SlideShare a Scribd company logo
1 of 14
Download to read offline
Tim Beech – TGN Project Services Ltd / Indu-Sol
OT Cyber Security
2
PROFIBUS& PROFINETInternational(PI)
What Happened To Profibus? – Ford Dunton 16-Feb-2023
Why?
1
IT vs OT - Differences and Approach to Security
2
Threats / Attack Paths
3
Implementing OT Security
4
© 2021
Aims
3
PROFIBUS& PROFINETInternational(PI)
What Happened To Profibus? – Ford Dunton 16-Feb-2023
Why Do We Need Security?
▪ Merge of IT and OT has opened up OT networks to compromise
▪ OT networks / assets have become targets
▪ Protect data & assets from attack
▪ Cost of a Cyber Attack
▪ Financial cost – ransom, downtime & recovery
▪ Data loss
▪ Damage to reputation
▪ Third Quarter of 2022 - £1.6billion in losses
© 2021
4
PROFIBUS& PROFINETInternational(PI)
What Happened To Profibus? – Ford Dunton 16-Feb-2023
Why Do We Need Security?
© 2021
5
PROFIBUS& PROFINETInternational(PI)
What Happened To Profibus? – Ford Dunton 16-Feb-2023
IT vs OT
Information Technology
▪ Data flow and storage focussed
▪ Business Functions (HR, Finance, Email)
▪ Protection of Data is critical
CIA
▪ Confidentiality / Integrity / Availability
Operation Technology
▪ Control focussed
▪ Manufacturing functions & Safety
Systems
▪ Protection of people / process is critical
CAIC
▪ Control / Availability / Integrity /
Confidentiality
© 2021
6
PROFIBUS& PROFINETInternational(PI)
What Happened To Profibus? – Ford Dunton 16-Feb-2023 © 2021
IT vs OT – Network Levels
Level 5 – Clients / Workstations
Level 4 – Servers, Data Storage
Level 3 – ES / Historians / MES
Level 2 – SCADA / HMI
Level 1 – PLC & IO Devices
Level 3.5 / DMZ – Data Servers / DHCP /
Edge Devices
OT
IT
7
PROFIBUS& PROFINETInternational(PI)
What Happened To Profibus? – Ford Dunton 16-Feb-2023
Threats & Attack Paths for OT Networks
Top 10 Threats to OT Networks (According to BSI)
1. Social Engineering & Phishing
2. Malware via removable media / external hardware
3. Human Error & Sabotage
4. Malware via Internet / Intranet
5. Internet connected control components
6. Intrusion via Remote Access
7. Technical Malpractice
8. Compromise of Extranet & Cloud Components
9. (D)DOS Attacks
10. Compromise from personal devices in the production environment
© 2021
8
PROFIBUS& PROFINETInternational(PI)
What Happened To Profibus? – Ford Dunton 16-Feb-2023
Threats & Attack Paths
1. Social Engineering & Phishing
2. Malware via removable media / external hardware
3. Human Error & Sabotage
© 2021
9
PROFIBUS& PROFINETInternational(PI)
What Happened To Profibus? – Ford Dunton 16-Feb-2023
Threats & Attack Paths
4. Malware via Internet / Intranet
5. Internet connected components
6. Intrusion via Remote Access
© 2021
10
PROFIBUS& PROFINETInternational(PI)
What Happened To Profibus? – Ford Dunton 16-Feb-2023
Threats & Attack Paths
7. Technical Malpractice
8. Compromise of Extranet & Cloud Components
9. (D)DoS Attacks
10. Compromise from personal devices in the production environment
© 2021
11
PROFIBUS& PROFINETInternational(PI)
What Happened To Profibus? – Ford Dunton 16-Feb-2023
Protection Concept
© 2021
Security
Awareness
Trusted Zone
Firewalls / DMZ / Remote
Access
Physical Protection
Locking ports / Restrict
MCC Access
Network
Monitoring
Asset Management
and Monitoring
▪ Multilevel approach
▪ Scalable
▪ Fit for purpose
▪ Training
▪ Supported by policies, procedures and
standards
▪ Multi-discipline teams
12
PROFIBUS& PROFINETInternational(PI)
What Happened To Profibus? – Ford Dunton 16-Feb-2023
Implementing OT Security
▪ Security shouldn’t be an after thought!!
▪ Protection Concept
▪ Defence in Depth
▪ Policies, Procedures & Standards
▪ Planning
▪ Threats and risks should be assessed
▪ DMZ between IT and OT
▪ Initial design and consider impact of modifications
▪ Selection of components
▪ Criteria for selection (standards)
© 2021
13
PROFIBUS& PROFINETInternational(PI)
What Happened To Profibus? – Ford Dunton 16-Feb-2023 © 2021
Case Study – Bad Network / No Security
Questions?

More Related Content

Similar to 10. PI_Dunton - OT Security.pdf

SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...Brain IoT Project
 
Integration of mobile technology with contract management - Oracle Primavera ...
Integration of mobile technology with contract management - Oracle Primavera ...Integration of mobile technology with contract management - Oracle Primavera ...
Integration of mobile technology with contract management - Oracle Primavera ...p6academy
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupEswar Publications
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
 
Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...
Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...
Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...Mavenir
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 
Fortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptxFortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptxThanhBoHoaluaVn
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationDr. Edwin Hernandez
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient IntelligenceRam Inamdar
 
Hip ste r - pitch deck
Hip ste r - pitch deckHip ste r - pitch deck
Hip ste r - pitch deckHIPSteR
 
5G Infrastructure Investments
5G Infrastructure Investments5G Infrastructure Investments
5G Infrastructure InvestmentsInvestingTips
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud Native Day Tel Aviv
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
Future Proof Your Network Today To Support IOT Tomorrow
Future Proof Your Network Today To Support IOT TomorrowFuture Proof Your Network Today To Support IOT Tomorrow
Future Proof Your Network Today To Support IOT TomorrowTyrone Systems
 
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...Les Interconnectés
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTScaleway
 

Similar to 10. PI_Dunton - OT Security.pdf (20)

SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
 
Integration of mobile technology with contract management - Oracle Primavera ...
Integration of mobile technology with contract management - Oracle Primavera ...Integration of mobile technology with contract management - Oracle Primavera ...
Integration of mobile technology with contract management - Oracle Primavera ...
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...
Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...
Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
Fortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptxFortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptx
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
INT 1010 10-2.pdf
INT 1010 10-2.pdfINT 1010 10-2.pdf
INT 1010 10-2.pdf
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
Hip ste r - pitch deck
Hip ste r - pitch deckHip ste r - pitch deck
Hip ste r - pitch deck
 
5G Infrastructure Investments
5G Infrastructure Investments5G Infrastructure Investments
5G Infrastructure Investments
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Future Proof Your Network Today To Support IOT Tomorrow
Future Proof Your Network Today To Support IOT TomorrowFuture Proof Your Network Today To Support IOT Tomorrow
Future Proof Your Network Today To Support IOT Tomorrow
 
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoT
 

More from PROFIBUS and PROFINET InternationaI - PI UK

More from PROFIBUS and PROFINET InternationaI - PI UK (20)

11. PI_Ford_Dunton_IOLINK_Safety.pdf
11. PI_Ford_Dunton_IOLINK_Safety.pdf11. PI_Ford_Dunton_IOLINK_Safety.pdf
11. PI_Ford_Dunton_IOLINK_Safety.pdf
 
7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf
 
6. SRCI Profibus International v2.pdf
6. SRCI Profibus International v2.pdf6. SRCI Profibus International v2.pdf
6. SRCI Profibus International v2.pdf
 
13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf
 
12. PI_OPC_UK.pdf
12. PI_OPC_UK.pdf12. PI_OPC_UK.pdf
12. PI_OPC_UK.pdf
 
4. APL PI Presentation 2023.pdf
4. APL PI Presentation 2023.pdf4. APL PI Presentation 2023.pdf
4. APL PI Presentation 2023.pdf
 
