SlideShare a Scribd company logo
1 of 13
Download to read offline
The not so smart grid
  “A new edit Master subtitle style
  Click to vector for the physical manifestation of cyber threats”
Nicht ger fingerpoken!
•   Electricity networks are highly regulated
    and standardized , as simple errors or
    omissions could result in catastrophic
    failure of equipment or loss of life.
•   Devices and appliances that are attached
    to these networks are built to specified
    standards, tolerances, limits, overrides
    and failsafes
Separated = safe
•   Previously an esoteric error detected in a
    controller on these closed networks unless it
    presented an immediate operational threat
    did not require amelioration i.e it was not a
    threat.
•   This is because the control system was not
    entropic, did not have uncontrolled
    connections and was performing within
    acceptable limits and consequently there was
    no likelihood of the operating conditions
    changing.
Not all business drivers are a good idea
•   SCADA networks already have had sustained
    cyber attacks with devastating consequences
•   attacks have had to have crossed certain
    security barriers presented by the
    infrastructure provider in the form of firewalls,
    IDS and other network countermeasures
•   In a smart metered reality the meters are the
    infrastructure and these provide routes to and
    from the operational cores of the infrastructure
    provider
Grid + p0wn = darkness
•   The smart meters potentially add a series of
    compounding extreme risks into power
    networks that up until now have largely been
    unaffected by network effects such as DDoS
    and flash worms
•   We have an Internet that largely is now a
    hostile place in which to operate. Viruses,
    worms and malicious codes are part of the
    landscape and are often spread via network
    means to infect more victims.
Same stuff different shovel
•   Defective network stacks embedded in devices and
    operating systems have been a long known and
    utilized avenue for exploit and vulnerability.
•   Many of these smart meters are designed as low
    power devices and as such do not have significant
    computational power.
•   Firmwares of many of these devices do not have the
    capacity to perform CRC or standard integrity checks
    on the firmware upgrade being sent to the device.
    This exploit has been proven in concept on one of
    the processor platforms used in smart meters
    (Goodspeed 2007)
Dumb and dumber
•   Malfeasant firmwares could be the installation of
    firmware that falsely reports a lower rate of energy
    supply from the company or the converse of this
    for someone supplying power back into the grid
•   Many of the current range of smart enabled
    meters and devices rely on wireless based
    protocol such as Zigbee of 802.15.4. Designers
    seem to constantly forget that any wireless signal
    can be brute forced into a denial of service by the
    use of a stronger signal base in the same
    frequency band it is basic physics.
Why?reless
•   (Ocenasek 2009) the author identifies
    security issues with Zigbee and breaks
    them into three topical areas management
    problems, insufficient integrity protection
    and key management problems.
•   Many of these problems are inherent or
    similar to ones in WiFi or 802.11b it will not
    take many experienced attackers to rapidly
    assimilate knowledge and produce tools
    capable of breaking many of these identified
    issues.
Remedy?
•   Remedy is not simple but it is also not impossible
    to achieve a reasonable level of assurance and
    safety within the network even by adding these
    particular devices.
•   This not only means conventional systems testing
    but also extensive testing for deployment in a
    situation where it may come under sustained
    network attack.
•   It is apparent that at least some of the existing
    systems and chips themselves are vulnerable to
    exploit or attack. So this has major impacts on
    how these chips should be used and the circuits
    and boards into which they are designed.
Less rhetoric more rationality
•   Currently there is some hyperbole in some
    of the discourse on both sides of the
    argument.
•   One of the problems is that unlike many of
    the issues faced by the Internet at present it
    does not largely touch or control large parts
    of the infrastructures we need to sustain our
    modern society.
•
    What parts are touching have been proven
    to be significant cause for concern in
    particular SCADA.
Conclusion
•   If I analogise for a moment if smart meters were
    drugs and these drugs had a known potential flaw
    that killed people effectively in large numbers when
    they came into contact with salt water would we
    allow its production let alone sale?
•   Yet currently smart meters/grid (drugs) have known
    potential flaw that can kill large numbers of them
    when they become connected to a network (water)
    that contains malware (salt).
A demo
•   Simulation of 22,000 node smart-meter
    worm propagation using GPS points
    gathered from geo-coded home addresses
    purchased from a bulk mailing list. The
    simulation takes into account radio range
The Not So Smart Grid

More Related Content

What's hot

Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids Jishnu Pradeep
 
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber AttackReassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber AttackDragos, Inc.
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksDuncan Purves
 
