nuclear power plant’s control systems blocked by the Slammer/Sapphire worm 2007: experimental DHS-sponsored cyber-attack destructs a power generator 2009: US electrical grid allegedly penetrated by spies from China, Russia and others 2010: Stuxnet damages centrifuges in Iranian nuclear enrichment center 4

URGENT: REDUCING RISK 5

Risk is high risk = level of threat X degree of vulnerability X impact Level of threat is high – nation states, random threats, extortion Degree of vulnerability is high – as shown by the previous cases Impact is high – think of a city without power for hours/weeks 6 likelihood of successful attack It is urgent to reduce this risk By reducing the degree of vulnerability It is urgent to reduce this risk By reducing the degree of vulnerability

NIST SP “Guide to Industrial Control Systems (ICS) Security”, Jun Recommendations about – Network architecture – firewall usage, network segregation,… – Management controls – planning, risk assessment,… – Operational controls – personnel security, contingency planning, configuration management,… – Technical controls – authentication, access control, systems and communication protection,… ICT security applied to CIIP 7

IEC “Power systems management and associated information exchange – Data and communications security”, May 2007 Recommendations about the security of TC57 protocols – protection from eavesdropping, man-in-the-middle, spoofing, and replay ICT security applied to CIIP 8

Urgent to apply these standards In comparison with “normal” ICT systems… before applying these standards: risk = level of threat X degree of vulnerability X impact 9 much higher! much higher!

Urgent to apply these standards In comparison with “normal” ICT systems… after applying these standards: risk = level of threat X degree of vulnerability X impact 10 The risk must still be more reduced! The degree of vulnerability has to become much lower than in ICT systems The risk must still be more reduced! The degree of vulnerability has to become much lower than in ICT systems much higher! much higher! samehigher!

IMPORTANT: RESEARCH ABOUT REDUCING RISK MUCH MORE 11

Substation A Substation B Substation C Architecture – WAN-of-LANs 12

Substation A Substation B Substation C CIS - CRUTIAL Information Switch 13

CIS Protection Service Objective: effectively block incoming attacks CIS-PS works at application layer and is a distributed firewall It is intrusion-tolerant thanks to replication and diversity It is self-healing thanks to replica rejuvenation It cannot be attacked even if there are 0-day vulnerabilities 14

CIS Communication Service Objective: circumvent faults and DDoS attacks in the WAN CIS run JITER algorithm – timely-critical messages exploit: Multihoming: CII facilities often connected to 2 ISPs Overlay channels: messages sent indirectly through other CIS Communication is timely/secure even under harsh fault/attack scenarios 15 CIS ACIS B CIS C CIS D Network fault, DDoS attack

New directions beyond CRUTIAL Threats like Stuxnet might not be blocked by these mechanisms; some research directions: Replication/rejuvenation/diversity inside the LANs – For critical servers, e.g., SCADA servers – For control devices: Programmable Logic Controllers (PLC), Remote Terminal Units (RTU) Continuous vulnerability assessment (instead of periodic scanning) Anomaly-based endpoint assessment 16

Conclusions The power grid and other critical information infrastructures are vulnerable to cyber-attacks It is urgent to do the urgent: apply standards and recommendations But ICT-like security mechanisms are not enough: the threat level and impact of CII failure is high, so risk remains high So it is important to do what is important: to investigate novel protection mechanisms that greatly reduce the degree of vulnerability 17

More info at my web page: google miguel correia inesc-id