Introduction to IRRIIS MIT Add-On Components Middleware Improvement Technology for Interdependent Critical Infrastructure 08 February 2007, Rome Giordano.

Slides:



Advertisements
Similar presentations
IRRIIS GdS: La Security nei sistemi di controllo e automazione, nelle reti e infrastrutture San Felice (MI), 26 giugno Pagina 1 Il Progetto IRRIIS.
Advertisements

Introduction to IRRIIS testing platform IRRIIS MIT Conference ROME 8 February 2007 Claudio Balducelli.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Chapter 13 Managing Computer and Data Resources. Introduction A disciplined, systematic approach is needed for management success Problem Management,
CSCU 411 Software Engineering Chapter 2 Introduction to Software Engineering Management.
SACM Terminology Nancy Cam-Winget, David Waltermire, March.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
IRRIIS – Integrated Risk Reduction of Information-based Infrastructure Systems Workshop - Middleware Improved Technology for Interdependent Critical Infrastructures.
SIM5102 Software Evaluation
Best Practices – Overview
Lecture 11 Reliability and Security in IT infrastructure.
Computer Security: Principles and Practice
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Software Process and Product Metrics
Software Testing Prasad G.
Maintaining and Updating Windows Server 2008
Project Risk Management Risk Mitigation. Risk Management  The prime objective of risk management is to minimize the impact and probability of the occurrence.
Session 3 – Information Security Policies
NERC Lessons Learned Summary
Website Hardening HUIT IT Security | Sep
Automatic Software Testing Tool for Computer Networks ARD Presentation Adi Shachar Yaniv Cohen Dudi Patimer
Motivation. Part of Deutsche Telekom project:
MIT Requirements for TLC IRRIIS MIT Conference ROME 8 February 2007 Giustino FUMAGALLI Arnaud ANSIAUX.
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
SEC835 Database and Web application security Information Security Architecture.
Virtual Mechanics Fall Semester 2009
Supporting Resilence in Air Traffic Management A. Tedeschi, M. Felici, V. Meduri, C. Riccucci SERENE 2008 November 17-19, 2008, Newcastle upon Tyne, UK.
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 9 Introduction to Design.
Global test beds for control, safety, security and dependability in ICT-Enabled Critical Infrastructures From SAFEGUARD Intrusion Detection Test Environment.
Project Tracking. Questions... Why should we track a project that is underway? What aspects of a project need tracking?
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Centro de Estudos e Sistemas Avançados do Recife PMBOK - Chapter 4 Project Integration Management.
S. Bologna, C. Balducelli, A. Di Pietro, L. Lavalle, G. Vicoli ENERSIS 2008 Milano, 17 Giugno, 2008 Una strategia per.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Microsoft Security Development Lifecycle
A Review by Raghu Rangan WPI CS525 September 19, 2012 An Early Warning System Based on Reputation for Energy Control Systems.
Event Management & ITIL V3
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Introduction to IRRIIS MIT Add-On Components IRRIIS, CRUTIAL & GRID Review Meeting 15 March 2007, Brussels Sandro Bologna.
ISM 5316 Week 3 Learning Objectives You should be able to: u Define and list issues and steps in Project Integration u List and describe the components.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
IRRIIS-FP6-2005–IST-4 IRRIIS Project Overview 3rd Public IRRIIS Workshop September 6, 2007, Bonn, Hotel Königshof Erich Rome, FhG-IAIS.
Appendix C: Designing an Operations Framework to Manage Security.
Client: The Boeing Company Contact: Mr. Nick Multari Adviser: Dr. Thomas Daniels Group 6 Steven BromleyJacob Gionet Jon McKeeBrandon Reher.
Chapter 5: Implementing Intrusion Prevention
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
“Systematic Experimentation and Demonstration activities” IRRIIS AB Meeting Ottobrunn, 20th May 2008 Sandro Bologna ENEA.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Self-healing Architectures based on context DEpendent adaptive Software Agents (SADESA) – an extension of EU-IST Project SAFEGUARD DeSIRE Workshop Pisa,
Stages in the Guest Cycle
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
Introduction to the IRRIIS Simulation SimCIP Césaire Beyel.
Tbox is a monitoring solution for all your computer systems Unifies and simplifies management of system surveillance Notifies you in the event of.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
The Vision of Autonomic Computing Self-Management Unit 7-2 Managing the Digital Enterprise Kephart, and Chess.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Report Performance Monitor & Control Risk Administer Procurement MONITORING & CONTROLLING PROCESS.
Introduction to ITSM processes. CONFIDENTIAL Agenda Problem Management  Overview  High Level process Change Management  Overview  High Level process.
Simulation Experiments: Emerging Instruments for CIP Dresden 5 th of October 2007 Walter Schmitz.
A Validation System for the Complex Event Processing Directives of the ATLAS Shifter Assistant Tool G. Anders (CERN), G. Avolio (CERN), A. Kazarov (PNPI),
GRC: Aligning Policy, Risk and Compliance
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security Crisis Management Daryl Goodwin.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Information Systems Security
Software Project Configuration Management
Corrective and Preventive Actions
Project Management Group
Presentation transcript:

Introduction to IRRIIS MIT Add-On Components Middleware Improvement Technology for Interdependent Critical Infrastructure 08 February 2007, Rome Giordano Vicoli

IRRIIS Summary Introduction to MIT Identifying MIT Add-On Components Description of MIT Add-On Components

IRRIIS MIT Introduction MIT is a software system aiming at enhancing the availability, survivability and the resilience of LCCIs by mitigating dependency and interdependency effects. Communication Components. Add-On Components. Other software resources (Databases,GUI, Configuration Files, Run-Time Environment, etc.)

IRRIIS MIT System Add-On Components Communication Components Other resources LCCI MIT System SCADA SYSTEM SCADA SYSTEM LOG Files DataBases LCCI resources

IRRIIS MIT Communication Components A single MIT System doesn’t make sense if it can’t communicate with other MIT Systems installed on other LCCIs. Communication Components are in charge of exchanging data and information with other MIT Systems installed on other LCCIs.They are the same for each LCCI.

IRRIIS MIT Communication Add-On Components Communication Components Other resources LCCI 1 Add-On Components Communication Components Other resources LCCI 2

IRRIIS MIT Communication Add-On Components Communication Components Other resources LCCI 1 Add-On Components Communication Components Other resources LCCI 2 Add-On Components Communication Components Other resources LCCI 3

IRRIIS MIT Add-On Components They can be several. Collect and process internal data and information. They will implement different algorithms according to the LCCI where they are installed and to the data they have to process. Perform analysis and diagnosis useful for the LCCI where they are installed. Process data coming from other LCCI in order to allow the operator preventing potential cascading effects.

IRRIIS Identifying Add-On Components Possible incidents Classes of functions Add-On Components Requirements Goal

IRRIIS Identifying Add-On Components The goal of each LCCI:maintain proper state and deliver the expected services in all circumstances. Probable causes of severe incidents are: – extraordinary natural conditions (floods, eartquake,..) – human errors – malicious attacks

IRRIIS Identifying Add-On Components Incidents Extraordinary natural conditions: – Against this type of events the keyword is cooperation. – Mutual support between LCCIs is always needed. – Add-On Components should support consultation and coordinate actions between neighbouring systems for the establishment of effective mitigation measures, as well as early warning notification of coming threat.

IRRIIS Identifying Add-On Components Incidents Human errors – Simple situation: Add-On Components should provide automatic reaction. – Complex situation: Add-On Components should support the operator for emergency handling. Malicious attacks – They include cyber attacks and malicious operation. – Add-On Components should improve security by preventing or at least detecting them as early as possible.

IRRIIS Identifying Add-On Components Requirements DETECT AS EARLY AS POSSIBLE the anomalous status and NOTIFY it to the dependent infrastructures. PROVIDE EARLY WARNING of deteriorating system conditions so operators can take corrective actions. Prevent incident to AVOID cascading effects on dependent infrastructures.

