SlideShare a Scribd company logo
Threats to Industrial Control
         Networks
    Defensive Network Security
     Consultants (DNSC), LLC
         17 October 2012
Contact Information

    Angel E. Avila
    CISSP, CISA, CEPT, C|EH, CompTIA Sec+
    E-mail: angel.e.avila@dnsc-cyber.com
    http://www.dnsc-cyber.com
    PH: 915-247-8978




2
DNSC Background

    • Computer Security Professionals (8 years)
       – Specializing in Penetration Testing, Vulnerability
         Assessments, Compliance and Auditing

    • Experience working on Government (DoD) and
      Private Industry systems
    • Certifications:
       –   Certified Information Systems Security Professional (CISSP),
       –   Certified Information Systems Auditor (CISA),
       –   Certified Ethical Hacker (C|EH),
       –   Certified Ethical Penetration Tester (CEPT),
       –   Certified Information Systems Manager (CISM),
       –   Certified Penetration Tester (CPT),
       –   CompTIA Security +
3
Objective

    • The intent of this brief is to raise awareness among
      the energy community of some of the current threats
      that are targeting Industrial Control (IC) networks
      including the Smart Grid and the importance of
      developing secure critical infrastructure.




4
Why should we care?

    • “An aggressor nation or extremist group could use
      these kinds of cyber tools to gain control of critical
      switches,” Mr. Panetta said. “They could derail
      passenger trains, or even more dangerous, derail
      passenger trains loaded with lethal chemicals. They
      could contaminate the water supply in major cities,
      or shut down the power grid across large parts of
      the country.” [1]
    • Successful attacks against critical infrastructure
      assets can potentially lead to loss of life, and life as
      we know it.
      1. Bumiller, Elisabeth; Shanker, Thomas. “Panetta Warns of Dire Threat of Cyberattack on U.S." New York
      Times on the Web 11 Oct. 2012. 15 Oct. 2012 <http://www.nytimes.com/2012/10/12/world/panetta-warns-of-
      dire-threat-of-cyberattack.html?_r=0s>
5
IC Network Overview




    Figure adapted from: Eric D. Knapp, Industrial Network Security: Securing Critical Infrastructure Networks for
6   Smart Grid, SCADA, and Other Industrial Control Systems, Syngress, 2011.
Common Mistakes

    • Overconfidence: Systems 100% secure
    • Refusal to recognize threats: It can’t happen
      to me
    • Air Gap myth: Systems not connected to IT
      network/Internet
    • Executive override
        – “Intentional” security holes for legitimate business
          purposes. ‘Set it and forget it
    •   Default accounts & passwords
    •   Lack of authentication
    •   Inbound/outbound traffic
    •   Compliance != Secure
7
Adversary
    • Cyber Threat Expertise
      – Novice: An adversary with no training, only using
        open-source (freely available) tools
      – Intermediate: An adversary with some training,
        some level of funding, uses tools either purchased
        or traded on-line
      – Expert: An adversary with a mature skill set and
        uses custom, open source, and purchased tools
         • Foreign sponsored
         • Hacktivist



8
Threats to IC Networks
    • Advance Persistent Threat (APT)
      – Adversary with sophisticated levels of expertise
        and significant resources which allow it to create
        opportunities to achieve its objectives by using
        multiple attack vectors (e.g., cyber, physical, and
        deception)
         • Maintain a foothold in order to conduct directed
           malicious objectives against the target
         • EX: Stuxnet-Worm targeting Iranian nuclear reactor
           machinery
      – Driven by either government agencies or terrorist
        organizations
    • APT’s pursues its objectives repeatedly over
      an extended period of time while countering
      victim’s mitigating attempts
9             As defined in NIST Special Publication 800-39, Managing Information Security Risk
Threats to IC Networks (cont.)
     • Cyber Threats
       – Identified as malicious efforts directed in gaining
         access to, exfiltration, data manipulation, and
         denial of service towards information systems (IS)
       – Directed attacks against confidentiality, integrity,
         and availability (CIA)
       – Cyber threats can come from anyone

     • Supply Chain Threat
       – Referred to embedded code being inserted into
         devices
       – Do you know who is developing your devices?