The simplification of the campus network Juniper - Networkshop44
The simplification of the campus network Juniper - Networkshop44The simplification of the campus network Juniper - Networkshop44
The simplification of the campus network Juniper - Networkshop44Jisc
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustryDragos, Inc.
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture Vrince Vimal
 
Sensor Based Network
Sensor Based NetworkSensor Based Network
Sensor Based NetworkSaqib Naveed
 
First introduction to wireless sensor networks
First introduction to wireless sensor networksFirst introduction to wireless sensor networks
First introduction to wireless sensor networksPlusOrMinusZero
 
Consequence Informed Cyber Security
Consequence Informed Cyber Security Consequence Informed Cyber Security
Consequence Informed Cyber Security Dragos, Inc.
 
wireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifiwireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifisunil raj kumar
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor NetworksIRJET Journal
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarIxia
 
Using Tiny OS in Wireless Sensor Network
Using Tiny OS in Wireless Sensor NetworkUsing Tiny OS in Wireless Sensor Network
Using Tiny OS in Wireless Sensor NetworkDeeptiman Mallick
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkShubhamTakkar
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...APNIC
 

What's hot (20)

Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber AttackReassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor Networks
 
The simplification of the campus network Juniper - Networkshop44
The simplification of the campus network Juniper - Networkshop44The simplification of the campus network Juniper - Networkshop44
The simplification of the campus network Juniper - Networkshop44
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
 
Sensor Based Network
Sensor Based NetworkSensor Based Network
Sensor Based Network
 
First introduction to wireless sensor networks
First introduction to wireless sensor networksFirst introduction to wireless sensor networks
First introduction to wireless sensor networks
 
Consequence Informed Cyber Security
Consequence Informed Cyber Security Consequence Informed Cyber Security
Consequence Informed Cyber Security
 
Matrix Table
Matrix TableMatrix Table
Matrix Table
 
Sensor
SensorSensor
Sensor
 
wireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifiwireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifi
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Using Tiny OS in Wireless Sensor Network
Using Tiny OS in Wireless Sensor NetworkUsing Tiny OS in Wireless Sensor Network
Using Tiny OS in Wireless Sensor Network
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
 

Viewers also liked

Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot projectcanaleenergia
 
ISTQB Agile Extension
ISTQB Agile ExtensionISTQB Agile Extension
ISTQB Agile ExtensionDavis Thomas
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011dma1965
 
Transforming, testing and explaining smart grid models
Transforming, testing and explaining smart grid modelsTransforming, testing and explaining smart grid models
Transforming, testing and explaining smart grid modelsSteve Ray
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSOAndy Bochman
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber AttacksVenafi
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with DataSeth Familian
 

Viewers also liked (11)

Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot project
 
61850easy Test Tool 2013
61850easy Test Tool 201361850easy Test Tool 2013
61850easy Test Tool 2013
 
ISTQB Agile Extension
ISTQB Agile ExtensionISTQB Agile Extension
ISTQB Agile Extension
 
Smart grid projects and ciber security in brazil conference
Smart grid projects and ciber security in  brazil conference Smart grid projects and ciber security in  brazil conference
Smart grid projects and ciber security in brazil conference
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
Transforming, testing and explaining smart grid models
Transforming, testing and explaining smart grid modelsTransforming, testing and explaining smart grid models
Transforming, testing and explaining smart grid models
 
Smart Grid for the CSO
Smart Grid for the CSOSmart Grid for the CSO
Smart Grid for the CSO
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 

Similar to The Not So Smart Grid

IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkNathan Wallace, PhD, PE
 
CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2John Rooksby
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksJahan Zeb Xebi
 
Real time visualization of structured things
Real time visualization of structured thingsReal time visualization of structured things
Real time visualization of structured thingsNurul Amin Choudhury
 
DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.Глеб Хохлов
 
Major presentation
Major presentationMajor presentation
Major presentationashishg251
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updatedskumartarget
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system DesignRaman Deep
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar Nnull The Open Security Community
 
Null Feb 13
Null Feb 13Null Feb 13
Null Feb 13Sundar N
 
Ignite 2019
Ignite 2019Ignite 2019
Ignite 2019TI Safe
 

Similar to The Not So Smart Grid (20)

IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2
 
Sem
SemSem
Sem
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networks
 
Real time visualization of structured things
Real time visualization of structured thingsReal time visualization of structured things
Real time visualization of structured things
 
DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.
 
