Presentation is loading. Please wait.

Presentation is loading. Please wait.

Personnel 500-600 hours$10,000-$12,000 Hardware Virtualization Server(?)$3000-$10,000 SIPROTEC 4 7SJ61 Relay s$0 SCALANCE S612 Security.

Similar presentations


Presentation on theme: "Personnel 500-600 hours$10,000-$12,000 Hardware Virtualization Server(?)$3000-$10,000 SIPROTEC 4 7SJ61 Relay s$0 SCALANCE S612 Security."— Presentation transcript:

1

2

3

4

5

6

7

8

9 Personnel 500-600 hours$10,000-$12,000 Hardware Virtualization Server(?)$3000-$10,000 SIPROTEC 4 7SJ61 Relay s$0 SCALANCE S612 Security Module$0 Software Spectrum Power TG SCADA/EMS (HMI)$0 SICAM PAS v6.00 (RTU)$0 DIGSI (Relay Configuration)$0 DIgSILENT PowerFactory (Power Flow)$0 VmWare ESXi$0 NMap$0 Wireshark$0 BackTrack Linux$0 Total$13,100-$22,200

10

11 SCADA System with Poor Security Improvement Cycle SCADA System with Improved Security System Configuration and Improvement Vulnerability Assessment Attack Scenario

12

13 DIgSilent PowerFactory (OPC Client) Virtal and Real SICAM PAS (OPC DA Server) Virtualized and Real Relays Siemens Spectrum Power TG (HMI)

14 Will use vulnerability scanners to scan for potential vulnerabilities Document and assess this vulnerabilities for potential attack Implement an attack to exploit vulnerability, documenting outcomes Write a report with detail about vulnerabilities, attacks and potential fixes.

15 Our SCADA network test bed consists of a few key pieces of hardware and software: Hardware Siemens SCALANCE S612 Security Module Siemens SIPROTEC 4 7SJ61 Relay (Sensor) Software Siemens Spectrum Power TG SCADA/EMS (HMI) Siemens SICAM PAS v6.00 (RTU) Siemens DIGSI (Software for SIPROTEC Protection Relays) VmWare ESXi 4.1 Nessus Other Vulnerability Assessment Software

16 1.Validate the System – Eliminate any incorrect assumptions 2.Document Running Services – Evaluate possible network entry point into each device – Check for glaring security holes (Open webserver, mail server, etc.) 3.Document Well-Known Vulnerabilities – Check for popular exploit opportunities (Windows, Adobe Reader, Flash)

17 4.Document Implementation Specific Vulnerabilities – Vulnerabilities specific lab equipment and software 5.Attack Implementation – Implement Attack – Document Attack Procedure 6.Produce Report – Existing Vulnerabilities – Possible Impact – Possible Countermeasures

18 Delphin-Informatika IEC 61850 Simulator Delphin-Informatika IEC 61850 Simulator – Software Solution for use a virtual relay – Design for use with SICAM PAS and SIPROTEC Relays – Trial license; limited functionality; expensive – End result: chose to use another software solution Siemens Spectrum Power TG DTS Siemens Spectrum Power TG DTS – Dispatcher Training Simulator – Desired to have DTS read real time data points and update power flow solution in real time – Siemens support period expired, bad/no documentation – End Result: Chose to use DIgSILENT PowerFactory instead

19

20 Virtualization Need to finish implementing the virtual relay simulator and connect it to system. Work on implementing multiple virtual substations into system Create easy deployments for substations Power Flow Simulation Configure DigSilent to integrate with testbed Test out real world scenarios Cyber Attacks Implement attacks against vulnerabilities Document findings

21


Download ppt "Personnel 500-600 hours$10,000-$12,000 Hardware Virtualization Server(?)$3000-$10,000 SIPROTEC 4 7SJ61 Relay s$0 SCALANCE S612 Security."

Similar presentations


Ads by Google