IEC TC57 WG15 - Security Status & Roadmap, TC57 Plenary, May 2007

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

TC 57 IEC TC57 WG15 - Security Status & Roadmap, July 2008 Frances Cleveland Convenor WG15.
Protection of Information Assets I. Joko Dewanto 1.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cyber Security in Implementing Modern Grid Automation Systems Vijayan SR CIGRE SC D2 Tutorials & Colloquium on SMART GRID Mysore, 13 – 15 November 2013.
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
Building a Successful Security Infrastructure
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Lecture 10 Security and Control.
Lecture 10 Security and Control.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introduction CS-480b Dick Steflik. X.800 – OSI Security Services Security Service – a service provided by a protocol layer of communicating open systems,
E-Commerce Security and Fraud Issues and Protections
Introduction (Pendahuluan)  Information Security.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Web services security I
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
SUBSTATION SECURITY WHY FIREWALLS DON’T WORK! ©Copyright 1998, Systems Integration Specialists Company, Inc. All Rights Reserved Presented by:
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Security Guide for Interconnecting Information Technology Systems
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Securing Information Systems
Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 張耕瑋 黃峻亨 楊銘鴻 李昌諭 吳政穎 陳建廷.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Storage Security and Management: Security Framework
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Lecture II : Security Analysis and Planning Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University Fall 2005.
Lecture 1: Overview modified from slides of Lawrie Brown.
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
C8- Securing Information Systems
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 21 Distributed System Security Copyright © 2008.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Information Systems Security
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Security Considerations for Health Care Organizations Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
In Depth Security Review Martin Rogers Computer Horizons Corp. © Copyright eB Networks All rights reserved. No part of this presentation may be reproduced,
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
IS3220 Information Technology Infrastructure Security
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Smart Grid cyber security within IEC TC57 WG15
Design for Security Pepper.
Capabilities Matrix Access and Authentication
Frances Cleveland Convenor WG15
امنیت شبکه علی فانیان
E-Commerce Security and Fraud Issues and Protections
برنامج أمن أنظمة الحاسب
Smart Grid cyber security within IEC TC57 WG15
Presentation transcript:

IEC TC57 WG15 - Security Status & Roadmap, TC57 Plenary, May 2007 Frances Cleveland Convenor WG15 Presented at Plenary by Herb Falk US Representative to WG15 I do this presentation on behalf of Frances Cleveland, she is unable to attend the General Assembly.

Scope of WG15 on Security Undertake the development of standards for security of the communication protocols defined by the IEC TC 57, specifically the IEC 60870-5 series, the IEC 60870-6 series, the IEC 61850 series, the IEC 61970 series, and the IEC 61968 series. Undertake the development of standards and/or technical reports on end-to-end security issues. Other notes of Interest: WG15 started as Adhoc Working 06 in 1997 (this is the WG’s 10 year anniversary). 13 Participating Countries, 32 individuals The WG15 scope is the security of the IEC TC57 defined protocols and the end-to-end security issues WG15 Status October 2005

Status of Security Documents, May 2007 IEC 62351: Data and Communications Security Part 1: Introduction Part 2: Glossary Part 3: Security for profiles including TCP/IP Part 4: Security for profiles including MMS Part 5: Security for IEC 60870-5 and derivatives Part 6: Security for IEC 61850 profiles Part 7: Objects for Network Management Part 8: Security process for power industry operations Withdrawn WG15 has elaborated an number of documents in the IEC 62351 1. These parts were sumbitted as CDs in May this year We got comments that were responded to in September and 2. We submitted CDVs for these parts 3. For Part 2 the work is ongoing 4. Part 5 is updated but there is an outstanding issue that may delay the CDV-ing of it. More on that later. Working draft, under review and discussion Submitted as DTS ver 2 January 2007. Comments being awaited Submitted as Technical Specifications in Dec 2006, being finalized by IEC WG15 Status October 2005

Security Functions vs. Threats Confidentiality Integrity Availability Non-Repudiation Unauthorized Access to Information Unauthorized Modification or Theft of Information Denial of Service or Prevention of Authorized Access Denial of Action that took place, or Claim of Action that did not take place Listening Interactions Planted in System - Actively Being Addressed Eavesdropping Traffic Analysis EM/RF Interception Indiscretions by Personnel Media Scavenging Masquerade Bypassing Controls Authorization Violation Physical Intrusion Man-in-the-Middle Integrity Violation Theft Replay Virus/Worms Trojan Horse Trapdoor Service Spoofing After-the-Fact We have the requirements on the SECURITY, we have the THREATS that we see onto the requirements And we have the ATTACKS that we see could generate the threats to the requirements. Stolen/Altered - Desired Repudiation Denial of Service Resource Exhaustion Integrity Violation Intercept/Alter Repudiation Modification WG15 Status October 2005

Being Addressed by many other bodies Security Functions, Threats, and WG15 Work Pattern Confidentiality Integrity Availability Non-Repudiation Unauthorized Access to Information Unauthorized Modification or Theft of Information Denial of Service or Prevention of Authorized Access Denial of Action that took place, or Claim of Action that did not take place Identity Establishment, Quality, and Mapping Role-Based Access Control Certificate and Key Management Tele- comm Data Backup Audit Logging Intrusion Detection Systems (IDS) Authentication Firewalls with Access Control Lists (ACL) Anti-Virus/ Spy-ware Credential Establishment, Conversion, and Renewal IEC62351 Security for TASE.2, DNP, 61850 Public Key Infrastructure (PKI) Network and System Management (NSM) Passwords Certificates Transport Level Security (TLS) Virtual Private Network (VPN) WPA2/80211.i for wireless AGA 12-1 “bump-in-the-wire” Digital Signatures CRC For these possible ATTACKS there is a number of COUNTERMEASURES. There is a need for a management of the countermeasures, that need attention from the Corporate Management and from other national and international bodies, like NERC and CIGRE Symmetric and Asymmetric Encryption (AES, DES) Security Management Security Testing, Monitoring, Change Control, and Updating Security Risk Assessment of Assets Security Compliance Reporting Being Addressed by many other bodies During-Attack Coping and Post-Attack Recovery Security Policy Exchange Security Incident and Vulnerability Reporting Security Attack Litigation Cigre, Utilities Corporate Security Policy and Management

On-Going Coordination TC57 Security (62351) Roadmap WG19 As of May 2007 Current Work NWIPs to be Issued On-Going Coordination Parts 1, 3, 4, 6 – Finalized as TS Standards Party 2: Glossary – CDV Part 5: Security for IEC 60870-5 Protocols – CDV Part 7: Network and System Management /MIBs as CD Activities in 2007 To be issued 2007 Current and Future Release Remote Changing of Update Keys for IEC 60870-5 Implementation Specification for IEC 60870-5 Conformance testing and interoperability testing Security for Access to CIM (Interfaces and RBAC) Role-Based Access Control Security Guidelines for Telecommunications Security IEC TC65C WG10 ISA, CIGRE D2.22 EPRI,NERC, PCSF National Labs IEEE PSRC IEEE Security P1711, P1686, P1689 TC57 WG03 TC57 WG07? Features Time Frame WG15 Status October 2005