Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) (CS) 2 /HEP Workshop, Kobe (Japan)

Slides:



Advertisements
Similar presentations
Operating-System Structures
Advertisements

Secure and Web Browsing Sébastien Dellabella – Computer Security Team.
4 th Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) 4 th (CS) 2 /HEP Workshop,
How things go wrong. The lucky one and the unlucky one Dr. Stefan Lüders (CERN Computer Security Officer) 3 rd (CS) 2 /HEP Workshop, Grenoble (France)
3 rd Control System Cyber-Security Workshop A Summary of this year’s meeting Dr. Stefan Lüders (CERN Computer Security Officer) with contributions from.
David A. Brown Chief Information Security Officer State of Ohio
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
Welcome to New Hire Orientation Information Security
Free Software Alternatives: Avast! Anti-virus
Control System Cyber-Security in Industry Dr. Stefan Lüders (CERN IT/CO) (CS) 2 /HEP Workshop, Knoxville (U.S.) October 14th 2007.
Submitted by: Abhashree Pradhan CA (1)
A First Course in Information Security
Marine Industry Day 2015 Sector Command Center (24 hours): (504) National Response Center: Website:
G53SEC Computer Security Introduction to G53SEC 1.
CERN’s Computer Security Challenge
Presented by: Dr. Munam Ali Shah
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Control System Cyber-Security Workshop A Summary of Yesterday’s Meeting Dr. Stefan Lüders (CERN IT/CO) with slides from P. Chochula (ALICE), S. Gysin (FNAL),
Introduction Thomson Chan Rosaryhill School
Control Systems Under Attack !? …about the Cyber-Security of modern Control Systems Dr. Stefan Lüders (CERN IT/CO) (CS) 2 /HEP Workshop, Knoxville (U.S.)
The Changing World of Endpoint Protection
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Use of CERN’s Computing Facilities Why is security important? What are the rules? HR Induction Programme.
Cyber Security Awareness Why people are of N o 1 importance… CERN Computer Security Team (2009) L. Cons, S. Lopienski, S. Lüders, D. Myers “Protecting.
HEPiX FNAL ‘02 25 th Oct 2002 Alan Silverman HEPiX Large Cluster SIG Report Alan Silverman 25 th October 2002 HEPiX 2002, FNAL.
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
Problems to Overcome Implementation Issues at CERN Dr. Stefan Lüders (CERN Computer Security Officer) (CS) 2 /HEP Workshop, Kobe (Japan) October 11th 2009.
Cyber Security Awareness Academic Freedom vs. Operations vs. Security CERN Computer Security Team (2010) S. Lopienski, S. Lüders, R. Mollon, R. Wartel.
Control System Cyber-Security Workshop A Summary of Yesterday’s Meeting Dr. Stefan Lüders (CERN Computer Security Officer) with slides from B. Copy (CERN),
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
3 rd Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) 3 rd (CS) 2 /HEP Workshop,
MIS323 – Business Telecommunications Chapter 10 Security.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
CERN Computing and Network Infrastructure for Controls (CNIC) Status Report on the Implementation Dr. Stefan Lüders (CERN IT/CO) (CS) 2 /HEP Workshop,
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Financial Sector Cybersecurity R&D Priorities The Members of the FSSCC R&D Committee November 2014.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Modeling security 1. Models - encryption r Alice and Bob have the same key k r Alice and Bob exchange encrypted messages r Eve wants to get the plaintext.
Cyber Security Awareness Academic Freedom vs. Operations vs. Security CERN Computer Security Team (2010) S. Lopienski, S. Lüders, R. Mollon, R. Wartel.
Windows 10 Tech Support Call On Windows 10 the latest product updates from Microsoft providing a lots of easy facilities to the It professionals.
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
Latest Issues Related To The AVG Antivirus 2017
Quicken is a software that is best known for account management and this software works efficiently in both offline as well as offline mode according.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Information and documentation media systems.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Literacy for a better life center
Control system network security issues and recommendations
Cyber Security Awareness
Dangerous Types Of Malware. What is Malware Malware is a term used to denote the different types of intrusive software that are installed with the intent.
How to Secure Facebook Using Norton. If you are Norton customers and holds a Facebook account, this is how you can secure your account in few simple steps:
Call AVG Antivirus Support | Fix Your PC
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Office 365 Security Assessment Workshop
12 STEPS TO A GDPR AWARE NETWORK
NERC Cyber Security Standard
Cybersecurity Am I concerned?
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
Bethesda Cybersecurity Club
Cybersecurity Threat Assessment
Cybersecurity Simplified: Phishing
Presentation transcript:

Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) (CS) 2 /HEP Workshop, Kobe (Japan) October 11th 2009

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop” — Dr. Stefan Lüders — CS2/HEP Workshop ― October 11 th 2009 About Security… Security is as good as the weakest link: ► Attacker chooses the time, place, method ► Defender needs to protect against all possible attacks (currently known, and those yet to be discovered) Security is a system property (not a feature) Security is a permanent process (not a product) Security is difficult to achieve, and only to 100%-ε ► YOU define ε as user, developer, system expert, admin, project manager BTW: Security is not a synonym for safety

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop” — Dr. Stefan Lüders — CS2/HEP Workshop ― October 11 th 2009 Overview

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop” — Dr. Stefan Lüders — CS2/HEP Workshop ― October 11 th 2009 (R)Evolution of Control Systems standard desktop PCs

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop” — Dr. Stefan Lüders — CS2/HEP Workshop ― October 11 th 2009 Standard Vulnerabilities standard desktop PCs

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop” — Dr. Stefan Lüders — CS2/HEP Workshop ― October 11 th 2009 Why worry ?

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop” — Dr. Stefan Lüders — CS2/HEP Workshop ― October 11 th 2009 Threat or No Threat ?? Cracked road-sign in Texas (2009) U.S. electrical grid in jeopardy (April 2009) Going for real money (August 2009) Malware infected PCs (October 2009) U.S. congress faces this Wind of Change !

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop” — Dr. Stefan Lüders — CS2/HEP Workshop ― October 11 th 2009 LHC First Beam Day Hmm… A defaced web-page at an LHC experiment… A “flame” message to some Greek “competitors”… …on 10/09/2008: Just coincidence ?

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop” — Dr. Stefan Lüders — CS2/HEP Workshop ― October 11 th 2009 Who owns the consequences ? How long does it take you to reinstall your system, if requested right now ? Are you prepared to take full responsibility? Can you allow for loss of ► functionality ► control or safety ► efficiency & beam time ► hardware or data ► reputation…?

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 “CS2/HEP Workshop” — Dr. Stefan Lüders — CS2/HEP Workshop ― October 11 th 2009 Scope: ► All security aspects related with HEP control systems ► Control PCs, control software, controls devices, accounts, … ► Planning aspects, implementation aspects, operational aspects, … Objectives: ► Raise awareness ► Exchange of good practices, ideas, and implementations ► Discuss what works & what not, pros & cons, incidents & successes If there are questions, feel free to ask at anytime!!! The agenda is very flexible to accommodate any changes ! (CS) 2 in HEP ― The Agenda