IRRIIS Identifying Add-On Components Requirements ESTIMATE the probability of disrupt of his own LCCI and NOTIFY to the dependent infrastructures. ASSESS THE own infrastructure RISK due to information about neighbouring status. HANDLE THE EMERGENCY if needed by negotiating coordinate actions

IRRIIS Identifying Add-On Components Classes of functions Previous requirements allows to identify the following Classes of Functions: – Internal assessment. – Risk assessment. – Emergency management.

IRRIIS Identifying Add-On Components Classes of functions Internal assessment (situation awareness about home LCCI) – to provide early warning of deteriorating system conditions and enable the operator to take corrective actions and to prevent an incident. – to help the operator to be more aware about the internal status of the system.

IRRIIS Identifying Add-On Components Classes of functions Risk assessment (situation awareness about home LCCI and neighbouring LCCIs) – to correlate the internal status of the LCCI with the status of neighbouring LCCIs. – to estimate the probability of occurrence of undesirable event based on both internal and neighbouring status.

IRRIIS Identifying Add-On Components Classes of functions Emergenecy management (computer supported systems to manage the emergencies) – to support the operator during an emergency. – to support the local LCCI operator in the negotiation process with operators of the neighbouring LCCIs during an emergency.

IRRIIS

Add-On Components Internal Assessment – Tool to extract LCCI functional status Risk Assessment – Risk Estimator – Data Miner from Incident DataBase Emergency Management – Assessment of cascading/escalating effects – Display of Emergency Management Procedures – Negotiator

IRRIIS Add-On Components Internal Assessment – Tool to extract LCCI functional status A tool able to interface with existing tools and merge their output in order to have a clear and complete picture taking into account various functional status. This Add-On Component is mandatory to provide information to dependent LCCIs. This Add-On Components should interface with SCADA Systems and other LCCI components.

IRRIIS Add-On Components Risk Assessment – Risk Estimator This Add-On Components will estimate immediate risk and potential cascading effects taking into account real time info on internal assessment, other LCCI status and other information. – Data Miner from Incident DataBase This Add-On Components could be useful to exploit stored experience and identify if current situation has some similarity with one of precondition which led to a disrupt of operation in the past.

IRRIIS Add-On Components Emergency Management – Assessment of cascading/escalating effects This Add-On Component should show the direct and indirect effects of actions and evaluate cascading or escalating effects in own and dependent LCCI. – Display of Emergency Management Procedures This Add-On Component should identify if on-going contingency has any match in the preconditions of any procedure and then prompt the relevant procedure. If no match is found this tool should work out emergency management plans by intelligent adaption of existing procedures from all the available sources.

IRRIIS Add-On Components Emergency Management – Negotiator This Add-On Components should agree or negotiate contingency plans with dependent LCCIs. It also could be used to verify some assumptions about neighbouring LCCI status.

IRRIIS Information Publisher (FhG-IAIS) Information Subscriber & Reader (FhG-IAIS) Information Filtering (VTT) Tool to extract LCCI functional status (ENST) SCADADSASSA MIT GUI Operator LCCI 1LCCI 2 LCCI 3 Risk estimator (ENEA) Data Mining from incident DB (ENEA) Display of Emergency Management Procedures (IABG-SIEMENS-AIA) Assessment of cascading or escalating effects (IABG-SIEMENS-AIA) Negotiator (IABG-SIEMENS-AIA) LCCI 4 Subscription Get Data

IRRIIS Information publisher Information subscriber&reader Negotiator Risk assessment Information filtering Internal assessment Emergency Management Subscription Get Data Ask for action Get request feedback Information publisher Information subscriber&reader Negotiator Risk assessment Information filtering Internal assessment Emergency Management Subscription Get Data Ask for action Get action feedback subscribe publish subscribe publish Process action request Provide action feedback Process action request LCCI 1 LCCI 2