Cyber Security For Civil Engineering

Slides:



Advertisements
Similar presentations
Driving Factors Security Risk Mgt Controls Compliance.
Advertisements

30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
CPE 5002 Network security. Look at the surroundings before you leap.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
Lecture 11 Reliability and Security in IT infrastructure.
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
CPSC 6126 Computer Security Information Assurance.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
What does “secure” mean? Protecting Valuables
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Security Architecture
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Network security Network security. Look at the surroundings before you leap.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
CSCE 548 Secure Software Development Security Operations.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Computer Security By Duncan Hall.
Introduction to Computer Security
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo
Proactive Incident Response
CS457 Introduction to Information Security Systems
Industrial Control System Cybersecurity
Koji Nakao, Dai Arisue NICT, Japan
Risk management.
Port Knocking Benjamin DiYanni.
Security
Threats By Dr. Shadi Masadeh.
CS 450/650 Fundamentals of Integrated Computer Security
INFORMATION SYSTEMS SECURITY and CONTROL
How to Mitigate the Consequences What are the Countermeasures?
Faculty of Science IT Department By Raz Dara MA.
Security network management
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Cyber Security For Civil Engineering Lecture 2 Thiago Alves Ph.D. Student at the University of Alabama in Huntsville

Confidentiality Integrity Availability C-I-A Triad Confidentiality Integrity Availability

attacks on SCADA systems

Interruption An asset of the system is destroyed or becomes unavailable Attack on availability Destruction of hardware Cutting of a communication line May not be physical destruction May be temporary

Interception An unauthorized party gains access to an asset Attack on confidentiality Wiretapping to capture data in a network Intercept a password -> bad Intercept control data -> is it bad?

Modification An unauthorized party gains access to an asset and tampers the data Attack on integrity Change values in a data file Alter a program to make it perform differently Modify content of messages transmitted on a network

Modification Modification on SCADA -> very bad! Feedback control loop issues Modifying measured output, measured error, system input, or reference affects system output Measured error System input Reference + - System output Controller System Measured output Sensor

Injection An unauthorized party inserts counterfeit objects into the system Attack on authenticity Insertion of spurious messages in a network Addition of records to a file Injection on SCADA -> very bad!

Examples of attacks in real life

Stuxnet Cyber attack specifically targeting Iranian centrifuges used for uranium enrichment National state level attack Penetrated isolated network Destroyed 1/5th of the centrifuges in a secret Iranian facility

Maroochy Attack Insider issued radio commands to Maroochy sewage equipment Caused 800,000 liters of raw sewage to spill into local waterways Marine life died, the creek water turned black and the stench was unbearable for residents Insider used stolen laptop and radios

Ukrainian Power Grid Attack Attacked 3 Ukrainian regional electricity distributors within 30 minutes of each other 225,000 customers lost power Utilities forced to move to manual operation Black Energy 3 malware: exploited remote desktop to damage the system. Erased Master Boot Record and some logs

New York Dam Attack Remotely accessed controls of the dam gates from Iran Gate controls happened to be disconnected for maintenance, therefore it has not caused any serious injury Attack not detected by dam operators

Vulnerability, Threat and Countermeasures Vulnerability: weakness in a system that may be exploited Threat: set of circumstances which has potential to cause harm Countermeasure: Means to counter threats

A threat is blocked by applying countermeasures of a vulnerability

𝑅𝑖𝑠𝑘= (𝑇ℎ𝑟𝑒𝑎𝑡𝑠 ∗𝑉𝑢𝑙𝑛𝑒𝑟𝑎𝑏𝑖𝑙𝑖𝑡𝑖𝑒𝑠) 𝐶𝑜𝑢𝑛𝑡𝑒𝑟𝑚𝑒𝑎𝑠𝑢𝑟𝑒𝑠 Risk Assessment 𝑅𝑖𝑠𝑘= (𝑇ℎ𝑟𝑒𝑎𝑡𝑠 ∗𝑉𝑢𝑙𝑛𝑒𝑟𝑎𝑏𝑖𝑙𝑖𝑡𝑖𝑒𝑠) 𝐶𝑜𝑢𝑛𝑡𝑒𝑟𝑚𝑒𝑎𝑠𝑢𝑟𝑒𝑠 If you have no threats, there is no risk If you have no vulnerabilities, there is no risk If you have no countermeasures, the risk is MAXIMUM

Risk Assessment If you have no threats, there is no risk If you have no vulnerabilities, there is no risk If you have no countermeasures, the risk is MAXIMUM

Risk Assessment Categorize the system based on an impact analysis Select an initial set of baseline security controls for the system based on the categorization done earlier Implement the security controls Assess the security controls to determine the extent to which they are implemented correctly Authorize the system operation based on a determination of the risk and the decision that this risk is acceptable Monitor the security controls in the system on an ongoing basis

Defense in Depth

Defense in Depth Defense in Depth (also known as Castle Approach) is a concept in which multiple layers of security controls are placed throughout a system A countermeasure can, and will be defeated. Defense in depth provides additional layers of protection

Defense in Depth Castle Stored Secret Moat Computational infeasible barrier (encryption) Outer Walls Firewall, access control list Watch tower Monitoring, intrusion detection systems Guard check Access control (login with passwords) Draw bridge Close unused ports

Fail Secure: Access or data will not be compromised due to failure Fail Safe / Fail Secure Fail Safe: In the event of a failure, system responds in a way that will cause no harm Fail Secure: Access or data will not be compromised due to failure

Lock example Fail safe: fail unlocked power to lock Fail Safe / Fail Secure Lock example Fail safe: fail unlocked power to lock Fail secure: fail locked power to unlock

Mythbusters Encryption ≠ cyber security Encryption is a cyber security tool used primarily for confidentiality Hackers are not kids. Hackers are often: Insiders Governments Terrorists Organized Crime Security by obscurity Hackers love obscure. They are that kind of people Hackers thrive on obscure. There is less attention on their actions if no one thinks there is a problem