Geneva, Switzerland, 15-16 September 2014 Critical infrastructure protection: standardization to protect critical infrastructure objects Viacheslav Zolotnikov,

Slides:



Advertisements
Similar presentations
SCADA Security, DNS Phishing
Advertisements

7 Effective Habits when using the Internet Philip O’Kane 1.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Chapter 12 Network Security.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Lecture 11 Reliability and Security in IT infrastructure.
(Geneva, Switzerland, September 2014)
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
8/10/2015Windows 71 George South. 8/10/2015Windows Windows Vista Windows Vista was released in January 2007 some five years after Windows XP Vista.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
STUXNET. Summary What is Stuxnet? Industial Control Systems The target/s of Stuxnet. How Stuxnet spreads. The impact of Stuxnet on PLC’s.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Critical Information Infrastructure Protection: Urgent vs. Important Miguel Correia 2012 Workshop on Cyber Security and Global Affairs and Global Security.
SEC835 Database and Web application security Information Security Architecture.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
A sophisticated Malware Arpit Singh CPSC 420
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
By: Sharad Sharma, Somya Verma, and Taranjit Pabla.
IT Security for Users By Matthew Moody.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
Introduction to SSH Making connections donna Bair-Mundy.
Lessons from Stuxnet Matthew McNeill. Quick Overview Discovered in July 2011 Sophisticated worm - many zero-day exploits, Siemens programmable logic controller.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
 Stuxnet: The Future of Malware? Stephan Freeman.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
What do you know about your network Or maybe you don’t know who’s really there.
©Ian Sommerville 2004Software Engineering Case Studies Slide 1 The Internet Worm Compromising the availability and reliability of systems through security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Intro to Computer Security For COP3502, Intro to Computer Science Lecture 1 1.
Stuxnet.
Computer Security By Duncan Hall.
Understand Malware LESSON Security Fundamentals.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
ERCOT IT Update Ken Shoquist VP, CIO Information Technology Board Meeting February 2004.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
1. Definition : Malicious code refers to a program that is covertly inserted into another program with the intent to Malicious activities. 2.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Securing Network Servers
Firmware threat Dhaval Chauhan MIS 534.
Agenda Control systems defined
FOUNDATIONS OF OPERATIONAL RISK
Cybersecurity Case Study STUXNET worm
CIS 560 Education for Service-- snaptutorial.com.
A quick look into today’s APTs
Cyber-security and IEC International Standards
Information Security Session October 24, 2005
Propagation, behavior, and countermeasures
Object Oriented Programming and Software Engineering CIS016-2
Technology Convergence
Goddard Chamber September 12th, 2019 Hosts: John Ash & Jon Grover
Presentation transcript:

Geneva, Switzerland, September 2014 Critical infrastructure protection: standardization to protect critical infrastructure objects Viacheslav Zolotnikov, Sr.Technology Research Manager, Kasperksy Lab, ITU Workshop on “ICT Security Standardization for Developing Countries” (Geneva, Switzerland, September 2014)

Geneva, Switzerland, September Threats History Slammer, Blaster and the Great Blackout January 2003, the Slammer worm knocked out 911 emergency telephone service in Bellevue, Wash. The Blaster worm affected more than a million computers running Windows during the days after Aug “critical to the blackout were a series of alarm failures at FirstEnergy, a power company in Ohio” computer hosting the control room's "alarm and logging software" failed status computer at the Midwest Independent Transmission System Operator, a regional agency that oversees power distribution, failed Source :

Geneva, Switzerland, September Threats History Stuxnet quickly propagated throughout Natanz A double agent used a typical USB drive carrying a deadly payload to infect Iran's Natanz nuclear facility with the highly destructive Stuxnet computer worm, according to a story by ISSSource “August 2010, Stuxnet, as a worm intended to hit critical infrastructure companies left a back door that was meant to be accessed remotely to allow outsiders to stealthily control the plant” “Malware includes a rootkit, which is software designed to hide the fact that a computer has been compromised, and other software that sneaks onto computers by using a digital certificates signed two Asian chip manufacturers that are based in the same industrial complex - RealTek and Jmicron” Source :

Geneva, Switzerland, September Threats History Jan : Monju nuke power plant facility PC infected with virus “A computer being used at the Monju prototype fast- breeder reactor facility in Tsuruga, Fukui Prefecture, was recently discovered to have contracted a virus, and officials believe that some data from the computer may have been leaked as a result” “According to the Japan Atomic Energy Agency, which operates the facility, the computer in question was being used by on-duty facility employees to file company paperwork when the virus was first detected on Jan 2” “…the computer was infected with the virus when a video playback program was attempting to perform a regular software update” Source :

Geneva, Switzerland, September Threats History Backdoor In Equipment Used For Traffic Control, Railways Called “Huge Risk” Security hole (back door account “factory”) in industrial control software by the firm RuggedCom Potentially affected wide range of critical infrastructure, including rail lines, traffic control systems and electrical substations April 2011 to July 2011 – no actions from RuggedCom February 2012 : US-CERT notified and “warning” issued Source:

Geneva, Switzerland, September Issues Main issue – Do not “touch” the working system. How about computer system connected to the internet ? Hacking Passwords complexity check bypass, hardcoded passwords for systems System’s regular maintenance, applying patches HMIs using mobile phone interfaces

Geneva, Switzerland, September Kaspersky SCADA Honeypot Run in September’13 SCADA computer with public IP “acting as industrial system PC” 1294 unauthorized access attempts 422 succeded access cases 34 cases of access by the development environment systems 7 cases of downloading the PLC configuration 1 case of PLC reprogramming (!!!)

Geneva, Switzerland, September Researchers Delivers During talks on SCADA security problems at the Kaspersky- Threatpost Security Analyst Summit [in Feb’12], several other researchers talked about the serious issues inherent in these ICS installations, and the picture they painted is one of systemic problems and a culture of naivete about security in general. Terry McCorkle, an industry researcher, discussed a research project he did with Billy Rios in which they went looking for bugs in ICS systems, hoping to find 100 bugs in 100 days. That turned out to be a serious underestimation of the problem. “It turns out they’re stuck in the Nineties. The SDL doesn’t exist in ICS,” McCorkle said. “There are a lot of ActiveX and file format bugs and we didn’t even bother looking at problems with services. Ultimately what we found is the state of ICS security is kind of laughable.” Source:

Geneva, Switzerland, September Researchers Conclusion “Those ICS and SCADA systems under research were developed in last century by people from last century using standards from last century”

Geneva, Switzerland, September Remarkable Standards in Under development IEC (former ISA99, adopted ISA 2700x) NIST DRAFT Guide to Industrial Control Systems (ICS) Security SP Rev.2 Released : NIST Framework for Improving Critical Infrastructure Cybersecurity

Geneva, Switzerland, September Key principles of secured system development to be standardized Complete mediation Components isolation (processes, resources) All sensitive operations control Tamperproof Have trusted execution base minimal and structured Resistance to external actions, incorrect queries, etc. Security configuration protection Verifiability Structured, compact and tested Formal/semi-formal methods Platform Flexibility in security policy definitions Secured systems development methodology

Geneva, Switzerland, September Recommendations Create a collaborative working group of experts within ITU-T to address nowadays Critical Infrastructure Systems threats Focus on secure systems development standardization for critical infrastructures and ICS Initiate the work for standards for ICS and Critical Infrastructure Systems Involve world-wide practitioners and make ICS standards available for all countries to share best practices enforced by standards

Geneva, Switzerland, September Thank you