Major presentation
Major presentationMajor presentation
Major presentation
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updated
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system Design
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
 
Null Feb 13
Null Feb 13Null Feb 13
Null Feb 13
 
Ignite 2019
Ignite 2019Ignite 2019
Ignite 2019
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 

More from Engineers Australia

Where to From Here - Oil and Gas in WA
Where to From Here - Oil and Gas in WAWhere to From Here - Oil and Gas in WA
Where to From Here - Oil and Gas in WAEngineers Australia
 
Jacobs Recent changes to transmission line design standards and the impact on...
Jacobs Recent changes to transmission line design standards and the impact on...Jacobs Recent changes to transmission line design standards and the impact on...
Jacobs Recent changes to transmission line design standards and the impact on...Engineers Australia
 
Cyber supply chain risk management ASDE
Cyber supply chain risk management   ASDECyber supply chain risk management   ASDE
Cyber supply chain risk management ASDEEngineers Australia
 
Timber Connections reduced by Geoff Boughton
Timber Connections reduced by Geoff BoughtonTimber Connections reduced by Geoff Boughton
Timber Connections reduced by Geoff BoughtonEngineers Australia
 
Connecting to the future: how transport will shape the City of Fremantle
Connecting to the future: how transport will shape the City of FremantleConnecting to the future: how transport will shape the City of Fremantle
Connecting to the future: how transport will shape the City of FremantleEngineers Australia
 
Green schemes 2012_npe_eo_y lecture perth v9
Green schemes 2012_npe_eo_y lecture perth v9Green schemes 2012_npe_eo_y lecture perth v9
Green schemes 2012_npe_eo_y lecture perth v9Engineers Australia
 
Revised intensity frequency-duration (ifd) design rainfalls estimates for wa ...
Revised intensity frequency-duration (ifd) design rainfalls estimates for wa ...Revised intensity frequency-duration (ifd) design rainfalls estimates for wa ...
Revised intensity frequency-duration (ifd) design rainfalls estimates for wa ...Engineers Australia
 
Pilbara rfa ea presentation v3.2 1
Pilbara rfa ea presentation v3.2 1Pilbara rfa ea presentation v3.2 1
Pilbara rfa ea presentation v3.2 1Engineers Australia
 
Smart grid - Do they fit into real networks ver 1
Smart grid  - Do they fit into real networks ver 1Smart grid  - Do they fit into real networks ver 1
Smart grid - Do they fit into real networks ver 1Engineers Australia
 
Arc flash August 2012 IE Aust JEEP
Arc flash  August 2012   IE Aust JEEPArc flash  August 2012   IE Aust JEEP
Arc flash August 2012 IE Aust JEEPEngineers Australia
 
121108 MD smart grid and renewable energy integration 1
121108 MD smart grid and renewable energy integration 1121108 MD smart grid and renewable energy integration 1
121108 MD smart grid and renewable energy integration 1Engineers Australia
 
Pavement materials and design in western australia by geoffrey cocks
Pavement materials and design in western australia by geoffrey cocksPavement materials and design in western australia by geoffrey cocks
Pavement materials and design in western australia by geoffrey cocksEngineers Australia
 
Design and Analysis of Floating Production Systems
Design and Analysis of Floating Production Systems Design and Analysis of Floating Production Systems
Design and Analysis of Floating Production Systems Engineers Australia
 
The EPCM of writing tenders: How engineers can successfully build compelling ...
The EPCM of writing tenders: How engineers can successfully build compelling ...The EPCM of writing tenders: How engineers can successfully build compelling ...
The EPCM of writing tenders: How engineers can successfully build compelling ...Engineers Australia
 
Bid write presentation engineers australia & spe 7 feb12-1
Bid write presentation   engineers australia & spe 7 feb12-1Bid write presentation   engineers australia & spe 7 feb12-1
Bid write presentation engineers australia & spe 7 feb12-1Engineers Australia
 
EA / ATSE joint seminar Engineering for Extreme Natural Events
EA / ATSE joint seminar Engineering for Extreme Natural EventsEA / ATSE joint seminar Engineering for Extreme Natural Events
EA / ATSE joint seminar Engineering for Extreme Natural EventsEngineers Australia
 
Freight and public transport planning initiatives conference 24 november 2011
Freight and public transport planning initiatives conference 24 november 2011Freight and public transport planning initiatives conference 24 november 2011
Freight and public transport planning initiatives conference 24 november 2011Engineers Australia
 
