0% found this document useful (0 votes)
41 views

2. SCADA System Security Threats Vulnerabilities and Solutions

Uploaded by

raksha.apple
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

2. SCADA System Security Threats Vulnerabilities and Solutions

Uploaded by

raksha.apple
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Iw; The IEE Control & Automation Professional Network

SCADA system security threats,


vulnerabilities and solutions

Ron Derynck, Verano

Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
IEE Seminar on
Developments in Control in the Water Industry
November 24-25 2004
The University of Warwick, UK

SCADA SYSTEM SECURITY THREATS, ,


VULNERABXLITIES AND SOLOTSONS .

Ron Derynck
Director, Product Strategies
VERANO
[email protected]

About Verano

Procass Industries Transportation Energy

Industrial software company


Headquarters in Mansfield, Mass.
software development in Calgary, Canada
12-year history of providing mission-critical plant control, monitoring and
integration solutions
In 2000 acquired automation software business from HP
Over 200 customers (including CalWater 8 Thames Water)
First industrial operations cyber-security solutions provider@UIRUSIAtflL nEf€#fl€R"

Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
Cyber Security Threats

"You can't talk about securing a dam or railroad without being sensitive to
the notion that a cyber intruder could bring as much destruction or havoc as
someone with a stick of dynamite"
Tom Ridge, US Homeland Security Secretary, quoted in Calgary Her8ld Oct 8, M M

"Richard Clarke and Howard Schmidt, the two former chairmen of the
President's Critical Infrastructure Protection Board, acknowledged in
interviews that raids conducted during the war on terrorism have uncovered
evidence that al-Qaeda has been actively studying vulnerabilities in U.S.
SCADA systems."
Computerworld
416104

"...it's quite frightening to see what's out there...the tools are very easy to
use. ... 'I

Manager of one of the largest SCADA syaems in NOM America discussing what histeam found when
they went outto Investigate hw malidousattackers wuld wmpromise their operations

Cyberspace Is Becoming
Increasingly Hostile

f Security Vulnerabilltiesvs Incidents I c The Evolution of Malicious Code 1

L
swrca: w . c e n . o ~ l s l ~ 3wm: Ce!4ts~he6ank

Number of vulnerabilities. attacks. level of roohistication and damaae continue


- I

to grow

1912

Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
Control System Security Challenges

Industry driven to open architectures over the last 10 years


Control systems were not designed with security in mind
Connecting IT and control networks created an access path for contr
network intrusion

I -__-. -
op*chl* w m.ID C D Y R I I " COU'IOUITYL *I,W. ,*=-

Points of Potential Vulnerability

1913

Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
[#I
Corporate Security Measures Are Not Sufficient

20%
U 4 RaspondenlL Using

?lr*waII SWPlr.
Lwln

...
External penetration still occurs and no barrier to internal misuse exists

Steps to Safeguard SCADA Systems

Define, document and protect control network


perimeter
Plan for "Defense in Depth"
Protect against internal as well as external threats
Segment your network
Harden the control equipment

1914

Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
Defense I n Depth

6 Single User interface

1
/
Inappmpriata
Users

Malware
ErpIolts
i
Internal Attks
I
I
Resource Lkg
I
Disgruntled
Employee
Single Platform
I___

’E

Protecting The Controf Systems

OSerurity and Iiitegrity Agents

Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
You Can’t Manage What You Don‘t
Measure

Security Agents
Control network intrusion detection
Control network integrity
Host access monitoring
Critical file monitoring
Performance & Integrity Agents
Host performance
Control application Integrity

Intrusion Detection Example

SCADA Application

19/6

Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
Intrusion Alert Example

Security Management System


Arch itect ure

Security L Performance
Agents on Control sccurlty
Devices Monitoring

19/7

Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.
Conclusions

The increasing sophistication of cyber threats


demands a multi-layered approach to protecting the
security and integrity of mission critical systems.
Threats are internal as well as external.
Security Management systems designed
specifically for control networks are now available.

1918

Authorized licensed use limited to: Intel Corporation via the Intel Library. Downloaded on September 26, 2009 at 23:15 from IEEE Xplore. Restrictions apply.

You might also like