9. PA DIM presentation.pdf
9. PA DIM presentation.pdf9. PA DIM presentation.pdf
9. PA DIM presentation.pdf
 
3. Ford Dunton Mark Freeman.pdf
3. Ford Dunton Mark Freeman.pdf3. Ford Dunton Mark Freeman.pdf
3. Ford Dunton Mark Freeman.pdf
 
2. Ford_Dunton_Introductions_CRM.pdf
2. Ford_Dunton_Introductions_CRM.pdf2. Ford_Dunton_Introductions_CRM.pdf
2. Ford_Dunton_Introductions_CRM.pdf
 
PI UK Seminar (Nov 2021) - Online Certified Training Courses
PI UK Seminar (Nov 2021) - Online Certified Training CoursesPI UK Seminar (Nov 2021) - Online Certified Training Courses
PI UK Seminar (Nov 2021) - Online Certified Training Courses
 
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PI UK Seminar (Nov 2021) - PROFINET Implementation and TestingPI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
 
PI UK Seminar (Nov 2021) - PROFINET Design Basics
PI UK Seminar (Nov 2021) - PROFINET Design BasicsPI UK Seminar (Nov 2021) - PROFINET Design Basics
PI UK Seminar (Nov 2021) - PROFINET Design Basics
 
PI UK Seminar (Nov 2021) - PROFINET Gateways
PI UK Seminar (Nov 2021) - PROFINET GatewaysPI UK Seminar (Nov 2021) - PROFINET Gateways
PI UK Seminar (Nov 2021) - PROFINET Gateways
 
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device ConfigurationPI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
 
PI UK Seminar (Nov 2021) - PROFINET of Things
PI UK Seminar (Nov 2021) - PROFINET of ThingsPI UK Seminar (Nov 2021) - PROFINET of Things
PI UK Seminar (Nov 2021) - PROFINET of Things
 
PI UK Seminar (Nov 2021) - Update on APL
PI UK Seminar (Nov 2021) - Update on APLPI UK Seminar (Nov 2021) - Update on APL
PI UK Seminar (Nov 2021) - Update on APL
 
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
 
PROFIBUS lightning surge protection - Peter Thomas, CSL - 10 june 2020
PROFIBUS lightning surge protection -  Peter Thomas, CSL - 10 june 2020 PROFIBUS lightning surge protection -  Peter Thomas, CSL - 10 june 2020
PROFIBUS lightning surge protection - Peter Thomas, CSL - 10 june 2020
 
PROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter ThomasPROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter Thomas
 
EMC in Industrial Automation Systems webinar - May 2020 - Peter Thomas
EMC in Industrial Automation Systems webinar - May 2020 - Peter ThomasEMC in Industrial Automation Systems webinar - May 2020 - Peter Thomas
EMC in Industrial Automation Systems webinar - May 2020 - Peter Thomas
 

