SlideShare una empresa de Scribd logo
1 de 12
Topics Covered
• Introduction of Cyber Security Center of
  Excellence
• Control Systems Security Program Overview
     – Overview of Cyber Vulnerabilities
     – Understanding Control System Cyber Vulnerabilities
     – Access to the Control System LAN
     – Discovery of the Process
     – Control of the Process
• Q&A
Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT
                                                                                                                               2
Introduction of Cyber Security Center of
                       Excellence
 Provide
        unique online Evergreen Education and Training Programs in
 IT/SCADA Cyber Security.
   Build on the current online programs:
      Computer and Network Certification Credit Hour.
      Professional Education Self-Paced Cyber Security Program.
      Professional Education CompTIA Security+ Certification Program.
 Conduct research, development , and training in the field of IT Cyber Security.
   Centered on meeting the private and public sectors’ needs for infrastructure monitoring,
     controlling, and training to protect the security of the United States from enemy cyber attacks.
        Supercomputer Decision Support and Counter Attack Measures Cyber Operations System.
        Utilizing SCADA, Decision Support, Artificial Intelligence, and Knowledge Based processes
         in a lab environment .
        Serve as a National Clearinghouse on Cyber Security.
              Focus on education/training based on INFOSEC standards.
              Research/Development in Best Practices, process reengineering, and technology.
 Provide Specialized Professional Services to the private and public sectors
   through conferences/summits, workshops, publications, and speaking
   engagements.


                                                                                               3
Control Systems Security Program
                Recommended Practices Overview
• Addresses the issues encountered in developing and maintaining a cyber
  forensics plan for control systems environments.
• Supports forensic practitioners in creating a control systems forensics plan.
• Assumes evidentiary data collection and preservation using forensic best
  practices.
• The goal is not to reinvent proven methods, but to leverage them in the best
  possible way.
• The material in this recommended program provides users with the appropriate
  foundation to allow these best practices to be effective in a control systems
  domain.
• The program is organized into three major sections:
     –        Section 1, Traditional Forensics and Challenges to Control Systems.
     –        Section 2, Creating a Cyber Forensics Program for Control Systems Environments.
     –        Section 3, Activating and Sustaining a Cyber Forensics Program.
•     Link to White Paper:
    http://www.uscert.gov/control_systems/practices/documents/Forensics_RP.pdf
         Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT   4
Overview of Cyber Vulnerabilities
• Control systems are vulnerable to cyber attack from
  inside and outside the control system network.
• To understand the vulnerabilities associated with control
  systems you must know:
       – Types of communications.
       – Operations associated with the control system.
       – An understanding of the how attackers are using the system
         vulnerabilities to their advantage.
• This discussion provides a high level overview of these
  topics but does not discuss detailed exploits used by
  attackers to accomplish intrusion.
Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT
                                                                                                                               5
Understanding Control System
                           Cyber Vulnerabilities
• To understand the vulnerabilities                                             Figure 1: Communications access to control systems


  associated with control systems
  (CS), you must first know all of the
  possible communications paths
  into and out of the CS.
• Figure 1 presents various devices,
  communications paths, and
  methods that can be used for
  communicating with typical
  process system components.




 Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT
                                                                                                                                6
Understanding Control System
                           Cyber Vulnerabilities
• In a typical large-scale production system utilizing SCADA or
  Distributed Control System (DCS) configuration there are many
  computer, controller and network communications components
  integrated to provide the operational needs of the system. A typical
  network architecture is shown in Figure 2.




 Figure 2: Typical two-firewall network architecture
 Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT
                                                                                                                                7
Understanding Control System
                          Cyber Vulnerabilities

• An attacker who wishes to assume control of a
  control system is faced with three challenges:
       1. Gain access to the control system LAN.
       2. Through discovery, gain understanding of the
          process.
       3. Gain control of the process.




Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT
                                                                                                                               8
Access to the Control System LAN
      •    Common Network Architectures                                •   Corporate VPNs
      •    Dial-up (wireless) Access to the RTUs                       •   Database Links
      •    Vendor Support                                              •   Poorly Configured Firewalls
      •    IT Controlled Communication Gear                            •   Peer Utility Links
• The first thing an attacker needs to accomplish is to bypass the perimeter
  defenses and gain access to the control system LAN.
      – Most control system networks are no longer directly accessible remotely from the Internet.
      – Common practice in most industries has a firewall separating the business LAN from the control
        system LAN.
          • This not only helps keep hackers out, it isolates the control system network from outages,
             worms, and other afflictions that occur on the business LAN.
      – Most of the attacker's off-the-shelf hacking tools can be directly applied to the problem.
          • There are a number of common ways an attacker can gain access, but the miscellaneous
             pathways outnumber the common pathways.
• The second most common architecture is the control system network as a
  Demilitarized Zone (DMZ) off the business LAN.
      – A single firewall is administered by the corporate IT staff that protects the control system LAN
        from both the corporate LAN and the Internet.

Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and
USCERT                                                                                                                  9
Discovery of the Process
• An attacker that gains a foothold on the control system LAN must discover the
  details of how the process is implemented to surgically attack it.
    – An attacker that wants to be surgical needs the specifics in order to be effective. An attacker that
      just wants to shut down a process needs very little discovery.
• The two most valuable items to an attacker are
    1. Points in the data acquisition server database
        • Each control system vendor calls the database something different, but nearly every control
            system assigns each sensor, pump, breaker, etc., a unique number. On the communications
            protocol level, the devices are simply referred to by number.
        • A surgical attacker needs a list of the point reference numbers in use and the information
            required to assign meaning to each of those numbers.
    2. Human-Machine Interface (HMI) display screens.
         • The operator HMI screens generally provide the easiest method for understanding the process
           and assignment of meaning to each of the point reference numbers.
         • Each control system vendor is unique in where it stores the operator HMI screens and the
           points database.
         • Rules added to the Intrusion Detection System (IDS) looking for those files are effective in
           spotting attackers.

  Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT
                                                                                                                                 10
Control of the Process
             Sending Commands Directly to the Data Acquisition Equipment
•   The easiest way to control the process is to send commands directly to the data acquisition
    equipment.
     – Most PLCs, protocol converters, or data acquisition servers lack even basic authentication.
     – They generally accept any properly formatted command.
     – An attacker wishing control simply establishes a connection with the data acquisition equipment
       and issues the appropriate commands.
•   An effective attack is to export the screen of the operator's HMI console back to the attacker.
     – Off-the-shelf tools can perform this function in both Microsoft Windows and Unix environments.
     – The attacker is also limited to the commands allowed for the currently logged-in operator.
•   Man-in-the-middle attacks can be performed on control system protocols if the attacker
    knows the protocol he/she is manipulating.
     – An attacker can modify packets in transit, providing both a full spoof of the operator HMI displays
       and full control of the control system.
     – By inserting commands into the command stream the attacker can issue arbitrary or targeted
       commands.
     – By modifying replies, the operator can be presented with a modified picture of the process.
     – Direct controls from wireless hand-held devices.


                                                                                                                                  11
               Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT
http://www.us-cert.gov/control_systems/csstandards.html

Más contenido relacionado

La actualidad más candente

Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS CommunicationsDigital Bond
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSChris Sistrunk
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)Digital Bond
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overviewpgmaynard
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkMarcoAfzali
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?Digital Bond
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefLancope, Inc.
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSJim Gilsinn
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Jim Gilsinn
 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104pgmaynard
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefLancope, Inc.
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMJim Gilsinn
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systemsItex Solutions
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security WebinarAVEVA
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing KeynoteDigital Bond
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Digital Bond
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...promediakw
 

La actualidad más candente (20)

Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
 
Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104Man in the middle attacks on IEC 60870-5-104
Man in the middle attacks on IEC 60870-5-104
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing Keynote
 
Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)Vulnerability Inheritance in ICS (English)
Vulnerability Inheritance in ICS (English)
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 

Similar a Scada security presentation by Stephen Miller

Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...CODE BLUE
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesKrishna Chennareddy
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkataamiyadutta
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkNathan Wallace, PhD, PE
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)Ivan Carmona
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)TI Safe
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysMarcel Winandy
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar PresentationCertrec
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
SCADA Presentation
SCADA PresentationSCADA Presentation
SCADA PresentationEric Favetta
 

Similar a Scada security presentation by Stephen Miller (20)

Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
 
ICS security
ICS securityICS security
ICS security
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for Utilities
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
SCADA Presentation
SCADA PresentationSCADA Presentation
SCADA Presentation
 

Más de AVEVA

What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAWhat's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAAVEVA
 
What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4AVEVA
 
Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3AVEVA
 
Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3AVEVA
 
Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2AVEVA
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...AVEVA
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...AVEVA
 
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1AVEVA
 
Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1AVEVA
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioAVEVA
 
Graphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web StudioGraphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web StudioAVEVA
 
What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1AVEVA
 
Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1AVEVA
 
What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1AVEVA
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...AVEVA
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...AVEVA
 
Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017AVEVA
 

Más de AVEVA (20)

What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAWhat's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4
 
Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5
 
What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3
 
Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3
 
Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2
 
What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
 
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
 
What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1
 
Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web Studio
 
Graphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web StudioGraphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web Studio
 
What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1
 
Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1
 
What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
 
Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017
 

Último

SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance managementVaishnaviGunji
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfbelieveminhh
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 

Último (20)

SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 

Scada security presentation by Stephen Miller

  • 1.
  • 2. Topics Covered • Introduction of Cyber Security Center of Excellence • Control Systems Security Program Overview – Overview of Cyber Vulnerabilities – Understanding Control System Cyber Vulnerabilities – Access to the Control System LAN – Discovery of the Process – Control of the Process • Q&A Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT 2
  • 3. Introduction of Cyber Security Center of Excellence  Provide unique online Evergreen Education and Training Programs in IT/SCADA Cyber Security. Build on the current online programs: Computer and Network Certification Credit Hour. Professional Education Self-Paced Cyber Security Program. Professional Education CompTIA Security+ Certification Program.  Conduct research, development , and training in the field of IT Cyber Security. Centered on meeting the private and public sectors’ needs for infrastructure monitoring, controlling, and training to protect the security of the United States from enemy cyber attacks.  Supercomputer Decision Support and Counter Attack Measures Cyber Operations System.  Utilizing SCADA, Decision Support, Artificial Intelligence, and Knowledge Based processes in a lab environment .  Serve as a National Clearinghouse on Cyber Security.  Focus on education/training based on INFOSEC standards.  Research/Development in Best Practices, process reengineering, and technology.  Provide Specialized Professional Services to the private and public sectors through conferences/summits, workshops, publications, and speaking engagements. 3
  • 4. Control Systems Security Program Recommended Practices Overview • Addresses the issues encountered in developing and maintaining a cyber forensics plan for control systems environments. • Supports forensic practitioners in creating a control systems forensics plan. • Assumes evidentiary data collection and preservation using forensic best practices. • The goal is not to reinvent proven methods, but to leverage them in the best possible way. • The material in this recommended program provides users with the appropriate foundation to allow these best practices to be effective in a control systems domain. • The program is organized into three major sections: – Section 1, Traditional Forensics and Challenges to Control Systems. – Section 2, Creating a Cyber Forensics Program for Control Systems Environments. – Section 3, Activating and Sustaining a Cyber Forensics Program. • Link to White Paper: http://www.uscert.gov/control_systems/practices/documents/Forensics_RP.pdf Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT 4
  • 5. Overview of Cyber Vulnerabilities • Control systems are vulnerable to cyber attack from inside and outside the control system network. • To understand the vulnerabilities associated with control systems you must know: – Types of communications. – Operations associated with the control system. – An understanding of the how attackers are using the system vulnerabilities to their advantage. • This discussion provides a high level overview of these topics but does not discuss detailed exploits used by attackers to accomplish intrusion. Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT 5
  • 6. Understanding Control System Cyber Vulnerabilities • To understand the vulnerabilities Figure 1: Communications access to control systems associated with control systems (CS), you must first know all of the possible communications paths into and out of the CS. • Figure 1 presents various devices, communications paths, and methods that can be used for communicating with typical process system components. Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT 6
  • 7. Understanding Control System Cyber Vulnerabilities • In a typical large-scale production system utilizing SCADA or Distributed Control System (DCS) configuration there are many computer, controller and network communications components integrated to provide the operational needs of the system. A typical network architecture is shown in Figure 2. Figure 2: Typical two-firewall network architecture Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT 7
  • 8. Understanding Control System Cyber Vulnerabilities • An attacker who wishes to assume control of a control system is faced with three challenges: 1. Gain access to the control system LAN. 2. Through discovery, gain understanding of the process. 3. Gain control of the process. Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT 8
  • 9. Access to the Control System LAN • Common Network Architectures • Corporate VPNs • Dial-up (wireless) Access to the RTUs • Database Links • Vendor Support • Poorly Configured Firewalls • IT Controlled Communication Gear • Peer Utility Links • The first thing an attacker needs to accomplish is to bypass the perimeter defenses and gain access to the control system LAN. – Most control system networks are no longer directly accessible remotely from the Internet. – Common practice in most industries has a firewall separating the business LAN from the control system LAN. • This not only helps keep hackers out, it isolates the control system network from outages, worms, and other afflictions that occur on the business LAN. – Most of the attacker's off-the-shelf hacking tools can be directly applied to the problem. • There are a number of common ways an attacker can gain access, but the miscellaneous pathways outnumber the common pathways. • The second most common architecture is the control system network as a Demilitarized Zone (DMZ) off the business LAN. – A single firewall is administered by the corporate IT staff that protects the control system LAN from both the corporate LAN and the Internet. Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT 9
  • 10. Discovery of the Process • An attacker that gains a foothold on the control system LAN must discover the details of how the process is implemented to surgically attack it. – An attacker that wants to be surgical needs the specifics in order to be effective. An attacker that just wants to shut down a process needs very little discovery. • The two most valuable items to an attacker are 1. Points in the data acquisition server database • Each control system vendor calls the database something different, but nearly every control system assigns each sensor, pump, breaker, etc., a unique number. On the communications protocol level, the devices are simply referred to by number. • A surgical attacker needs a list of the point reference numbers in use and the information required to assign meaning to each of those numbers. 2. Human-Machine Interface (HMI) display screens. • The operator HMI screens generally provide the easiest method for understanding the process and assignment of meaning to each of the point reference numbers. • Each control system vendor is unique in where it stores the operator HMI screens and the points database. • Rules added to the Intrusion Detection System (IDS) looking for those files are effective in spotting attackers. Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT 10
  • 11. Control of the Process Sending Commands Directly to the Data Acquisition Equipment • The easiest way to control the process is to send commands directly to the data acquisition equipment. – Most PLCs, protocol converters, or data acquisition servers lack even basic authentication. – They generally accept any properly formatted command. – An attacker wishing control simply establishes a connection with the data acquisition equipment and issues the appropriate commands. • An effective attack is to export the screen of the operator's HMI console back to the attacker. – Off-the-shelf tools can perform this function in both Microsoft Windows and Unix environments. – The attacker is also limited to the commands allowed for the currently logged-in operator. • Man-in-the-middle attacks can be performed on control system protocols if the attacker knows the protocol he/she is manipulating. – An attacker can modify packets in transit, providing both a full spoof of the operator HMI displays and full control of the control system. – By inserting commands into the command stream the attacker can issue arbitrary or targeted commands. – By modifying replies, the operator can be presented with a modified picture of the process. – Direct controls from wireless hand-held devices. 11 Content from Eric Cornelius, Director SCADA Cyber Forensics, Department of Homeland Security, Idaho National Labs and USCERT

