Control System Cyber-Security Workshop A Summary of Yesterday’s Meeting Dr. Stefan Lüders (CERN Computer Security Officer) with slides from B. Copy (CERN),

Slides:



Advertisements
Similar presentations
Secure and Web Browsing Sébastien Dellabella – Computer Security Team.
Advertisements

4 th Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) 4 th (CS) 2 /HEP Workshop,
How things go wrong. The lucky one and the unlucky one Dr. Stefan Lüders (CERN Computer Security Officer) 3 rd (CS) 2 /HEP Workshop, Grenoble (France)
3 rd Control System Cyber-Security Workshop A Summary of this year’s meeting Dr. Stefan Lüders (CERN Computer Security Officer) with contributions from.
1 MTvScan (Malware, Trojan, Viruses Scanner) Enterprise Class Security Scanner.
Benjamin Johnson Carnegie Mellon University Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information TRUST.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
1 Data Storage MICE DAQ Workshop 10 th February 2006 Malcolm Ellis & Paul Kyberd.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Comp 8130 Presentation Security Testing Group Members: U Hui Chen U Ming Chen U Xiaobin Wang.
L. Taylor 2 March CMS Centres Worldwide See paper (attached to agenda) “How to create a CMS My Institute” which addresses the questions:
Control System Cyber-Security in Industry Dr. Stefan Lüders (CERN IT/CO) (CS) 2 /HEP Workshop, Knoxville (U.S.) October 14th 2007.
HEPiX Orsay 27 th April 2001 Alan Silverman HEPiX Large Cluster SIG Report Alan Silverman 27 th April 2001 HEPiX 2001, Orsay.
October 24, 2000Milestones, Funding of USCMS S&C Matthias Kasemann1 US CMS Software and Computing Milestones and Funding Profiles Matthias Kasemann Fermilab.
G53SEC Computer Security Introduction to G53SEC 1.
Presented by: Dr. Munam Ali Shah
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Requirements Review – July 21, Requirements for CMS Patricia McBride July 21, 2005.
ICALEPCS 2007 Summary Karen S. White Jefferson Lab.
Control System Cyber-Security Workshop A Summary of Yesterday’s Meeting Dr. Stefan Lüders (CERN IT/CO) with slides from P. Chochula (ALICE), S. Gysin (FNAL),
IT Security for the LHCb experiment 3rd Control System Cyber-Security Workshop (CS)2/HEP ICALEPCS – Grenoble Enrico Bonaccorsi, (CERN)
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 3 Slide 1 Critical Systems 1.
Control Systems Under Attack !? …about the Cyber-Security of modern Control Systems Dr. Stefan Lüders (CERN IT/CO) (CS) 2 /HEP Workshop, Knoxville (U.S.)
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
André Augustinus 10 October 2005 ALICE Detector Control Status Report A. Augustinus, P. Chochula, G. De Cataldo, L. Jirdén, S. Popescu the DCS team, ALICE.
 WHAT IS MITIGATION?  DISASTER MANAGEMENT CYCLE.  ORGANISATIONS RESPONSIBLE FOR DISASTER MANAGEMENT AT THE REGIONAL AND NATIONAL LEVEL IN THE CARIBBEAN.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Security (Keep your site secure at extension level) Sergey Gorstka Fastw3b.
Use of CERN’s Computing Facilities Why is security important? What are the rules? HR Induction Programme.
14-Nov-2000EPICS Workshop - Oak Ridge1 PCaPAC Review Matthias Clausen DESY/ MKS-2.
Cyber Security Awareness Why people are of N o 1 importance… CERN Computer Security Team (2009) L. Cons, S. Lopienski, S. Lüders, D. Myers “Protecting.
HEPiX FNAL ‘02 25 th Oct 2002 Alan Silverman HEPiX Large Cluster SIG Report Alan Silverman 25 th October 2002 HEPiX 2002, FNAL.
1 Figure 9-3: Webserver and E-Commerce Security Importance of Webservice and E-Commerce Security  Cost of disruptions  The cost of loss of reputation.
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
Computing and Network Infrastructure for Controls CNIC Context? Why CNIC? What is CNIC? CNIC Phases and Definitions CNIC Status and Manpower Conclusion.
Problems to Overcome Implementation Issues at CERN Dr. Stefan Lüders (CERN Computer Security Officer) (CS) 2 /HEP Workshop, Kobe (Japan) October 11th 2009.
UPDATE ON THE CERN COMPUTING AND NETWORK INFRASTRUCTURE FOR CONTROLS (CNIC) ABSTRACT Over the last few years modern accelerator and experiment control.
Cyber Security Awareness Academic Freedom vs. Operations vs. Security CERN Computer Security Team (2010) S. Lopienski, S. Lüders, R. Mollon, R. Wartel.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
16-Nov-01D.P.Kelsey, HTASC report1 HTASC - Report to HEP-CCC David Kelsey, RAL rl.ac.uk 16 November 2001, CERN ( )
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
St. Hilary School Technology CommitteeThe St. Hilary School Technology Committee is hosting this ‘Boot Camp’ for parishioners and SHS students with the.
IAEA International Atomic Energy Agency TM/WS TOPICAL ISSUES ON INFRASTRUCTURE DEVELOPMENT: MANAGING THE DEVELOPMENT OF NATIONAL INFRASTRUCTURE FOR NUCLEAR.
3 rd Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) 3 rd (CS) 2 /HEP Workshop,
Remote Monitoring for Hardware & Beam Commissioning E. Harms/FNAL 7 April 2005 Port Jefferson, New York bnl - fnal- lbnl - slac US LHC Accelerator Research.
Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) (CS) 2 /HEP Workshop, Kobe (Japan)
CERN Computing and Network Infrastructure for Controls (CNIC) Status Report on the Implementation Dr. Stefan Lüders (CERN IT/CO) (CS) 2 /HEP Workshop,
Dr. Bhavani Thuraisingham Information Security and Risk Management June 5, 2015 Lecture #5 Summary of Chapter 3.
DPS/ CMS RRB-T Core Software for CMS David Stickland for CMS Oct 01, RRB l The Core-Software and Computing was not part of the detector MoU l.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Cyber Security Awareness Academic Freedom vs. Operations vs. Security CERN Computer Security Team (2010) S. Lopienski, S. Lüders, R. Mollon, R. Wartel.
Committee – June 30, News from CERN Erik Gottschalk June 30, 2005.
Impact Windows & Doors
Cybersecurity and Information Assurance
LS2 Safety Preparation Thomas Otto, LS2 Safety Support Officer for LHC
Information and documentation media systems.
Kevin Thaddeus Flood University of Wisconsin
The 15th International Semantic Web Conference Kobe, Japan.
Distributed Collaborations
CERN Windows Roadmap Tim Bell 8th June 2011.
Cyber Security Awareness
Safety in Numbers: Crowds
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
12 STEPS TO A GDPR AWARE NETWORK
Enterprise Class Security Scanner
Presentation transcript:

Control System Cyber-Security Workshop A Summary of Yesterday’s Meeting Dr. Stefan Lüders (CERN Computer Security Officer) with slides from B. Copy (CERN), T. McGuckin (JLab), R. Lee (BNL), R. Petkus (BNL), T. Sugimoto (Spring8), P. Wang (FNAL) ICALEPCS, Kobe (Japan), October 12th 2009

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop Summary” — Dr. Stefan Lüders — ICALEPCS ― October 12 th 2009 About Security… Security is as good as the weakest link: ► Attacker chooses the time, place, method ► Defender needs to protect against all possible attacks (currently known, and those yet to be discovered) Security is a system property (not a feature) Security is a permanent process (not a product) Security is difficult to achieve, and only to 100%-ε ► YOU define ε as user, developer, system expert, admin, project manager BTW: Security is not a synonym for safety

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop Summary” — Dr. Stefan Lüders — ICALEPCS ― October 12 th 2009 (R)Evolution of Control Systems standard desktop PCs

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop Summary” — Dr. Stefan Lüders — ICALEPCS ― October 12 th 2009 Standard Vulnerabilities standard desktop PCs

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop Summary” — Dr. Stefan Lüders — ICALEPCS ― October 12 th 2009 Vulnerabilities are Proven Fact !

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop Summary” — Dr. Stefan Lüders — ICALEPCS ― October 12 th 2009 Attacks are Fact, too !!! Hmm… A defaced web-page at an LHC experiment… A “flame” message to some Greek “competitors”… …on 10/09/2008: Just coincidence ?

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop Summary” — Dr. Stefan Lüders — ICALEPCS ― October 12 th 2009 Who owns the consequences ? How long does it take you to reinstall your system, if requested right now ? Are you prepared to take full responsibility? Can you allow for loss of ► functionality ► control or safety ► efficiency & beam time ► hardware or data ► reputation…?

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop Summary” — Dr. Stefan Lüders — ICALEPCS ― October 12 th 2009 Bottom-up vs. Top-down

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop Summary” — Dr. Stefan Lüders — ICALEPCS ― October 12 th 2009 Defense-in-Depth

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop Summary” — Dr. Stefan Lüders — ICALEPCS ― October 12 th 2009 Strengthen (Remote) Access !

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop Summary” — Dr. Stefan Lüders — ICALEPCS ― October 12 th 2009 Summary

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop Summary” — Dr. Stefan Lüders — ICALEPCS ― October 12 th 2009 Thank You Very Much ! I would like to thank all presenters and participants, making this workshop such a success. ► Special thanks go to the local organization committee for the arrangements !!