Cyber Security Training
Cyber Security Training
Cyber Security Training
Cyber Security
Why do we need cyber-security?
To protect against incidents
Incidents may be deliberate (Attack) or accidental
(Negligence)
Impact could be minor
Lose some functionality
Lose some data
- -P2
Complete shut-down
Loss of supply
Injuries / Damage to equipment
Loss of life
Cyber Security
Why do we need cyber-security?
Accidental Incidents
Untrained personnel have access to critical areas
Trained personnel have access to the wrong
critical areas
Deliberate attacks
Attempt to compromise the behaviour of the
system
Try to cause failure or try to discover information
- -P3
Cyber Security
Why do we need cyber-security?
Why do attacks work?
They capitalise on key weaknesses
Vulnerability Exploitation
Unused services still enabled
known vulnerabilities in standard components
No embedded security
Lack of awareness
Cyber Security
Why do we need cyber-security NOW?
Security by Isolation.
Control networks were cutoff from outside world
Control networks interconnect with other systems
Control network Management system
Management system Corporate network
Corporate network Internet
Security by Obscurity
Proprietary protocols known only to manufacturer
Now giving way to open standards
DNP3, IEC60870-5-103 & IEC60870-5-104, IEC61850
- -P5
Cyber Security
Who are the attackers?
Criminals
Money (Extortion)
Terrorists
Disruption
Hackers
Challenge
Employees
Coerced, Disgruntled
Former Employees
Revenge
Contract and 3rd Party Staff
All of the above
- -P6
Cyber Security
Areas of Concern
Critical Infrastructure
Power Grid, Financial Systems, Air Traffic Control,
Road/Rail Transport, Nuclear Facilities etc.
Smart Grid
Massive Impact
June 2011 - Tom Fanning, CEO of Southern Company (US
Utility)
"cyber security issues must be resolved before a so-called
smart electricity grid can be fully built
"Southern Co. hires hackers to identify vulnerabilities"
"the power company gets attacked frequently."
- -P7
Cyber Security
What is Cyber-Security?
Cyber-security is achieved through many
approaches.
Access
Authentication
Authorisation
Confidentiality
Integrity
Audit
Detection & Response
Awareness
- -P8
Cyber Security
What is Cyber-Security?
Access.
Limit and control the means, paths, protocols and
ports by which someone (or something) can
access the system or relay.
Firewalls, limits traffic type and TCP/UDP ports
Gateways, filter out undesired traffic
Routers, isolate sections of network
Disabling of unused ports and services
- -P9
Cyber Security
What is Cyber-Security?
Authentication.
Perform checks on someone (or something)
attempting to use the system or relay to ensure
that they are allowed to use it.
Cyber Security
What is Cyber-Security?
Authorisation.
Ensure that any authenticated user only has authority
(Permission) to perform certain actions.
Each authenticated user has a Role
Commissioning, Administrator, User
- - P 11
Cyber Security
What is Cyber-Security?
Confidentiality.
Ensure that any critical information is kept secret.
Protect against eavesdropping
Cryptography
Encrypt data in communication streams (Data in
Transit)
Encrypt data held in files (Data at Rest)
Encryption creates its own problems
Speed
Key management
- - P 12
Cyber Security
What is Cyber-Security?
Integrity.
Ensure that any information received from a user
or a remote entity hasnt been tampered with.
Encryption could be used to provide anti-tamper
protection
CRC/Checksums are simpler and easier
- - P 13
Cyber Security
What is Cyber-Security?
Audit.
Logging of all changes, user accesses,
uploads/downloads, operations and control
actions.
Logs to be kept in non-volatile memory,
confidentially and integrity ensured.
Logs used in any audit of an incident
Identify what was done
Identify who did it
Identify when it was done
- - P 14
Cyber Security
What is Cyber-Security?
Detection.
Logging of log-on attempts, whether successful
or not.
Monitoring of communication traffic to detect
abnormal conditions
Monitoring of ports to detect undesired traffic
Screening of data to detect malware
Response
Block user account
Generate events and alarms
Remove or quarantine malware
- - P 15
Cyber Security
What is Cyber-Security?
Awareness.
Understanding the risks and consequences
Staff training
Effective Policies that are followed
Employees should not open attachments in emails from
unknown sources.
Maintaining up-to-date anti-virus software on PCs
Carelessness about passwords
Vigilance
- - P 16
Cyber Security
What standards are available?
NERC (North American Electric Reliability Corporation)
Critical Infrastructure Protection (CIP) Standards
intended to ensure the protection of the Critical
Cyber Assets that control or effect the reliability of
North Americas bulk electric systems.
- - P 17
Cyber Security
What standards are available?
NERC CIP Standards
Eight Standards
- - P 18
Cyber Security
What standards are available?
IEEE 1686
Directly addresses relays and substations
Provides practical and realistic measures for
securing IEDs
8 character passwords
Levels of access
Logging of changes (for later audit)
- - P 19
Cyber Security
What standards are available?
IEC 62351
Recommends security measures for
communications
IEC61850
IEC60870-5
DNP3
- - P 20
Cyber Security
What standards are available?
IEC 62443
Industrial communication networks - Network and system
security
Part 2-1: Establishing an industrial automation and control
system security program
Part 2-2: Operating a
manufacturing and control systems security program
Part 2-4: Certification of Industrial Security (In Preparation)
- - P 21
Cyber Security
What standards are available?
Other standards and advice
ISA (Instrument Society of America )
- - P 22
Cyber Security
Alstom Px40 Implemenation
Phase 1 (complete)
Improved password scheme
Supports upto 8 characters, Alpha (upper & lower case),
numeric and specials.
Password required to read from relay (read-only level)
Below read-only is a limited read level
Password Blocking
Password Encryption
- - P 24
TCP/IP TLS
RBAC
Security Server
Consistent security across all products
Cyber Security
Issues with Cyber-Security
How many devices are there in an average
substation?
How many devices have passwords?
How many substations are there to manage?
How many passwords are there to manage?
Passwords need
Storing
Refreshing
Controlling
- - P 25
Cyber Security
Issues with Cyber-Security
Encryption
Encryption needs keys
How will relays acquire keys?
What will be the remedial action for a key
compromise?
How will interoperability work?
- - P 26
Cyber Security
Some actual attacks
Maroochy Waste Water (Australia)
In 2000 Vitek Boden, a former contractor, used a laptop
computer and a radio transmitter to take control of 150
sewage pumping stations. Over a three-month period, he
released one million liters of untreated sewage into a
stormwater drain from where it flowed to local waterways.
The attack was motivated by revenge on the part of
Mr.Boden after he failed to secure a job with the Maroochy
Shire Council.
Cyber Security
Some actual attacks
StuxNet Worm
In July 2010 a multi-attack vectored virus was discovered
in Siemens PLC equipment used in nuclear power plants
and other industrial applications.
Virus used 4 separate vulnerabilities to install itself on the PC,
including installing a driver.
On PC it looked for Siemens SIMATIC WinCC/Step 7 controller
software
Used another vulnerability to transfer malware to the Siemens
controller
On controller it changed some specific areas of data.
Virus was transferred on USB sticks
- - P 28
Cyber Security
Current Threats
TDL-4
Virus infecting 4 million computers
Uses sophisticated techniques to maintain itself and
avoid detection/elimination
Peer-to-peer communication, encrypted command-&control,anti-virus built in.
- - P 29
Cyber Security
Myth Busting
Cyber-security is an IT problem
Everyones problem
Cyber Security
Any Questions?
- - P 31