How to write a research paper. By Gareth Forbes, Curtin University and Engine...
How to write a research paper. By Gareth Forbes, Curtin University and Engine...How to write a research paper. By Gareth Forbes, Curtin University and Engine...
How to write a research paper. By Gareth Forbes, Curtin University and Engine...Engineers Australia
 
How to write a research paper. By Mark Bush
How to write a research paper. By Mark BushHow to write a research paper. By Mark Bush
How to write a research paper. By Mark BushEngineers Australia
 

More from Engineers Australia (20)

Where to From Here - Oil and Gas in WA
Where to From Here - Oil and Gas in WAWhere to From Here - Oil and Gas in WA
Where to From Here - Oil and Gas in WA
 
Jacobs Recent changes to transmission line design standards and the impact on...
Jacobs Recent changes to transmission line design standards and the impact on...Jacobs Recent changes to transmission line design standards and the impact on...
Jacobs Recent changes to transmission line design standards and the impact on...
 
Cyber supply chain risk management ASDE
Cyber supply chain risk management   ASDECyber supply chain risk management   ASDE
Cyber supply chain risk management ASDE
 
Timber Connections reduced by Geoff Boughton
Timber Connections reduced by Geoff BoughtonTimber Connections reduced by Geoff Boughton
Timber Connections reduced by Geoff Boughton
 
Connecting to the future: how transport will shape the City of Fremantle
Connecting to the future: how transport will shape the City of FremantleConnecting to the future: how transport will shape the City of Fremantle
Connecting to the future: how transport will shape the City of Fremantle
 
Green schemes 2012_npe_eo_y lecture perth v9
Green schemes 2012_npe_eo_y lecture perth v9Green schemes 2012_npe_eo_y lecture perth v9
Green schemes 2012_npe_eo_y lecture perth v9
 
Revised intensity frequency-duration (ifd) design rainfalls estimates for wa ...
Revised intensity frequency-duration (ifd) design rainfalls estimates for wa ...Revised intensity frequency-duration (ifd) design rainfalls estimates for wa ...
Revised intensity frequency-duration (ifd) design rainfalls estimates for wa ...
 
Pilbara rfa ea presentation v3.2 1
Pilbara rfa ea presentation v3.2 1Pilbara rfa ea presentation v3.2 1
Pilbara rfa ea presentation v3.2 1
 
Smart grid - Do they fit into real networks ver 1
Smart grid  - Do they fit into real networks ver 1Smart grid  - Do they fit into real networks ver 1
Smart grid - Do they fit into real networks ver 1
 
Arc flash August 2012 IE Aust JEEP
Arc flash  August 2012   IE Aust JEEPArc flash  August 2012   IE Aust JEEP
Arc flash August 2012 IE Aust JEEP
 
121108 MD smart grid and renewable energy integration 1
121108 MD smart grid and renewable energy integration 1121108 MD smart grid and renewable energy integration 1
121108 MD smart grid and renewable energy integration 1
 
Pavement materials and design in western australia by geoffrey cocks
Pavement materials and design in western australia by geoffrey cocksPavement materials and design in western australia by geoffrey cocks
Pavement materials and design in western australia by geoffrey cocks
 
Design and Analysis of Floating Production Systems
Design and Analysis of Floating Production Systems Design and Analysis of Floating Production Systems
Design and Analysis of Floating Production Systems
 
The EPCM of writing tenders: How engineers can successfully build compelling ...
The EPCM of writing tenders: How engineers can successfully build compelling ...The EPCM of writing tenders: How engineers can successfully build compelling ...
The EPCM of writing tenders: How engineers can successfully build compelling ...
 
Bid write presentation engineers australia & spe 7 feb12-1
Bid write presentation   engineers australia & spe 7 feb12-1Bid write presentation   engineers australia & spe 7 feb12-1
Bid write presentation engineers australia & spe 7 feb12-1
 
111125 IChemE Palmer
111125 IChemE Palmer111125 IChemE Palmer
111125 IChemE Palmer
 
EA / ATSE joint seminar Engineering for Extreme Natural Events
EA / ATSE joint seminar Engineering for Extreme Natural EventsEA / ATSE joint seminar Engineering for Extreme Natural Events
EA / ATSE joint seminar Engineering for Extreme Natural Events
 
Freight and public transport planning initiatives conference 24 november 2011
Freight and public transport planning initiatives conference 24 november 2011Freight and public transport planning initiatives conference 24 november 2011
Freight and public transport planning initiatives conference 24 november 2011
 
How to write a research paper. By Gareth Forbes, Curtin University and Engine...
How to write a research paper. By Gareth Forbes, Curtin University and Engine...How to write a research paper. By Gareth Forbes, Curtin University and Engine...
How to write a research paper. By Gareth Forbes, Curtin University and Engine...
 