10
Threats to IC Networks (cont.)
     • Outsider Threat
       – No credentials, no physical access to the target
         network
       – Ex: Hacktavists, Foreign State, Terrorists
         Organizations, Script Kiddies

     • Nearsider Threat
       – No credentials, but has access to the target
         network
       – Ex: Cleaning crew, delivery personnel

     • Insider Threat
       – Having user and/or root-level credentials to the
         target network
11
       – Ex: Disgruntle Employee (users/administrators)
IC Network Overview
Outsider/Cyber
   Threats


                                                                                                                     Insider/Nearsider
                                                                                                                          Threats




Insider/Nearsider
     Threats




                      Advanced
                      Persistent
                       Threat




                 Figure adapted from: Eric D. Knapp, Industrial Network Security: Securing Critical Infrastructure Networks for
 12              Smart Grid, SCADA, and Other Industrial Control Systems, Syngress, 2011.
Attack Vectors

     • Web
       – SQL Injection
       – Broken authentication and session management
          • https://www.owasp.org/index.php/Top_10_2010-Main
     • Wireless
       – Use of weak wireless algorithms WEP and WPA
     • Bad Security Practices
       – HBGary and Anonymous incident
          • http://arstechnica.com/tech-
            policy/2011/02/anonymous-speaks-the-inside-story-of-
            the-hbgary-hack/
     • Social Networking
       – Facebook
13
Attack Vectors (cont.)
     • SCADA Protocols
       – Lack of authentication
       – Lack of encryption

     • SCADA Systems
       – Sinapsi eSolar Light Photovotaic System Monitor
       – Bypass authentication using hard-coded
         credentials and vulnerable to SQL injection
          • Also affects other Solar panel control systems
          • ICS-ALERT-12-284-01

     • Control systems
       – A search engine, Shodan, that used to identify
         internet facing Control systems
14        • ICS-ALERT-11-343-01
Attack Vectors (cont.)

     • How can I traverse through the Smart Grid?
       – Advanced Meter Infrastructure (AMI) Smart
         Meters shutdown meters through Optical port
          • D. Weber, “Looking into the Eye of the Meter”. BlackHat
            2012.

       – Over 40+ million ZigBee electric meters are
         deployed with concentration in Texas, California,
         Texas, Michigan, and Virginia.
          • Zigbee Alliance: Heile, Bob,
            https://docs.zigbee.org/zigbee-docs/dcn/10-6056.pdf



15
Attack Vectors (cont.)
                                    • AMI provides the ability to
                                      remotely control devices in the
                                      HAN
                                       - Turn off lights, Raise Tstat,
                                       etc...
                                    • Detailed energy use collected
                                      over regular time intervals.
                                       - Consumers can view energy
                                       usage real time
                                    • ZigBee is being used in HANs
                                      within the Smart Grid
                                       • Sniffing traffic
                                       • Replay attacks
                                       • Denial-of-Service


     Smart Grid using ZigBee Home
16       Area Network (HAN)
Conclusion

     • Real-world threats are constantly trying to
       exploit various IC installations
     • Reliability vs. Security
     • Awareness and being proactive helps reduce
       the risk of your network being exploited




17
Questions

     • ??




18
Contact Information
     • Angel E. Avila CISSP, CISA, C|EH, CEPT, CompTIA Security +
       angel.e.avila@dnsc-cyber.com

     • Richard G. Coy CISSP, CISA, C|EH, CPT, CEPT
       richard.g.coy@dnsc-cyber.com

     • Francisco J. Leyva CISSP, CISA, C|EH, CISM, CEPT
       francisco.j.leyva@dnsc-cyber.com

     • Humberto Mendoza CISSP, CISA, C|EH, CISM, CEPT
       humberto.mendoza@dnsc-cyber.com

     • Daniel Chacon CISSP, CISSA, C|EH, CISM, CEPT
       daniel.chacon@dnsc-cyber.com