Recently uploaded

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

10. PI_Dunton - OT Security.pdf

  • 1. Tim Beech – TGN Project Services Ltd / Indu-Sol OT Cyber Security
  • 2. 2 PROFIBUS& PROFINETInternational(PI) What Happened To Profibus? – Ford Dunton 16-Feb-2023 Why? 1 IT vs OT - Differences and Approach to Security 2 Threats / Attack Paths 3 Implementing OT Security 4 © 2021 Aims
  • 3. 3 PROFIBUS& PROFINETInternational(PI) What Happened To Profibus? – Ford Dunton 16-Feb-2023 Why Do We Need Security? ▪ Merge of IT and OT has opened up OT networks to compromise ▪ OT networks / assets have become targets ▪ Protect data & assets from attack ▪ Cost of a Cyber Attack ▪ Financial cost – ransom, downtime & recovery ▪ Data loss ▪ Damage to reputation ▪ Third Quarter of 2022 - £1.6billion in losses © 2021
  • 4. 4 PROFIBUS& PROFINETInternational(PI) What Happened To Profibus? – Ford Dunton 16-Feb-2023 Why Do We Need Security? © 2021
  • 5. 5 PROFIBUS& PROFINETInternational(PI) What Happened To Profibus? – Ford Dunton 16-Feb-2023 IT vs OT Information Technology ▪ Data flow and storage focussed ▪ Business Functions (HR, Finance, Email) ▪ Protection of Data is critical CIA ▪ Confidentiality / Integrity / Availability Operation Technology ▪ Control focussed ▪ Manufacturing functions & Safety Systems ▪ Protection of people / process is critical CAIC ▪ Control / Availability / Integrity / Confidentiality © 2021
  • 6. 6 PROFIBUS& PROFINETInternational(PI) What Happened To Profibus? – Ford Dunton 16-Feb-2023 © 2021 IT vs OT – Network Levels Level 5 – Clients / Workstations Level 4 – Servers, Data Storage Level 3 – ES / Historians / MES Level 2 – SCADA / HMI Level 1 – PLC & IO Devices Level 3.5 / DMZ – Data Servers / DHCP / Edge Devices OT IT
  • 7. 7 PROFIBUS& PROFINETInternational(PI) What Happened To Profibus? – Ford Dunton 16-Feb-2023 Threats & Attack Paths for OT Networks Top 10 Threats to OT Networks (According to BSI) 1. Social Engineering & Phishing 2. Malware via removable media / external hardware 3. Human Error & Sabotage 4. Malware via Internet / Intranet 5. Internet connected control components 6. Intrusion via Remote Access 7. Technical Malpractice 8. Compromise of Extranet & Cloud Components 9. (D)DOS Attacks 10. Compromise from personal devices in the production environment © 2021
  • 8. 8 PROFIBUS& PROFINETInternational(PI) What Happened To Profibus? – Ford Dunton 16-Feb-2023 Threats & Attack Paths 1. Social Engineering & Phishing 2. Malware via removable media / external hardware 3. Human Error & Sabotage © 2021
  • 9. 9 PROFIBUS& PROFINETInternational(PI) What Happened To Profibus? – Ford Dunton 16-Feb-2023 Threats & Attack Paths 4. Malware via Internet / Intranet 5. Internet connected components 6. Intrusion via Remote Access © 2021
  • 10. 10 PROFIBUS& PROFINETInternational(PI) What Happened To Profibus? – Ford Dunton 16-Feb-2023 Threats & Attack Paths 7. Technical Malpractice 8. Compromise of Extranet & Cloud Components 9. (D)DoS Attacks 10. Compromise from personal devices in the production environment © 2021
  • 11. 11 PROFIBUS& PROFINETInternational(PI) What Happened To Profibus? – Ford Dunton 16-Feb-2023 Protection Concept © 2021 Security Awareness Trusted Zone Firewalls / DMZ / Remote Access Physical Protection Locking ports / Restrict MCC Access Network Monitoring Asset Management and Monitoring ▪ Multilevel approach ▪ Scalable ▪ Fit for purpose ▪ Training ▪ Supported by policies, procedures and standards ▪ Multi-discipline teams
  • 12. 12 PROFIBUS& PROFINETInternational(PI) What Happened To Profibus? – Ford Dunton 16-Feb-2023 Implementing OT Security ▪ Security shouldn’t be an after thought!! ▪ Protection Concept ▪ Defence in Depth ▪ Policies, Procedures & Standards ▪ Planning ▪ Threats and risks should be assessed ▪ DMZ between IT and OT ▪ Initial design and consider impact of modifications ▪ Selection of components ▪ Criteria for selection (standards) © 2021
  • 13. 13 PROFIBUS& PROFINETInternational(PI) What Happened To Profibus? – Ford Dunton 16-Feb-2023 © 2021 Case Study – Bad Network / No Security