Cyber Security in Power Systems: Matus Korman
Cyber Security in Power Systems: Matus Korman
OF TECHNOLOGY
Cyber Security
in Power Systems
Matus Korman
Industrial information and
control systems, KTH
<[email protected]>
www.ics.kth.se
Source: Wikipedia
Outline
1. Background (IT-security)
2. Attackers, threats
THE REQUIRED
STATE OF DATA,
IT SERVICES AND
OTHER RESOURCES:
… BY APPLYING
Technology
Organization,
Human &
processes
culture
& rutines
Actually more than that…
…
pretty much
all these layers,
domains and zones:
To ensure security of the
power delivery – that’s on
the business layer and that
Smart Grid Architecture Model.
is dependent on roughly
CEN-CENELEC-ETSI Smart Grid Coordination Group: everything else in the
Smart Grid Information Security
picture.
NISTIR 7628 rev. 1: reference model – entities, actors
NISTIR 7628 rev. 1 – entities and data flows
Outline
1. Background (IT-security)
2. Attackers, threats
HACKTIVISTS
DIFFERENT CRIMINALS
FRAUDSTERS
[PROFESSIONAL]
HACKERS
MALWARE
MILITARY &
TECHNICAL USERS, WE
STATE UNITS
FAILURES OURSELVES
Outline
1. Background (IT-security)
2. Attackers, threats
System/component design:
• SCADA-software, HMI and workstation operating systems
(Windows, Linux), other systems;
• PLC, RTU, IED, switches, routers…
Network design:
• ICS-network (process network) + its connection to the office
network (and other networks);
• Application services running on machines in the ICS-network;
• Configuration of IT-security protection in the network
(firewalls, IDS/IPS, configuration of operating systems)…
Access control:
• Lacking access control (which user/role has access where, when, how, etc.)
• Vulnerable handling of authentication data (e.g., passwords)
• Over-privileged access accounts, old accounts, etc.
Security countermeasures
(e.g., firewalls, IDS/IPS, configuration, security operations):
• Weak network protection (firewall restrictions such as what ports, what IP ranges,
what intensity of communication, etc.)
• Lacking security reviews and accountability
• Vulnerable configuration of system such as unnecessary services and software
installed and even running
How an attack can take place…
A network can be penetrated e.g.:
• Directly: An attacker manages to get into a network from outside (e.g., by obtaining
an own IP-address in there, ARP-spoofing some other machine, …)
• Indirectly: An attacker exploits that personnel surfs on Internet, reads e-mail, etc… in
order to infect the personnel’s machine(s), and then attack further and deeper
• Social engineering: An attacker tricks personnel to do something compromising (e.g.,
give away a username, password etc.) – through pretending to be a legitimate
person, commonly in an urgent situation (e.g., a technician who quickly needs some
non-standard help to prevent a major failure/incident from happening…)
A software can be infected through (a single data flow can be enough) e.g.:
• Known vulnerabilities (on outdated systems) – statistically frequent and often
unnecessary vulnerability. Whoever can get exploits and shoot them at a system.
• Zero-day vulnerabilities (0-days, yet publicly unknown) – majority is not captured
even by advanced, expensive, collaborative security solutions (NGIPS). Luckily,
0-days are very expensive to buy usable exploits for (e.g., black market) and very
demanding to identify and develop on own for a generic software.
There are different types of attacks, e.g.:
• DoS (Denial of Service), DDoS (distributed DoS) – sabotage that blocks, saturates,
locks in or takes down systems/functions so that they no longer are available
(temporarily or permanently)
• MITM (Man-In-The-Middle) – hidden manipulation of data communication…
• Intrusion – leads to illegitimate control over a system or a part of it, which then can
lead to modifications/sabotage, mapping/espionage, etc…
Identifying potential victim devices…
Shodan – it’s like Google, just for devices with public access:
https://www.shodan.io/
1. Background (IT-security)
2. Attackers, threats
… etc.
Example countermeasures… just a few
The following document gives a very good overview of the different realistic security
controls to consider – ”The Critical Security Controls for Effective Cyber Defense” by
Council on Cyber Security:
https://www.sans.org/critical-security-controls
Outline
1. Background (IT-security)
2. Attackers, threats
General IT security:
• ISO/IEC 27000-series (27001, 27002, 27005…)