                                                          http://www.dnsc-cyber.com
19
Backup




20
Attack Vectors (cont.)
• ZigBee Overview
  – Low Power (Long Battery Life), low data rate wireless
    protocol
  – 250 Kbps throughput rate (low data rate)
  – Short Range (10 – 100 meters)
  – Supports star and mesh network topology
  – Easily add and remove nodes to the network

• Why Zigbee ?
  – WIFI transceivers are too expensive, more power to
    operate
  – Bluetooth as a Frequency Hopping Spread Spectrum
    requires more power to operate
  – Zigbee consumes less power than WIFI and Bluetooth
  – Zigbee designed specifically for monitoring and
    automation
  – Zigbee is good solution for smart meters in Advanced
    Meter Infrastructure(AMI)
Attack Vectors (cont.)
• ZigBee Exploitation using KillerBee[1]
           - zbid–list available ZigBee devices connected to PC
           - zbdump–"tcpdump-w" clone for capturing ZigBee traffic
           - zbconvert–convert capture file formats
           - zbreplay–Replay attack
           - zdsniff–over-the-air (OTA) crypto key sniffer
           - zbfind–GUI for locating ZigBee networks
           - zbgoodfind–search memory dump for crypto key
           - zbassocflood–association flood attack (DoS)
           - spoofing attacks when used with Software Defined Radio




   1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf
Attack Vectors (cont.)
• ZigBee Security
    – KillerBee[1] open source software is a tool suite used to
      test and exploit ZigBee networks
    – Hacker community has made many software modifications
      to the KillerBee[1] tool suite
    – KillerBee[1] tool suite is flashed on a RZUSB ($40.00)
      through Joint Test Action Group (JTAG) interface.
           • AVR JTAG ICE mkII ($300.00) used to flash RZUSB
                                                                                           AVR JTAG ICE
                                         RZUSB                                             Programmer




 1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf
Attack Vectors (cont.)
                               • Problem: Demand for power
                                 exceeds the supply
                               • AMI provides the ability to
                                 remotely control devices in the
                                 HAN
                                  - Turn off lights, Raise Tstat,
                                  etc...
                               • Detailed energy use collected
                                 over regular time intervals
                                  - Consumers can view energy
                                  usage real time
                               • Consumers can adjust power to
                                 reduce cost
                               • Utility companies can better
                                 manage supply and demand
Smart Grid using ZigBee Home
    Area Network (HAN)
Attack Vectors (cont.)
• ZigBee
   – Exploitation using KillerBee[1]
      - zbid–list available ZigBee devices connected to PC
      - zbdump–"tcpdump-w" clone for capturing ZigBee traffic
      - zbconvert–convert capture file formats
      - zbreplay–Replay attack
      - zdsniff–over-the-air (OTA) crypto key sniffer
      - zbfind–GUI for locating ZigBee networks
      - zbgoodfind–search memory dump for crypto key
      - zbassocflood–association flood attack (DoS)
      - spoofing attacks when used with Software Defined Radio




  1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf

More Related Content

What's hot

Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
WPICPE
 
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
HITCON GIRLS
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
Peter Wood
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
aletarw
 
NEtwork Security Admin Portal
NEtwork Security Admin PortalNEtwork Security Admin Portal
NEtwork Security Admin Portal
Bhadreshsinh Gohil
 
Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013
Federation for Identity and Cross-Credentialing Systems (FiXs)
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Shah Sheikh
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
Zsolt Nemeth
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
Charles Li
 
Modern Lessons in Security Monitoring
Modern Lessons in Security MonitoringModern Lessons in Security Monitoring
Modern Lessons in Security Monitoring
Anton Goncharov
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
AVEVA
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
Dr. Ahmed Al Zaidy
 
Cyber secure
Cyber secure Cyber secure
Cyber secure
Gaurav Sachdeva
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
Mohammed Adam
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Zivaro Inc
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh
 
Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With You
CameronTait3
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 

What's hot (20)

Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
NEtwork Security Admin Portal
NEtwork Security Admin PortalNEtwork Security Admin Portal
NEtwork Security Admin Portal
 
Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
Modern Lessons in Security Monitoring
Modern Lessons in Security MonitoringModern Lessons in Security Monitoring
Modern Lessons in Security Monitoring
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
Cyber secure
Cyber secure Cyber secure
Cyber secure
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With You
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 

