Cybersecurity Case Study Maroochy water breach

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
BELASTINGEN EN INVORDERINGEN Administratie der Douane en Accijnzen 19 October What is the Megaports Initiative and which are its objectives? The.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Lecture 11 Reliability and Security in IT infrastructure.
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Protecting ICT Systems
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
1 ● Plant Automation Security Review of Cyber Security Attack at Maroochy Water Services ● Bradley Yager ● National Business Development Manager – Telemetry.
BUSINESS B1 Information Security.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Cost of Ownership of a PC Acknowledgements to Euan Wilson (Staffordshire University)
Cyber Terrorism Shawn Carpenter Computer Security Analyst
Appendix C: Designing an Operations Framework to Manage Security.
Jamie Lyle (Cpsc 620) December 6, Overview  Logic Bombs  The story of Roger Duronio and UBS PaineWebber  Defenses against logic bombs.
JMU GenCyber Boot Camp Summer, Welcome Cyber Defense Boot camp for High School Teachers Cyber Defense Lab (ISAT/CS Room 140) Department of Computer.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Incident Response November 2015 Navigating a Cybersecurity Incident.
G063 – Change Management. Learning Objective: By the end of this topic you should be able to: discuss change management discuss the factors which must.
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
Network Topologies.
Proposed UW Minimum Computer Security Standards From C&C 28 Jan 2005 Draft.
Securing A Wireless Home Network. Simple home wired LAN.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
Welcome to the ICT Department Unit 3_5 Security Policies.
October 28, 2015 Cyber Security Awareness Update.
SCADA NETWORK SECURITY BY LICET 4-AUG-12.
JMU GenCyber Boot Camp Summer, 2016
Technology and Business Continuity
Why is this called “the ostrich effect”?
Koji Nakao, Dai Arisue NICT, Japan
Risk management.
3.6 Fundamentals of cyber security
Object Oriented Programming and Software Engineering CIS016-2
Types of information systems (IS) projects
Products/Solutions/Expertise of C-DAC Mumbai in Smart City Domain
Putting It All Together
Putting It All Together
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Jeopardy Security Risks Hardware & Software Computer Types Networking
cyberopsalliance.com |
Network management system
MIS 5121 Real World Control Failure
Intrusion detection Lewis Knight.
Intrusion detection systems?
Network Security Best Practices
INFORMATION SYSTEMS SECURITY and CONTROL
PLC / SCADA / HMI Controllers: Name : Muhammad Zunair Comsats University Date: 28-October-2018.
The iPremier Company: Denial of Service Attack
Cyber Security - Protecting Information
System Testing.
Detection Detect the breach and protect the data. By,
Security.
LO1 - Know about aspects of cyber security
G061 - Network Security.
Cyber Security For Civil Engineering
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Anatomy of Industrial Cyber Attacks
Presentation transcript:

Cybersecurity Case Study Maroochy water breach

Maroochy Shire Image credit: http://www.hinterlandtourism.com.au/attractions/the-maroochy-river/

Maroochy shire sewage system SCADA controlled system with 142 pumping stations over 1157 sq km installed in 1999 In 2000, the area sewage system had 47 unexpected faults causing extensive sewage spillage

SCADA setup Typical SCADA-controlled sewage system This is not the system that was attacked

SCADA sewage control Special-purpose control computer at each station to control valves and alarms Each system communicates with and is controlled by central control centre Communications between pumping stations and control centre by radio, rather than wired network

What happened More than 1m litres of untreated sewage released into waterways and local parks

Technical problems Sewage pumps not operating when they should have been Alarms failed to report problems to control centre Communication difficulties between the control centre and pumping stations

Insider attack Vitek Boden worked for Hunter Watertech (system suppliers) with responsibility for the Maroochy system installation. He left in 1999 after disagreements with the company. He tried to get a job with local Council but was refused.

Revenge! Boden was angry and decided to take revenge on both his previous employer and the Council by launching attacks on the SCADA control systems He hoped that Hunter Watertech would be blamed for the failure Insiders don’t have to work inside an organisation!

What happened? Image credit: http://www.pimaweb.org/conference/april2003/pdfs/MythsAndFactsBehindCyberSecurity.pdf

How it happened Boden stole a SCADA configuration program from his employers when he left and installed it on his own laptop He also stole radio equipment and a control computer that could be used to impersonate a genuine machine at a pumping station Insecure radio links were used to communicate with pumping stations and change their configurations

Incident timeline Initially, the incidents were thought to have been caused by bugs in a newly installed system However, analysis of communications suggested that the problems were being caused by deliberate interventions Problems were always caused by a specific station id

Actions taken System was configured so that that id was not used so messages from there had to be malicious Boden as a disgruntled insider fell under suspicion and put under surveillance Boden’s car was stopped after an incident and stolen hardware and radio system discovered

Causes of the problems Installed SCADA system was completely insecure No security requirements in contract with customer Procedures at Hunter Watertech were inadequate to stop Boden stealing hardware and software Insecure radio links were used for communications

Causes of the problems Lack of monitoring and logging made detection more difficult No staff training to recognise cyber attacks No incident response plan in place at Maroochy Council

Aftermath On October 31, 2001 Vitek Boden was convicted of: 26 counts of willfully using a computer to cause damage 1 count of causing serious environment harm Jailed for 2 years

Finding out more http://www.pimaweb.org/conference/april2003/pdfs/MythsAndFactsBehindCyberSecurity.pdf http://harbor2harbour.com/?p=144 http://www.ifip.org/wcc2008/site/IFIPSampleChapter.pdf http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf