Smart Grid Cyber Security Framework

Slides:



Advertisements
Similar presentations
Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
Advertisements

UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
1 GE Consumer & Industrial Multilin MultiLink Hardened Ethernet Communication Switches Ethernet Communication Solutions for the Industrial Automation,
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Unified Logs and Reporting for Hybrid Centralized Management
SmartMeter Program Overview Jana Corey Director, Energy Information Network Pacific Gas & Electric Company.
By Lauren Felton. The electric grid delivers electricity from points of generation to consumers, and the electricity delivery network functions via two.
(Geneva, Switzerland, September 2014)
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
August 8, 2015ECI Confidential. AccessWave Smart Grid Market Trends& Applications Matthias Nass VP Field Marketing EMEA.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Cyber Threats/Security and System Security of Power Sector Workshop on Crisis & Disaster Management of Power Sector P.K.Agarwal, AGM Power System Operation.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Securing Information Systems
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
1 IS 8950 Managing Network Infrastructure and Operations.
Lessons Learned in Smart Grid Cyber Security
Smart Grid Technologies Damon Dougherty – Industry Manager.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
FirstEnergy / Jersey Central Power & Light Integrated Distributed Energy Resources (IDER) Joseph Waligorski FirstEnergy Grid-InterOp 2009 Denver, CO November.
1 Jon Sudduth Project Engineer, Intelligent Grid Deployment SWEDE April 26, 2011.
The Smart Grid Enabling Energy Efficiency and Demand Response Clark W
IT Infrastructure Chap 1: Definition
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 6 of the Executive Guide manual Technology.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Vermont Electric Power Company, Inc Vermont’s eEnergy Smart Grid Initiative Kerrick Johnson Vice President for External Affairs.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 End to End Security on the Smart Grid Perry Jurancich Utilities Vertical Market Development Verizon.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
JEMMA: an open platform for a connected Smart Grid Gateway GRUPPO TELECOM ITALIA MAS2TERING Smart Grid Workshop Brussels, September Strategy &
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
June 17, 2009 Michael W. Howard, Ph.D. Sr. Vice President The Interoperable Smart Grid Evolving.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Smart Grid Introduction
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Ingredients of Security
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
IS3220 Information Technology Infrastructure Security
THE NEW GENERATION TRANSMISSION By Ashroo M. Das 6 th sem, EEE & Deepak Kumar 6 th sem, EEE.
Myongji University HMCL
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Eric Peirano, Ph.D., TECHNOFI, COO
Eric Peirano, Ph.D., TECHNOFI, COO
Business Risks of Insecure Networks
BOMGAR REMOTE SUPPORT Karl Lankford
Cloud Testing Shilpi Chugh.
CORPORATE PROFILE JUNE 2016
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
How to Mitigate the Consequences What are the Countermeasures?
PLANNING A SECURE BASELINE INSTALLATION
Technology Convergence
IT Management Services Infrastructure Services
Presentation transcript:

Smart Grid Cyber Security Framework Dr. Satyam Priyadarshy RKR Group, Inc (renaming as Reignite Strategy, Inc. May 1,11) priyadarshy@ieee.org or +1 703 7314461 Dr. Arun Sood SCIT LaBS INC & George Mason University asood@scitlabs.com asood@gmu.edu Prepared For Third Workshop on Cyber security and global affairs in partnership with CERt-Hungary BudapesT, hungary May 31-June 2, 2011

What is Smart Grid? Smart Grid is NOT a product or service. Smart Grid is the integration of two infrastructures Electrical Infrastructure (expanded Energy Infrastructure) Information Infrastructure Smart Grid is the power delivery system of the future With Increased Energy Efficiency and Operational Productivity With Increased Power System Reliability and QoS (Quality of Service) Empowers Consumers and Everyone for Decision making to use Energy Efficiently Smart Grid goals will be achieved through Optimal Use of Assets Efficient operation and the inclusion of active participation from consumers Use of new energy sources, storage, products, services and markets Proactive self-healing through continuous self-assessments of grid components Resiliency to cyber attacks Smart Grid needs a robust Cyber Security Framework, due to network dependency March 28,2011

Smart Grid Image Source: http://www.consumerenergyreport.com/wp-content/uploads/2010/04/smartgrid.jpg March 28,2011