Similar to 2012 Reenergize the Americas 3B: Angel Avila

2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation
Eric Gallant
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
TI Safe
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
ParasPatel967737
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
KalsoomTahir2
 
shivam sahu (firewall).pdfb jndvhjfvhjjf
shivam sahu (firewall).pdfb jndvhjfvhjjfshivam sahu (firewall).pdfb jndvhjfvhjjf
shivam sahu (firewall).pdfb jndvhjfvhjjf
sahushivam4928
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
ParvezAhmed59842
 
Webinar 2.1 - Network protection and devices.pptx
Webinar 2.1 - Network protection and devices.pptxWebinar 2.1 - Network protection and devices.pptx
Webinar 2.1 - Network protection and devices.pptx
RoyMurillo4
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
Cisco Canada
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
Simone Onofri
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
Certrec
 
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industry
Kevin Murphy
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
frcarlson
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
aztechcouncil
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
imanuelantoniussohir
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
Nathan Wallace, PhD, PE
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
gr9293
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
John Gilligan
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
PROFIBUS and PROFINET InternationaI - PI UK
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
Marcel Winandy
 

Similar to 2012 Reenergize the Americas 3B: Angel Avila (20)

2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
shivam sahu (firewall).pdfb jndvhjfvhjjf
shivam sahu (firewall).pdfb jndvhjfvhjjfshivam sahu (firewall).pdfb jndvhjfvhjjf
shivam sahu (firewall).pdfb jndvhjfvhjjf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
Webinar 2.1 - Network protection and devices.pptx
Webinar 2.1 - Network protection and devices.pptxWebinar 2.1 - Network protection and devices.pptx
Webinar 2.1 - Network protection and devices.pptx
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industry
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 

More from Reenergize

2012 Reenergize the Americas 4B: Duncan Wood
2012 Reenergize the Americas 4B: Duncan Wood2012 Reenergize the Americas 4B: Duncan Wood
2012 Reenergize the Americas 4B: Duncan Wood
Reenergize
 
2012 Reenergize the Americas 2B: Miguel Velez-Reyes
2012 Reenergize the Americas 2B: Miguel Velez-Reyes2012 Reenergize the Americas 2B: Miguel Velez-Reyes
2012 Reenergize the Americas 2B: Miguel Velez-Reyes
Reenergize
 
2012 Reenergize the Americas 3A: Richard Turner
2012 Reenergize the Americas 3A: Richard Turner2012 Reenergize the Americas 3A: Richard Turner
2012 Reenergize the Americas 3A: Richard Turner
Reenergize
 
2012 Reenergize the Americas 4A: Benjamin Torres-Barron
2012 Reenergize the Americas 4A: Benjamin Torres-Barron2012 Reenergize the Americas 4A: Benjamin Torres-Barron
2012 Reenergize the Americas 4A: Benjamin Torres-Barron
Reenergize
 
2012 Reenergize the Americas 2A: Jesse Thompson
2012 Reenergize the Americas 2A: Jesse Thompson2012 Reenergize the Americas 2A: Jesse Thompson
2012 Reenergize the Americas 2A: Jesse Thompson
Reenergize
 
2012 Reenergize the Americas 1A: Dennis Thomas
2012 Reenergize the Americas 1A: Dennis Thomas2012 Reenergize the Americas 1A: Dennis Thomas
2012 Reenergize the Americas 1A: Dennis Thomas
Reenergize
 
2012 ReEnergize the Americas 6B: Cathy Swain
2012 ReEnergize the Americas 6B: Cathy Swain2012 ReEnergize the Americas 6B: Cathy Swain
2012 ReEnergize the Americas 6B: Cathy Swain
Reenergize
 
2012 Reenergize the Americas 3A: Harry Shulte
2012 Reenergize the Americas 3A: Harry Shulte2012 Reenergize the Americas 3A: Harry Shulte
2012 Reenergize the Americas 3A: Harry Shulte
Reenergize
 
