2. SCADA System Security Threats Vulnerabilities and Solutions
2. SCADA System Security Threats Vulnerabilities and Solutions
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
IEE Seminar on
Developments in Control in the Water Industry
November 24-25 2004
The University of Warwick, UK
Ron Derynck
Director, Product Strategies
VERANO
[email protected]
About Verano
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
Cyber Security Threats
"You can't talk about securing a dam or railroad without being sensitive to
the notion that a cyber intruder could bring as much destruction or havoc as
someone with a stick of dynamite"
Tom Ridge, US Homeland Security Secretary, quoted in Calgary Her8ld Oct 8, M M
"Richard Clarke and Howard Schmidt, the two former chairmen of the
President's Critical Infrastructure Protection Board, acknowledged in
interviews that raids conducted during the war on terrorism have uncovered
evidence that al-Qaeda has been actively studying vulnerabilities in U.S.
SCADA systems."
Computerworld
416104
"...it's quite frightening to see what's out there...the tools are very easy to
use. ... 'I
Manager of one of the largest SCADA syaems in NOM America discussing what histeam found when
they went outto Investigate hw malidousattackers wuld wmpromise their operations
Cyberspace Is Becoming
Increasingly Hostile
L
swrca: w . c e n . o ~ l s l ~ 3wm: Ce!4ts~he6ank
to grow
1912
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
Control System Security Challenges
I -__-. -
op*chl* w m.ID C D Y R I I " COU'IOUITYL *I,W. ,*=-
1913
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
[#I
Corporate Security Measures Are Not Sufficient
20%
U 4 RaspondenlL Using
?lr*waII SWPlr.
Lwln
...
External penetration still occurs and no barrier to internal misuse exists
1914
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
Defense I n Depth
1
/
Inappmpriata
Users
Malware
ErpIolts
i
Internal Attks
I
I
Resource Lkg
I
Disgruntled
Employee
Single Platform
I___
’E
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
You Can’t Manage What You Don‘t
Measure
Security Agents
Control network intrusion detection
Control network integrity
Host access monitoring
Critical file monitoring
Performance & Integrity Agents
Host performance
Control application Integrity
SCADA Application
19/6
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
Intrusion Alert Example
Security L Performance
Agents on Control sccurlty
Devices Monitoring
19/7
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
Conclusions
1918
Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.