Presentation is loading. Please wait.

Presentation is loading. Please wait.

SCADA – Are we self- sufficient? Presented by Jack McIntyre 15/05/2015Jack McIntyre2.

Similar presentations


Presentation on theme: "SCADA – Are we self- sufficient? Presented by Jack McIntyre 15/05/2015Jack McIntyre2."— Presentation transcript:

1

2 SCADA – Are we self- sufficient? Presented by Jack McIntyre 15/05/2015Jack McIntyre2

3 SCADA – Are we self-sufficient? What is SCADA? Where is SCADA implemented? Is SCADA secure? How can SCADA be attacked? Has SCADA already been attacked? What can be done to prevent attacks? Is the UK self-sufficient in preventing attacks? 15/05/2015Jack McIntyre3

4 What does it stand for? Supervisory Control And Data Acquisition What does that mean? 15/05/2015Jack McIntyre4

5 Where is SCADA? Waking up Getting ready Going to work Being at work 15/05/2015Jack McIntyre5

6 Where is SCADA? Residential / Commercial Properties National Grid Water & Gas Networks Manufacturing 15/05/2015Jack McIntyre6

7 What is SCADA? Monitors and connects logical processes Physical Devices PLC RTU HMI 15/05/2015Jack McIntyre7

8 SCADA system requirements Windows 2000 Windows XP Windows Vista 300 Mhz processor 128mb RAM 1.5gb storage 800x600 resolution display CD-ROM/DVD drive USB port Ethernet port Not very “State-of-the-art” 15/05/2015Jack McIntyre8 “State-of-the-art”

9 SCADA communications Satellite Telephone Wire Radio Wave Microwave Power-line 15/05/2015Jack McIntyre9

10 SCADA connectivity 15/05/2015Jack McIntyre10

11 Is SCADA protected? Insecure devices Design based around speed, reliability, connectivity Little or no security concerns 15/05/2015Jack McIntyre11

12 How is SCADA protected? Strong perimeter defence IDS IPS Firewalls 15/05/2015Jack McIntyre12

13 How can SCADA be attacked? Denial of Service Man-in-the-middle (MITM) Web Application Weaknesses Vulnerability exploitation Poor configuration 15/05/2015Jack McIntyre13

14 Denial of Service Extremely effective Time critical systems Target enumeration is difficult 15/05/2015Jack McIntyre14

15 Man-in-the-Middle Radio wave interception Power-line modulation detection Satellite interception Expensive and often dangerous 15/05/2015Jack McIntyre15

16 Web application weaknesses SQL Injection XSS Authentication bypass Brute force attacks Rare, relatively easy to protect against 15/05/2015Jack McIntyre16

17 Poor configuration Default passwords Open ports No authentication 15/05/2015Jack McIntyre17

18 Vulnerability exploitation Zero-day threats Specialist equipment needed Requires in-depth engineering knowledge Targeted attacks requiring key intelligence Stuxnet 15/05/2015Jack McIntyre18

19 Stuxnet Targeted Iranian nuclear centrifuges Introduced physically Designed to spread Only targets specific controllers 15/05/2015Jack McIntyre19

20 Stuxnet Manipulated system operation over time Sophisticated Stealthy Wasn’t detected until it was too late 15/05/2015Jack McIntyre20

21 What can be done? New systems New standards Secure by design OR Continue to add perimeter defence 15/05/2015Jack McIntyre21

22 Issues with upgrading equipment Cost Downtime Backwards-compatibility 15/05/2015Jack McIntyre22

23 When will it happen? When a major incident occurs 15/05/2015Jack McIntyre23

24 Are we self-sufficient? The UK Shares One power connection Two gas connections So far we have survived But for how long? 15/05/2015Jack McIntyre24

25 15/05/2015Jack McIntyre25 Questions ? Contact: email@jmcdf.co.uk


Download ppt "SCADA – Are we self- sufficient? Presented by Jack McIntyre 15/05/2015Jack McIntyre2."

Similar presentations


Ads by Google