SlideShare a Scribd company logo
1 of 16
Download to read offline
Cybersecurity Threats in Manufacturing
Systems and Robotics
October 14, 2017
Dr. Shawn P. Murray, C|CISO, CISSP, CRISC, C|ND, FITSP-A
ISSA Colorado Springs – Mini-Seminar Series
Cybersecurity Threats in Manufacturing Systems and Robotics
The Boston Consulting Group (BCG), who conducts ongoing research on
the impact of advanced-manufacturing technologies, estimates that
the portion of tasks performed by robots in manufacturing will
increase from 10% to 25% worldwide by 2025.
Robots Taking Over
• Robots used in manufacturing:
– Phones
– Cars
– Computers
– Air plane parts
– Pharmaceuticals
– Electronics
– And so much more……
Robots Taking Over - Advantages
• Robots used in manufacturing:
– Increase in productivity
– Robots = CAPEX
– Humans = OPEX
• Decrease in human labor costs
– Payroll
– Taxes
– Benefits
– Vacation time
– Periodic breaks
Robots Taking Over - Advantages
• Robots used in manufacturing:
– Increase in efficiency
– Precision manufacturing
– Increase in productivity
– Can work in extreme environments
• Hot and cold
• Class 100 ppsi rooms
• Repetitive tasks
– Reduction in insurance costs
– Minimizes safety issues
Iranian Nuclear Program -
2007
• Stuxnet – Advanced Persistence Threat
(APT) sophisticated digital weapon the U.S. and
Israel launched against control systems in Iran in
late 2007 or early 2008
– Purpose was to sabotage centrifuges at a uranium
enrichment plant
– Created to only damage the intended industrial control
system that was targeted
– Set back the Iranian nuclear program which was the
end goal
German Steel Mill - 2014
• Attackers hacked a German steel mill and
modified industrial control systems to manipulate
a blast furnace so that it could not be properly
shut down. This resulted in “massive” damage.
– Gained access through the business network after
launching a spear-phishing attack
– Attackers had extensive knowledge regarding
industry control systems
A TrendLabs Research Paper
• Rogue Robots: Testing
the Limits of an Industrial
Robot’s Security
– By Federico Maggi Trend
Micro Forward-Looking
Threat Research
– Davide Quarta, Marcello
Pogliani,
– Mario Polino,
– Andrea M. Zanchettin,
– and
– Stefano Zanero Politecnico
di Milano
Rogue Robots: Testing the Limits of
an Industrial Robot’s Security
• Broad Attack Surface In all of their forms, robots are ultimately complex cyberphysical
systems (CPSs) that include multiple mechanical actuators, controllers, sensors, and
human interaction devices.
• In this context, the growing integration of computerized monitoring of physical
production processes leads to robots that are interconnected with other robots and
external services.
• In the Industry 4.0 vision, an enterprise management system can track and
automatically place an order to suppliers any part needed to complete a scheduled
production as well as reconfigure robotized production lines and receive updates on
their operational status.
• Nowadays, industrial robots are connected to computer networks primarily for
programming and maintenance purposes, but we can already see some emphasis on
richer and complex programming to integrate robots with the factory IT ecosystem.
– For example, ABB exposes a so-called Robot Web Service, which allows
external software or devices to “speak” with the robot controller by means of
HTTP requests.
– Easy-to-use application programming interfaces (APIs) allow robots to be
controlled via smartphones.
– In fact, robot app stores are becoming increasingly available for both consumer
and industrial robots.
German Steel Mill - 2014
Industry Groups Working
Issues
• Some industry groups are attempting to
generate guidelines for certifying the security
of IoT products but are not necessarily
focused on robots or manufacturing systems.
– IoT Security Foundation and the
– Open Connectivity Foundation.
• The problem is twofold.
1. There are no security standards for developing
anything that connects to the Internet
2. There is no regulatory authority that governs the
Internet
Prevention
• Many manufacturing systems can avoid or minimize
the risks altogether by implementing some basic (and
common) best practices:
– Unless you need to, do not connect anything to the
internet
– Separate or segment the production network from the
business network.
– Ensure the code written for the manufacturing systems is
developed securely and scanned for vulnerabilities.
– Set up a security architecture like you would on the
business network.
• IDS/IPS
• Firewall
• Antivirus
Prevention
– Have a sound process for change and configuration
management
– Develop the systems with security “baked in”
– Conduct assessments to test the networks and systems
resiliency
• Vulnerability assessments
• Penetration assessments
• CM audits
– Have logins for all industrial control systems and use strong
identification and authentication procedures
Prevention
– Users should be identified and assigned roles based on
what their job function
• Machine Operator
• Systems Engineer
• Software Developer
• Systems/Network Administrator
• Production Manager
– Physical security considerations
• Lock areas where production computer are stored.
• Restrict the introduction of removable media under CM
– Backup all production system configurations and
software
– Plan, develop and implement an incident response
program specifically for the production systems
Resources/References
• Industrial robots that build cars can be easily hacked (https://www.recode.net/2017/5/3/15521520/industrial-robots-
build-cars-hacked-security)
• IoT Security Foundation (https://www.iotsecurityfoundation.org/join/)
• Die Lage der IT-Sicherheit in Deutschland 2014 (https://www.wired.com/wp-
content/uploads/2015/01/Lagebericht2014.pdf)
• A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever
https://www.wired.com/2015/01/german-steel-mill-hack-destruction/
• Manufacturers prepare to battle rogue robots http://www.csbj.com/2017/09/15/manufacturers-prepare-to-battle-
rogue-robots/
• Can Robots + Humans = The Ideal Workforce in Manufacturing? http://cerasis.com/2015/07/27/robots-and-
humans/
Robotics: Taking Over or Complimenting Manufacturing? - Posted on May 4, 2015 at 9:50
AMhttp://www.nola.com/careeradvice/2015/05/robotics_taking_over_or_compli.html
• A Chip Is Born: Inside a State-of-the-Art Clean Room - AUTHOR: JON SNYDER.JON SNYDER GEAR October
19, 2010 https://www.wired.com/2010/10/inside-a-state-of-the-art-cleanroom/
• Rogue Robots: Testing the Limits of an Industrial Robot’s Security
https://documents.trendmicro.com/assets/wp/wp-industrial-robot-security.pdf