2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez
Reenergize
 
2012 ReEnergize the Americas 2B: Nathanial Robinson
2012 ReEnergize the Americas 2B: Nathanial Robinson2012 ReEnergize the Americas 2B: Nathanial Robinson
2012 ReEnergize the Americas 2B: Nathanial Robinson
Reenergize
 
2012 Reenergize the Americas 4A: Esaúl Ramírez
2012 Reenergize the Americas 4A: Esaúl Ramírez2012 Reenergize the Americas 4A: Esaúl Ramírez
2012 Reenergize the Americas 4A: Esaúl Ramírez
Reenergize
 
2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez
Reenergize
 
2012 Reenergize the Americas 1A: Reinhard Peter
2012 Reenergize the Americas 1A: Reinhard Peter2012 Reenergize the Americas 1A: Reinhard Peter
2012 Reenergize the Americas 1A: Reinhard Peter
Reenergize
 
2012 Reenergize the Americas 5A: Luis Perez
2012 Reenergize the Americas 5A: Luis Perez2012 Reenergize the Americas 5A: Luis Perez
2012 Reenergize the Americas 5A: Luis Perez
Reenergize
 
2012 Reenergize the Americas 4A: Alejando Peraza Garcia
2012 Reenergize the Americas 4A: Alejando Peraza Garcia2012 Reenergize the Americas 4A: Alejando Peraza Garcia
2012 Reenergize the Americas 4A: Alejando Peraza Garcia
Reenergize
 
2012 Reenergize the Americas 1B: John Peichel
2012 Reenergize the Americas  1B: John Peichel2012 Reenergize the Americas  1B: John Peichel
2012 Reenergize the Americas 1B: John Peichel
Reenergize
 
2012 Reenergize the Americas 4B: Jim Peach
2012 Reenergize the Americas 4B: Jim Peach2012 Reenergize the Americas 4B: Jim Peach
2012 Reenergize the Americas 4B: Jim Peach
Reenergize
 
2012 Reenergize the Americas 5B: Allan Oliver
2012 Reenergize the Americas 5B: Allan Oliver2012 Reenergize the Americas 5B: Allan Oliver
2012 Reenergize the Americas 5B: Allan Oliver
Reenergize
 
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
Reenergize
 
2012 Reenergize the Americas 2A: David Mendoza
2012 Reenergize the Americas 2A: David Mendoza2012 Reenergize the Americas 2A: David Mendoza
2012 Reenergize the Americas 2A: David Mendoza
Reenergize
 

More from Reenergize (20)

2012 Reenergize the Americas 4B: Duncan Wood
2012 Reenergize the Americas 4B: Duncan Wood2012 Reenergize the Americas 4B: Duncan Wood
2012 Reenergize the Americas 4B: Duncan Wood
 
2012 Reenergize the Americas 2B: Miguel Velez-Reyes
2012 Reenergize the Americas 2B: Miguel Velez-Reyes2012 Reenergize the Americas 2B: Miguel Velez-Reyes
2012 Reenergize the Americas 2B: Miguel Velez-Reyes
 
2012 Reenergize the Americas 3A: Richard Turner
2012 Reenergize the Americas 3A: Richard Turner2012 Reenergize the Americas 3A: Richard Turner
2012 Reenergize the Americas 3A: Richard Turner
 
2012 Reenergize the Americas 4A: Benjamin Torres-Barron
2012 Reenergize the Americas 4A: Benjamin Torres-Barron2012 Reenergize the Americas 4A: Benjamin Torres-Barron
2012 Reenergize the Americas 4A: Benjamin Torres-Barron
 
2012 Reenergize the Americas 2A: Jesse Thompson
2012 Reenergize the Americas 2A: Jesse Thompson2012 Reenergize the Americas 2A: Jesse Thompson
2012 Reenergize the Americas 2A: Jesse Thompson
 
2012 Reenergize the Americas 1A: Dennis Thomas
2012 Reenergize the Americas 1A: Dennis Thomas2012 Reenergize the Americas 1A: Dennis Thomas
2012 Reenergize the Americas 1A: Dennis Thomas
 