How to write a research paper. By Mark Bush
How to write a research paper. By Mark BushHow to write a research paper. By Mark Bush
How to write a research paper. By Mark Bush
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

The Not So Smart Grid

  • 1. The not so smart grid “A new edit Master subtitle style Click to vector for the physical manifestation of cyber threats”
  • 2. Nicht ger fingerpoken! • Electricity networks are highly regulated and standardized , as simple errors or omissions could result in catastrophic failure of equipment or loss of life. • Devices and appliances that are attached to these networks are built to specified standards, tolerances, limits, overrides and failsafes
  • 3. Separated = safe • Previously an esoteric error detected in a controller on these closed networks unless it presented an immediate operational threat did not require amelioration i.e it was not a threat. • This is because the control system was not entropic, did not have uncontrolled connections and was performing within acceptable limits and consequently there was no likelihood of the operating conditions changing.
  • 4. Not all business drivers are a good idea • SCADA networks already have had sustained cyber attacks with devastating consequences • attacks have had to have crossed certain security barriers presented by the infrastructure provider in the form of firewalls, IDS and other network countermeasures • In a smart metered reality the meters are the infrastructure and these provide routes to and from the operational cores of the infrastructure provider
  • 5. Grid + p0wn = darkness • The smart meters potentially add a series of compounding extreme risks into power networks that up until now have largely been unaffected by network effects such as DDoS and flash worms • We have an Internet that largely is now a hostile place in which to operate. Viruses, worms and malicious codes are part of the landscape and are often spread via network means to infect more victims.
  • 6. Same stuff different shovel • Defective network stacks embedded in devices and operating systems have been a long known and utilized avenue for exploit and vulnerability. • Many of these smart meters are designed as low power devices and as such do not have significant computational power. • Firmwares of many of these devices do not have the capacity to perform CRC or standard integrity checks on the firmware upgrade being sent to the device. This exploit has been proven in concept on one of the processor platforms used in smart meters (Goodspeed 2007)
  • 7. Dumb and dumber • Malfeasant firmwares could be the installation of firmware that falsely reports a lower rate of energy supply from the company or the converse of this for someone supplying power back into the grid • Many of the current range of smart enabled meters and devices rely on wireless based protocol such as Zigbee of 802.15.4. Designers seem to constantly forget that any wireless signal can be brute forced into a denial of service by the use of a stronger signal base in the same frequency band it is basic physics.
  • 8. Why?reless • (Ocenasek 2009) the author identifies security issues with Zigbee and breaks them into three topical areas management problems, insufficient integrity protection and key management problems. • Many of these problems are inherent or similar to ones in WiFi or 802.11b it will not take many experienced attackers to rapidly assimilate knowledge and produce tools capable of breaking many of these identified issues.
  • 9. Remedy? • Remedy is not simple but it is also not impossible to achieve a reasonable level of assurance and safety within the network even by adding these particular devices. • This not only means conventional systems testing but also extensive testing for deployment in a situation where it may come under sustained network attack. • It is apparent that at least some of the existing systems and chips themselves are vulnerable to exploit or attack. So this has major impacts on how these chips should be used and the circuits and boards into which they are designed.
  • 10. Less rhetoric more rationality • Currently there is some hyperbole in some of the discourse on both sides of the argument. • One of the problems is that unlike many of the issues faced by the Internet at present it does not largely touch or control large parts of the infrastructures we need to sustain our modern society. • What parts are touching have been proven to be significant cause for concern in particular SCADA.
  • 11. Conclusion • If I analogise for a moment if smart meters were drugs and these drugs had a known potential flaw that killed people effectively in large numbers when they came into contact with salt water would we allow its production let alone sale? • Yet currently smart meters/grid (drugs) have known potential flaw that can kill large numbers of them when they become connected to a network (water) that contains malware (salt).
  • 12. A demo • Simulation of 22,000 node smart-meter worm propagation using GPS points gathered from geo-coded home addresses purchased from a bulk mailing list. The simulation takes into account radio range