More Related Content

What's hot

Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327vimal Kumar Gupta
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist PriyaNemade
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...
Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...
Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...Anas Lahrichi
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
Rational application-security-071411
Rational application-security-071411Rational application-security-071411
Rational application-security-071411Scott Althouse
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
Best of Positive Research 2013
Best of Positive Research 2013Best of Positive Research 2013
Best of Positive Research 2013qqlan
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?IBM Security
 
Risk management i
Risk management iRisk management i
Risk management iDhani Ahmad
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...IRJET Journal
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Denim Group
 

What's hot (20)

Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
 
GE iFIX
GE iFIXGE iFIX
GE iFIX
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...
Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...
Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
Rational application-security-071411
Rational application-security-071411Rational application-security-071411
Rational application-security-071411
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Best of Positive Research 2013
Best of Positive Research 2013Best of Positive Research 2013
Best of Positive Research 2013
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
 
Risk management i
Risk management iRisk management i
Risk management i
 
ECI Cyber Case Study EUW2017
ECI Cyber Case Study EUW2017ECI Cyber Case Study EUW2017
ECI Cyber Case Study EUW2017
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...
 
Industrial networks safety & security - e+h june 2018 ben murphy
Industrial networks safety & security - e+h june 2018   ben murphyIndustrial networks safety & security - e+h june 2018   ben murphy
Industrial networks safety & security - e+h june 2018 ben murphy
 

Similar to Cybersecurity threats in manufacturing and robotics

Cyber physical systems and robotics
Cyber physical systems and roboticsCyber physical systems and robotics
Cyber physical systems and roboticstrinhanhtuan247
 
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityReports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityA. V. Rajabahadur
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up ICS
 
Internet of Things Case Study
Internet of Things Case StudyInternet of Things Case Study
Internet of Things Case StudyABHISHEK LABH
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0Osama Shahumi
 
meet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
meet2016: Reshaping Business Through IoT: Key Technology Factors to Considermeet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
meet2016: Reshaping Business Through IoT: Key Technology Factors to ConsiderRoberto Siagri
 
Reshaping Business Through IoT: Key Technology Factors to Consider
Reshaping Business Through IoT: Key Technology Factors to ConsiderReshaping Business Through IoT: Key Technology Factors to Consider
Reshaping Business Through IoT: Key Technology Factors to ConsiderEurotech
 
It 443 lecture 1
It 443 lecture 1It 443 lecture 1
It 443 lecture 1elisha25
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSource Code Control Limited
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Digital Twin Technology: Function, Significance, and Benefits
Digital Twin Technology: Function, Significance, and BenefitsDigital Twin Technology: Function, Significance, and Benefits
Digital Twin Technology: Function, Significance, and Benefitsemilybrown8019
 
