11. STUXNET BACKGROUND Stuxnet is a Windows computer worm discovered in July 2010. Targets industrial software and equipment. Its speculated that stuxnet was specifically designed to damageIran nuclear facilities and widely believed stuxnet introduced delay in Iran's Bushehr Nuclear Power Plant startup The first to include a programmable logic controller (PLC) rootkit.
21. Security issues and mitigation techniques Security Information and Event Management systems Intrusion monitoring systems integrated with SIEM Implement “Extrusion Detection” Implement passive vulnerability scanners (PVS) on the control systems network
22. JUNIPER IDP SCADA SIGNATURES SCADA:DNP3:DISABLE-RESP - This signature detects attempts to stop unsolicited responses from devices. Attackers can prevent devices from sending alarms SCADA:DNP3:READ - This signature detects attempts by clients to read information from a Programmable Logic Controller (PLC). Attackers can use this information to plan future, more targeted attacks SCADA:DNP3:STOP - This signature detects attempts to stop a DNP3 server SCADA:DNP3:WARM-RESTART- This signature detects attempts to reinitialize a PLC or DNP3 server SCADA:MODBUS:LISTEN-ONLY -This signature detects attempts to force a Programmable Logic Controller (PLC) into listen-only mode, in which the PLC does not respond to request packets SCADA:MODBUS:DOS - This signature detects attempts to force a Programmable Logic Controller (PLC) to restart. The PLC is unavailable while powering on
As part of the Q4 announcement group we are expanding our data center initiatives in 2 important ways, in line with our overall data center networking vision and strategy:1/ We are expanding our guidelines for designing next generation data center infrastructures, building on the foundations of our network simplification approach introduced in 2008 (simplifying the network, collapsing network tiers, virtualizing infrastructure elements, and simplifying management designs). We are expanding by delivering techniques for sharing network infrastructures with unique features, intelligence and scale, end-to-end based on Junos. And we are introducing a framework for delivering comprehensive and consistently managed security infrastructures for the cloud.2/ As detail to support delivering on the vision we are introducing 5 new security solution modules and associated best practices and implementation guidance to protect the critical information flows and assets associated with highly virtualized and distributed cloud data center networks.The rest of the presentation fills out information supporting these important announcements.