2012 ReEnergize the Americas 6B: Cathy Swain
2012 ReEnergize the Americas 6B: Cathy Swain2012 ReEnergize the Americas 6B: Cathy Swain
2012 ReEnergize the Americas 6B: Cathy Swain
 
2012 Reenergize the Americas 3A: Harry Shulte
2012 Reenergize the Americas 3A: Harry Shulte2012 Reenergize the Americas 3A: Harry Shulte
2012 Reenergize the Americas 3A: Harry Shulte
 
2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez
 
2012 ReEnergize the Americas 2B: Nathanial Robinson
2012 ReEnergize the Americas 2B: Nathanial Robinson2012 ReEnergize the Americas 2B: Nathanial Robinson
2012 ReEnergize the Americas 2B: Nathanial Robinson
 
2012 Reenergize the Americas 4A: Esaúl Ramírez
2012 Reenergize the Americas 4A: Esaúl Ramírez2012 Reenergize the Americas 4A: Esaúl Ramírez
2012 Reenergize the Americas 4A: Esaúl Ramírez
 
2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez
 
2012 Reenergize the Americas 1A: Reinhard Peter
2012 Reenergize the Americas 1A: Reinhard Peter2012 Reenergize the Americas 1A: Reinhard Peter
2012 Reenergize the Americas 1A: Reinhard Peter
 
2012 Reenergize the Americas 5A: Luis Perez
2012 Reenergize the Americas 5A: Luis Perez2012 Reenergize the Americas 5A: Luis Perez
2012 Reenergize the Americas 5A: Luis Perez
 
2012 Reenergize the Americas 4A: Alejando Peraza Garcia
2012 Reenergize the Americas 4A: Alejando Peraza Garcia2012 Reenergize the Americas 4A: Alejando Peraza Garcia
2012 Reenergize the Americas 4A: Alejando Peraza Garcia
 
2012 Reenergize the Americas 1B: John Peichel
2012 Reenergize the Americas  1B: John Peichel2012 Reenergize the Americas  1B: John Peichel
2012 Reenergize the Americas 1B: John Peichel
 
2012 Reenergize the Americas 4B: Jim Peach
2012 Reenergize the Americas 4B: Jim Peach2012 Reenergize the Americas 4B: Jim Peach
2012 Reenergize the Americas 4B: Jim Peach
 
2012 Reenergize the Americas 5B: Allan Oliver
2012 Reenergize the Americas 5B: Allan Oliver2012 Reenergize the Americas 5B: Allan Oliver
2012 Reenergize the Americas 5B: Allan Oliver
 
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
 
2012 Reenergize the Americas 2A: David Mendoza
2012 Reenergize the Americas 2A: David Mendoza2012 Reenergize the Americas 2A: David Mendoza
2012 Reenergize the Americas 2A: David Mendoza
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 