Smart Grid Framework Smart Grid Framework constitutes the following seven layers Energy transmission and distribution infrastructure Communication network Data center computational platform Informational systems infrastructure and operational systems Business applications for automation, communications and management Vendor partnerships and services Smart Grid needs to have defense mechanisms at each of the above seven layers. March 28,2011

Smart Grid Framework The layered cyber security framework should include: The physical security The access control The secure devices, systems and network The secure software, applications, databases, and storage The secure intercommunications and data transport The defense to the existing and emerging threat landscape The self-healing of grid through real-time monitoring and management In the following sections we discuss each one of them. March 28,2011

Cyber Security Framework Leverage the existing security systems. SCADA (Supervisory Control And Data Acquisition) is the security systems in the current grids, within isolated environments. Expand SCADA, for Smart Grid, as environments will no longer remain isolated and will be on always connected networks. Use multiple points, if necessary. March 28,2011

Cyber Security Framework – Physical Security Requires an integrated solution for protecting the premises from intruders. The solution will have to automate Data analysis Creation of Alerts, Response to alerts from Electronic access controls, Sensors, etc. Generators, Smart Appliances, etc. Equipment transport logs, etc. Video surveillance, etc. Other new technologies as become available Use multiple points, if necessary. March 28,2011

Cyber Security Framework –Access Control and Identity Management Robust access control & identity management/verification policies for People, Vendors Companies Communicating devices, etc. Use of strong passwords, reCAPTCHA, biometrics, etc. for authentication from the start Implementation for Sarbanes-Oxley like rules The default-deny policy for the servers, routers, switches, and other devices should be in place, when these devices go on the network. An access on the network should require explicit permission settings, to avoid any unauthorized entry. For example, a customer shall access energy consumption metrics from the Smart Meter, but shall not be allowed to make changes to the device itself. Use multiple points, if necessary. March 28,2011

Cyber Security Framework Hardening of the devices, servers, and network before deployment and connection to the backbone of Smart Grid. For example, the factory settings like passwords, open ports, etc. on the devices, routers, switches, servers, sensors, and Wi-Fi networks shall be changed based on the access and control policies set earlier. Implementation of the recommendations from the vendor on making their devices secure For example, disruptions caused by denial of service (DoS) attacks can be reduced if the vendor recommendations for securing the devices are followed. Use multiple points, if necessary. March 28,2011

Cyber Security Framework –Secure SADS Smart Grid will integrate multiple vendors for software, applications, databases and storage (SADS) through its backbone, the Smart Grid Network. SADS are secure before deploying it on the networked devices. For example, memory injection issues do not get deployed knowingly. Consistent and timely upgrade and patch deployment policies for SADS. should take into account the consistency, timeliness and interdependencies of SADS. Same robust testing and phased deployment of open source and commercial off-the shelf (COTS) SADS. Use multiple points, if necessary. March 28,2011

Cyber Security Framework –Secure Data Transport and Storage Data transport at very low latency and high throughput is critical for Smart Grid. Data needs be protected as it is shared between different entities and stored Data encryption would be essential to implement across the board (both for transport and storage) Granular access to sensitive data at the user and application level should be implemented. Leveraging VPN technologies for data transmission between devices in the Smart Grid network will be needed. Use multiple points, if necessary. March 28,2011

Cyber Security Framework –Defense in Depth Defense-in-depth approach of multi-level and multi-layer security to protect from existing and emerging threats. The known threats from Hackers, vandals, and disgruntled employees, Competitors, customers, security systems, Terrorists, and foreign countries, Rogue devices, tainted software, and other yet unknown sources Address attacks like spoofing, cracking denial of service, eavesdropping, traffic analysis, social engineering, malware, etc. Use multiple points, if necessary. March 28,2011

Cyber Security Framework –Self-healing Self-healing of Smart Grid requires that cyber security become pervasive and granular. Real-time monitoring of data at the lowest possible granular level will provide immediate knowledge About changes Events that can disrupt the Smart Grid Allow to take quick corrective actions In a complex system like the Smart Grid, events can arise As a result of a security breach As a noise during the course of operations. Monitoring these events will ensure the protection and security of the Smart Grid. Use multiple points, if necessary. March 28,2011

asood@gmu.edu or priyadarshy@ieee.org Thanks !! For a self-healing, always on, highly efficient SMART GRID, a robust Cyber Security Framework is essential. For more information Contact asood@gmu.edu or priyadarshy@ieee.org March 28,2011