Notas del editor

  1. Activity 3 - Complete partnership with New Mexico Tech computer science department chair (Dr. Lorie Liebrock), Department of Homeland Security (DHS) and Idaho Labs (Eric Cornelius) DHS Technical Director at the labs and an ENMU-Ruidoso and NMTech alumni. This partnership has the potential funding for SCADA Forensic LAB equipment and internships. STATUS: In progress working with Eric on project scope for SCADA Forensics lab and certification program. Developing dual-credit program with Eric providing training to high school teachers. Awarded $120k SCADA software from Indosoft.
  2. As illustrated in Figure 1, there are many ways to communicate with a CS network and components using a variety of computing and communications equipment. A person who is knowledgeable in process equipment, networks, operating systems and software applications can use these and other electronic means to gain access to the CS. Wireless access points that allow unauthorized connection to system components and networks present vulnerabilities.
  3. Controller units connect to the process devices and sensors to gather status data and provide operational control of the devices. The controller unit communicates to a CS data acquisition server using various communications protocols (structured formats for data packaging for transmission). Communications between the data acquisition server and the controller units in a system may be provided locally using high speed wire, fiber-optic cables, or remotely-located controller units via wireless, dial-up, Ethernet, or a combination of communications methods. The operator or dispatcher monitors and controls the system through the Human-Machine Interface (HMI) subsystem. The HMI provides graphical displays for presentation of status of devices, alarms and events, system health, and other information relevant to the system. The operator can interact with the system through the HMI displays to remotely operate system equipment, troubleshoot problems, develop and initiate reports, and perform other operations. System data is collected, processed and stored in a master database server. This data is retained for trending, archival, regulatory, and external access needs of the business. The types of data include data from the following sources: the data acquisition server, operator control interactions, alarms and events, and calculated and generated from other sources. Most control systems utilize specialized applications for performing operational and business related data processing. These tasks are typically performed on advanced applications servers pulling data from various sources on the control system network. These applications can result in real-time operational control adjustments, reports, alarms and events, calculated data source for the master database server archival, or support of real-time analysis work being performed from the engineering workstation or other interface computers. An engineering workstation provides a means to monitor and troubleshoot various aspects of the system operation, install and update program elements, recover from failures, and miscellaneous tasks associated with system administration. A mission-critical control system is typically configured in a fully-redundant architecture allowing quick recovery from loss of various components in the system. A backup control center is used in more critical applications to provide a secondary control system if there is a catastrophic loss of the main system. The control system network is often connected to the business office network to provide real-time transfer of data from the control network to various elements of the corporate office. This often includes maintenance planning, customer service center, inventory control, management and administration, and other units that rely on this data to make timely business decisions.
  4. There are three common architectures found in most control systems. Every business has its own minor variations dictated by their environment. All three are securable if the proper firewalls, intrusion detection systems, and application level privileges are in place. By far the most common architecture is the two-firewall architecture (see Figure 3 ). The business LAN is protected from the Internet by a firewall and the control system LAN is protected from the business LAN by a separate firewall. The business firewall is administered by the corporate IT staff and the control system firewall is administered by the control system staff. Large DCS often need to use portions of the business network as a route between multiple control system LANs (see Figure 5 ). Each control system LAN typically has its own firewall protecting it from the business network and encryption protects the process communication as it travels across the business LAN. Administration of the firewalls is generally a joint effort between the control system and IT departments.