2012 Reenergize the Americas 3B: Angel Avila

  • 1. Threats to Industrial Control Networks Defensive Network Security Consultants (DNSC), LLC 17 October 2012
  • 2. Contact Information Angel E. Avila CISSP, CISA, CEPT, C|EH, CompTIA Sec+ E-mail: angel.e.avila@dnsc-cyber.com http://www.dnsc-cyber.com PH: 915-247-8978 2
  • 3. DNSC Background • Computer Security Professionals (8 years) – Specializing in Penetration Testing, Vulnerability Assessments, Compliance and Auditing • Experience working on Government (DoD) and Private Industry systems • Certifications: – Certified Information Systems Security Professional (CISSP), – Certified Information Systems Auditor (CISA), – Certified Ethical Hacker (C|EH), – Certified Ethical Penetration Tester (CEPT), – Certified Information Systems Manager (CISM), – Certified Penetration Tester (CPT), – CompTIA Security + 3
  • 4. Objective • The intent of this brief is to raise awareness among the energy community of some of the current threats that are targeting Industrial Control (IC) networks including the Smart Grid and the importance of developing secure critical infrastructure. 4
  • 5. Why should we care? • “An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches,” Mr. Panetta said. “They could derail passenger trains, or even more dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country.” [1] • Successful attacks against critical infrastructure assets can potentially lead to loss of life, and life as we know it. 1. Bumiller, Elisabeth; Shanker, Thomas. “Panetta Warns of Dire Threat of Cyberattack on U.S." New York Times on the Web 11 Oct. 2012. 15 Oct. 2012 <http://www.nytimes.com/2012/10/12/world/panetta-warns-of- dire-threat-of-cyberattack.html?_r=0s> 5
  • 6. IC Network Overview Figure adapted from: Eric D. Knapp, Industrial Network Security: Securing Critical Infrastructure Networks for 6 Smart Grid, SCADA, and Other Industrial Control Systems, Syngress, 2011.
  • 7. Common Mistakes • Overconfidence: Systems 100% secure • Refusal to recognize threats: It can’t happen to me • Air Gap myth: Systems not connected to IT network/Internet • Executive override – “Intentional” security holes for legitimate business purposes. ‘Set it and forget it • Default accounts & passwords • Lack of authentication • Inbound/outbound traffic • Compliance != Secure 7
  • 8. Adversary • Cyber Threat Expertise – Novice: An adversary with no training, only using open-source (freely available) tools – Intermediate: An adversary with some training, some level of funding, uses tools either purchased or traded on-line – Expert: An adversary with a mature skill set and uses custom, open source, and purchased tools • Foreign sponsored • Hacktivist 8
  • 9. Threats to IC Networks • Advance Persistent Threat (APT) – Adversary with sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception) • Maintain a foothold in order to conduct directed malicious objectives against the target • EX: Stuxnet-Worm targeting Iranian nuclear reactor machinery – Driven by either government agencies or terrorist organizations • APT’s pursues its objectives repeatedly over an extended period of time while countering victim’s mitigating attempts 9 As defined in NIST Special Publication 800-39, Managing Information Security Risk
  • 10. Threats to IC Networks (cont.) • Cyber Threats – Identified as malicious efforts directed in gaining access to, exfiltration, data manipulation, and denial of service towards information systems (IS) – Directed attacks against confidentiality, integrity, and availability (CIA) – Cyber threats can come from anyone • Supply Chain Threat – Referred to embedded code being inserted into devices – Do you know who is developing your devices? 10
  • 11. Threats to IC Networks (cont.) • Outsider Threat – No credentials, no physical access to the target network – Ex: Hacktavists, Foreign State, Terrorists Organizations, Script Kiddies • Nearsider Threat – No credentials, but has access to the target network – Ex: Cleaning crew, delivery personnel • Insider Threat – Having user and/or root-level credentials to the target network 11 – Ex: Disgruntle Employee (users/administrators)
  • 12. IC Network Overview Outsider/Cyber Threats Insider/Nearsider Threats Insider/Nearsider Threats Advanced Persistent Threat Figure adapted from: Eric D. Knapp, Industrial Network Security: Securing Critical Infrastructure Networks for 12 Smart Grid, SCADA, and Other Industrial Control Systems, Syngress, 2011.
  • 13. Attack Vectors • Web – SQL Injection – Broken authentication and session management • https://www.owasp.org/index.php/Top_10_2010-Main • Wireless – Use of weak wireless algorithms WEP and WPA • Bad Security Practices – HBGary and Anonymous incident • http://arstechnica.com/tech- policy/2011/02/anonymous-speaks-the-inside-story-of- the-hbgary-hack/ • Social Networking – Facebook 13
