Your SlideShare is downloading. ×
ICS Cyber Security Presentation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

ICS Cyber Security Presentation

506
views

Published on

Sign up for training discounts: http://bit.ly/1f97ztX …

Sign up for training discounts: http://bit.ly/1f97ztX
Follow us on Twitter: http://bit.ly/1fki6EQ
Register for LIVE Hangouts: http://bit.ly/1lJ2z1j
Blog: http://bit.ly/1mSfHlp

1. What are Industrial Control Systems (ICS), where are they used, what were they originally designed to do
2. How are they being used now – connections to the Internet and remote connectivity
3. How is securing ICSs different than securing IT

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
506
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. ICS Cyber Security February 6, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 joe.weiss@realtimeacs.com Applied Control Solutions Proprietary Information
  • 2. What are Industrial Control Systems (ICSs) • Industrial control systems (ICSs) operate power, water, chemicals, pipelines, military systems, medical systems, etc • ICSs include SCADA/EMS, DCS, PLCs, RTUs, IEDs, smart sensors and drives, emissions controls, equipment diagnostics, AMI (Smart Grid), programmable thermostats, building controls,… • Focus is reliability and safety Applied Control Solutions Proprietary Information
  • 3. Control Systems Basics Internet ERP MES Data Ware house Support Systems Internet Applied Control Solutions Proprietary Information
  • 4. ICSs are not Mainstream Information Systems • • • • • • • The Internet and Microsoft are not necessarily the biggest ICS cyber threats External malicious threats are not necessarily the biggest concerns Firewalls and VPNs may not be adequate IDS will probably not identify ICS attacks Field devices have been hacked Default passwords and backdoors are not uncommon Many ICSs have hardware configurations that are cyber vulnerable and cannot be patched or fixed • Patching is difficult and can have unintended consequences • Cyber forensics and logging may not exist Applied Control Solutions Proprietary Information
  • 5. Selected Differences Between IT and ICS Attribute IT ICS Confidentiality (Privacy) High Low Message Integrity Low-Medium Very High Availability Medium Very High Authentication Medium-High High Lifetime 3-5 years 10-25 years Cyber Logging and Forensics Available SEIM only at the IP layer Operating Systems COTS (Windows, Linux,…) COTS at HMI, RTOS at field devices Patching Standard and expeditious Non-standard and potentially long time Applied Control Solutions Proprietary Information
  • 6. ICS Security Expertise Lacking ICS Security Experts IT Security ICS Engineering Applied Control Solutions Proprietary Information
  • 7. ICS Cyber Threats are Real • >325 actual ICS cyber incidents to date – Ranged from significant discharges to significant equipment damage to deaths • Very few ICS-specific cyber security technologies, training, and policies • >1,000,000 ICS devices directly connected to the Internet (and counting) Applied Control Solutions Proprietary Information