Cobot fleet management system using cloud and edge computing bukhary
Cobot fleet management system using cloud and edge computing bukharyCobot fleet management system using cloud and edge computing bukhary
Cobot fleet management system using cloud and edge computing bukharyConference Papers
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
IBM elm alm overview-software engineerin-lifecycle-management
IBM elm alm overview-software engineerin-lifecycle-managementIBM elm alm overview-software engineerin-lifecycle-management
IBM elm alm overview-software engineerin-lifecycle-managementImran Hashmi
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart ManufacturingCSA Group
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...Schneider Electric
 
Industrial Internet of Things in a Box
Industrial Internet of Things in a BoxIndustrial Internet of Things in a Box
Industrial Internet of Things in a BoxEurotech
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 

Similar to Cybersecurity threats in manufacturing and robotics (20)

Cyber physical systems and robotics
Cyber physical systems and roboticsCyber physical systems and robotics
Cyber physical systems and robotics
 
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityReports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber Security
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up
 
Internet of Things Case Study
Internet of Things Case StudyInternet of Things Case Study
Internet of Things Case Study
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Embedded System.pdf
Embedded System.pdfEmbedded System.pdf
Embedded System.pdf
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
meet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
meet2016: Reshaping Business Through IoT: Key Technology Factors to Considermeet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
meet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
 
Reshaping Business Through IoT: Key Technology Factors to Consider
Reshaping Business Through IoT: Key Technology Factors to ConsiderReshaping Business Through IoT: Key Technology Factors to Consider
Reshaping Business Through IoT: Key Technology Factors to Consider
 
It 443 lecture 1
It 443 lecture 1It 443 lecture 1
It 443 lecture 1
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Digital Twin Technology: Function, Significance, and Benefits
Digital Twin Technology: Function, Significance, and BenefitsDigital Twin Technology: Function, Significance, and Benefits
Digital Twin Technology: Function, Significance, and Benefits
 
Cobot fleet management system using cloud and edge computing bukhary
Cobot fleet management system using cloud and edge computing bukharyCobot fleet management system using cloud and edge computing bukhary
Cobot fleet management system using cloud and edge computing bukhary
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
IBM elm alm overview-software engineerin-lifecycle-management
IBM elm alm overview-software engineerin-lifecycle-managementIBM elm alm overview-software engineerin-lifecycle-management
IBM elm alm overview-software engineerin-lifecycle-management
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
 
Industrial Internet of Things in a Box
Industrial Internet of Things in a BoxIndustrial Internet of Things in a Box
Industrial Internet of Things in a Box
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 

More from Murray Security Services

More from Murray Security Services (15)

Cybersecurity Maturity Model Certification
Cybersecurity Maturity Model CertificationCybersecurity Maturity Model Certification
Cybersecurity Maturity Model Certification
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 
Spectre & Meltdown
Spectre & MeltdownSpectre & Meltdown
Spectre & Meltdown
 
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueGlobal Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
 
Cybersecurity for Small Business
Cybersecurity for Small BusinessCybersecurity for Small Business
Cybersecurity for Small Business
 
Barcode Metadata & Privacy - What is the risk really?
Barcode Metadata & Privacy - What is the risk really?Barcode Metadata & Privacy - What is the risk really?
Barcode Metadata & Privacy - What is the risk really?
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
How to Write Good Policies
How to Write Good PoliciesHow to Write Good Policies
How to Write Good Policies
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 

Cybersecurity threats in manufacturing and robotics

  • 1. Cybersecurity Threats in Manufacturing Systems and Robotics October 14, 2017 Dr. Shawn P. Murray, C|CISO, CISSP, CRISC, C|ND, FITSP-A ISSA Colorado Springs – Mini-Seminar Series
  • 2. Cybersecurity Threats in Manufacturing Systems and Robotics
  • 3. The Boston Consulting Group (BCG), who conducts ongoing research on the impact of advanced-manufacturing technologies, estimates that the portion of tasks performed by robots in manufacturing will increase from 10% to 25% worldwide by 2025.
  • 4. Robots Taking Over • Robots used in manufacturing: – Phones – Cars – Computers – Air plane parts – Pharmaceuticals – Electronics – And so much more……
  • 5. Robots Taking Over - Advantages • Robots used in manufacturing: – Increase in productivity – Robots = CAPEX – Humans = OPEX • Decrease in human labor costs – Payroll – Taxes – Benefits – Vacation time – Periodic breaks
  • 6. Robots Taking Over - Advantages • Robots used in manufacturing: – Increase in efficiency – Precision manufacturing – Increase in productivity – Can work in extreme environments • Hot and cold • Class 100 ppsi rooms • Repetitive tasks – Reduction in insurance costs – Minimizes safety issues
  • 7. Iranian Nuclear Program - 2007 • Stuxnet – Advanced Persistence Threat (APT) sophisticated digital weapon the U.S. and Israel launched against control systems in Iran in late 2007 or early 2008 – Purpose was to sabotage centrifuges at a uranium enrichment plant – Created to only damage the intended industrial control system that was targeted – Set back the Iranian nuclear program which was the end goal
  • 8. German Steel Mill - 2014 • Attackers hacked a German steel mill and modified industrial control systems to manipulate a blast furnace so that it could not be properly shut down. This resulted in “massive” damage. – Gained access through the business network after launching a spear-phishing attack – Attackers had extensive knowledge regarding industry control systems
  • 9. A TrendLabs Research Paper • Rogue Robots: Testing the Limits of an Industrial Robot’s Security – By Federico Maggi Trend Micro Forward-Looking Threat Research – Davide Quarta, Marcello Pogliani, – Mario Polino, – Andrea M. Zanchettin, – and – Stefano Zanero Politecnico di Milano
  • 10. Rogue Robots: Testing the Limits of an Industrial Robot’s Security • Broad Attack Surface In all of their forms, robots are ultimately complex cyberphysical systems (CPSs) that include multiple mechanical actuators, controllers, sensors, and human interaction devices. • In this context, the growing integration of computerized monitoring of physical production processes leads to robots that are interconnected with other robots and external services. • In the Industry 4.0 vision, an enterprise management system can track and automatically place an order to suppliers any part needed to complete a scheduled production as well as reconfigure robotized production lines and receive updates on their operational status. • Nowadays, industrial robots are connected to computer networks primarily for programming and maintenance purposes, but we can already see some emphasis on richer and complex programming to integrate robots with the factory IT ecosystem. – For example, ABB exposes a so-called Robot Web Service, which allows external software or devices to “speak” with the robot controller by means of HTTP requests. – Easy-to-use application programming interfaces (APIs) allow robots to be controlled via smartphones. – In fact, robot app stores are becoming increasingly available for both consumer and industrial robots.
  • 12. Industry Groups Working Issues • Some industry groups are attempting to generate guidelines for certifying the security of IoT products but are not necessarily focused on robots or manufacturing systems. – IoT Security Foundation and the – Open Connectivity Foundation. • The problem is twofold. 1. There are no security standards for developing anything that connects to the Internet 2. There is no regulatory authority that governs the Internet
  • 13. Prevention • Many manufacturing systems can avoid or minimize the risks altogether by implementing some basic (and common) best practices: – Unless you need to, do not connect anything to the internet – Separate or segment the production network from the business network. – Ensure the code written for the manufacturing systems is developed securely and scanned for vulnerabilities. – Set up a security architecture like you would on the business network. • IDS/IPS • Firewall • Antivirus
  • 14. Prevention – Have a sound process for change and configuration management – Develop the systems with security “baked in” – Conduct assessments to test the networks and systems resiliency • Vulnerability assessments • Penetration assessments • CM audits – Have logins for all industrial control systems and use strong identification and authentication procedures
  • 15. Prevention – Users should be identified and assigned roles based on what their job function • Machine Operator • Systems Engineer • Software Developer • Systems/Network Administrator • Production Manager – Physical security considerations • Lock areas where production computer are stored. • Restrict the introduction of removable media under CM – Backup all production system configurations and software – Plan, develop and implement an incident response program specifically for the production systems
  • 16. Resources/References • Industrial robots that build cars can be easily hacked (https://www.recode.net/2017/5/3/15521520/industrial-robots- build-cars-hacked-security) • IoT Security Foundation (https://www.iotsecurityfoundation.org/join/) • Die Lage der IT-Sicherheit in Deutschland 2014 (https://www.wired.com/wp- content/uploads/2015/01/Lagebericht2014.pdf) • A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever https://www.wired.com/2015/01/german-steel-mill-hack-destruction/ • Manufacturers prepare to battle rogue robots http://www.csbj.com/2017/09/15/manufacturers-prepare-to-battle- rogue-robots/ • Can Robots + Humans = The Ideal Workforce in Manufacturing? http://cerasis.com/2015/07/27/robots-and- humans/ Robotics: Taking Over or Complimenting Manufacturing? - Posted on May 4, 2015 at 9:50 AMhttp://www.nola.com/careeradvice/2015/05/robotics_taking_over_or_compli.html • A Chip Is Born: Inside a State-of-the-Art Clean Room - AUTHOR: JON SNYDER.JON SNYDER GEAR October 19, 2010 https://www.wired.com/2010/10/inside-a-state-of-the-art-cleanroom/ • Rogue Robots: Testing the Limits of an Industrial Robot’s Security https://documents.trendmicro.com/assets/wp/wp-industrial-robot-security.pdf