  • 14. Attack Vectors (cont.) • SCADA Protocols – Lack of authentication – Lack of encryption • SCADA Systems – Sinapsi eSolar Light Photovotaic System Monitor – Bypass authentication using hard-coded credentials and vulnerable to SQL injection • Also affects other Solar panel control systems • ICS-ALERT-12-284-01 • Control systems – A search engine, Shodan, that used to identify internet facing Control systems 14 • ICS-ALERT-11-343-01
  • 15. Attack Vectors (cont.) • How can I traverse through the Smart Grid? – Advanced Meter Infrastructure (AMI) Smart Meters shutdown meters through Optical port • D. Weber, “Looking into the Eye of the Meter”. BlackHat 2012. – Over 40+ million ZigBee electric meters are deployed with concentration in Texas, California, Texas, Michigan, and Virginia. • Zigbee Alliance: Heile, Bob, https://docs.zigbee.org/zigbee-docs/dcn/10-6056.pdf 15
  • 16. Attack Vectors (cont.) • AMI provides the ability to remotely control devices in the HAN - Turn off lights, Raise Tstat, etc... • Detailed energy use collected over regular time intervals. - Consumers can view energy usage real time • ZigBee is being used in HANs within the Smart Grid • Sniffing traffic • Replay attacks • Denial-of-Service Smart Grid using ZigBee Home 16 Area Network (HAN)
  • 17. Conclusion • Real-world threats are constantly trying to exploit various IC installations • Reliability vs. Security • Awareness and being proactive helps reduce the risk of your network being exploited 17
  • 18. Questions • ?? 18
  • 19. Contact Information • Angel E. Avila CISSP, CISA, C|EH, CEPT, CompTIA Security + angel.e.avila@dnsc-cyber.com • Richard G. Coy CISSP, CISA, C|EH, CPT, CEPT richard.g.coy@dnsc-cyber.com • Francisco J. Leyva CISSP, CISA, C|EH, CISM, CEPT francisco.j.leyva@dnsc-cyber.com • Humberto Mendoza CISSP, CISA, C|EH, CISM, CEPT humberto.mendoza@dnsc-cyber.com • Daniel Chacon CISSP, CISSA, C|EH, CISM, CEPT daniel.chacon@dnsc-cyber.com http://www.dnsc-cyber.com 19
  • 21. Attack Vectors (cont.) • ZigBee Overview – Low Power (Long Battery Life), low data rate wireless protocol – 250 Kbps throughput rate (low data rate) – Short Range (10 – 100 meters) – Supports star and mesh network topology – Easily add and remove nodes to the network • Why Zigbee ? – WIFI transceivers are too expensive, more power to operate – Bluetooth as a Frequency Hopping Spread Spectrum requires more power to operate – Zigbee consumes less power than WIFI and Bluetooth – Zigbee designed specifically for monitoring and automation – Zigbee is good solution for smart meters in Advanced Meter Infrastructure(AMI)
  • 22. Attack Vectors (cont.) • ZigBee Exploitation using KillerBee[1] - zbid–list available ZigBee devices connected to PC - zbdump–"tcpdump-w" clone for capturing ZigBee traffic - zbconvert–convert capture file formats - zbreplay–Replay attack - zdsniff–over-the-air (OTA) crypto key sniffer - zbfind–GUI for locating ZigBee networks - zbgoodfind–search memory dump for crypto key - zbassocflood–association flood attack (DoS) - spoofing attacks when used with Software Defined Radio 1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf
  • 23. Attack Vectors (cont.) • ZigBee Security – KillerBee[1] open source software is a tool suite used to test and exploit ZigBee networks – Hacker community has made many software modifications to the KillerBee[1] tool suite – KillerBee[1] tool suite is flashed on a RZUSB ($40.00) through Joint Test Action Group (JTAG) interface. • AVR JTAG ICE mkII ($300.00) used to flash RZUSB AVR JTAG ICE RZUSB Programmer 1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf
  • 24. Attack Vectors (cont.) • Problem: Demand for power exceeds the supply • AMI provides the ability to remotely control devices in the HAN - Turn off lights, Raise Tstat, etc... • Detailed energy use collected over regular time intervals - Consumers can view energy usage real time • Consumers can adjust power to reduce cost • Utility companies can better manage supply and demand Smart Grid using ZigBee Home Area Network (HAN)
  • 25. Attack Vectors (cont.) • ZigBee – Exploitation using KillerBee[1] - zbid–list available ZigBee devices connected to PC - zbdump–"tcpdump-w" clone for capturing ZigBee traffic - zbconvert–convert capture file formats - zbreplay–Replay attack - zdsniff–over-the-air (OTA) crypto key sniffer - zbfind–GUI for locating ZigBee networks - zbgoodfind–search memory dump for crypto key - zbassocflood–association flood attack (DoS) - spoofing attacks when used with Software Defined Radio 1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf