SlideShare a Scribd company logo
1 of 25
CRITICAL
INFRASTRUCTURE
2
DR JOHN ROOKSBY
IN THIS LECTURE…
More on infrastructure


Control systems
• SCADA systems


Digital Infrastructure
• The internet as infrastructure
• Resilience of the internet
CONTROL SYSTEMS
IT is used for monitoring and controlling infrastructure in many
industries
  •   Oil and Gas
  •   Air Traffic Controls and Railways
  •   Power Generation and Transmission
  •   Water Management
  •   Manufacturing
  •   Production Plants

  Infrastructure is inherently distributed, and therefore so are the
  systems that control and monitor it
TYPES OF CONTROL SYSTEM
Automated system/ Programmable Logic Controllers (PLCs)
• logic embedded into components
• Often a low level building block for larger systems
Supervisory Control and Data Acquisition (SCADA)
• Extend automated systems to allow remote monitoring and
  control
• Data flow to other systems often automated
• Typically used where components are not in one location
Distributed Control System (DCS)
• Similar to SCADA but monitoring and control embedded across
  the system, and so lacks the hierarchy of SCADA
CONTROL SYSTEMS
Manufacturing Execution Systems
• Extends SCADA with batch processes
Energy Management Systems
• A type of SCADA system used for electricity management and
  control
Building Control Systems
• Control the lighting, heating, energy usage, and security of a
  building
SCADA
SCADA is normally a software package designed to display
information, log data and show alarms
  •   Programmable logic units control infrastructure components
  •   Data acquisition by remote terminal units
  •   Data sent to control centre
  •   Control Centre monitors system, and issues commands


Hardly talked about until recently, now a major concern
  • Reliability
  • Security
SCADA SECURITY
Security issues are arising because of a changing context
No longer able to rely on security by obscurity
•   Until recently, SCADA systems were mainly proprietary.
     •    Now progressively reliant on standard IT technologies
          (Microsoft Windows, TCP/IP, web browsers, wireless
          technologies, etc.)
No longer able to rely on security by isolation
•   Until recently, SCADA systems were isolated networks. But
    now:
         • Direct connections to vendors for maintenance, stock ordering
           etc.
         • Connected to enterprise systems, which in turn are on the
           Internet.
         • Workers connecting their laptops to the internet.
         • Some SCADA systems connected directly to the internet.
SCADA SECURITY
Infrastructure providers very good at physical security, but often have
little appreciation of IT security
Standard security tools and techniques can be used, although there
are some complexities
  • For example, It may not be possible to install anti-virus protection
    on process control systems, owing to the lack of processor
    power on legacy systems, the age of operating systems or the
    lack of vendor certification.
  • Security testing on process control systems must also be
    approached with extreme caution – security scanning can
    seriously affect the operation of many control devices.
  • There are sometimes few opportunities to take the systems off-
    line for routine testing, patching and maintenance.
SCADA DEPENDABILITY
There is a great deal of concern about the dependability of
SCADA systems
• Poorly designed or engineered systems may not be reliable
• Vulnerable to cyber-attack
SCADA systems will be key targets in any cyber attack
• STUXNET
Extreme concern (paranoia?) shown by UK and USA about
hackers in Russia and China
MOVING ON…
DIGITAL INFRASTRUCTURE
Forms of digital infrastructure
•   Public and Private Cable Networks
•   Mobile networks
•   Satellite and broadcast services
•   Data Centres
•   The Internet
•   Clouds
Information technology has a complex status as infrastructure. It is
more complex than most, if not all other forms of infrastructure.
•   Hard – physical systems
•   Soft – protocols, layers of abstraction, services, etc.
•   Infrastructure as “a relation” (S.L. Star)
THE INTERNET AS
INFRASTRUCTURE
The internet is a key infrastructure for modern society
• Certainly critical to the economy
• Other infrastructures coming to rely on it
The internet is often taken for granted. The common assumption
is that the internet is dependable.
• The myth of the “bombproof” network
• The myth of the “free/open” system
INCIDENTS
It is straightforward to divert traffic away from its proper
destination by announcing invalid routes.
• 2008, Pakistan advertises invalid routes for YouTube, bringing
  it down for a couple hours.
• 2010, China Telecom advertises a number of invalid routes,
  effectively hijacking 15% of Internet addresses for 18 minutes.
Exploitation of latent bugs in BGP (Border Gateway Protocol)
• August 2010, an experiment triggers a bug in some routers,
  causing their neighbours to terminate BGP sessions, and for
  many routes to be lost.
INCIDENTS
Vulnerability of cables
•   Undersea cables near Alexandria in Egypt were cut in December
    2008.
Dependence on electrical power.
•   A large power outage in Brazil in November 2009 caused
    significant disruption, though it lasted only four and a half hours
The internet appears to have been resilient during major disasters
•   9/11 Terror Attacks
•   Hurricane Katrina
•   Tohoku Earthquake
But we don’t have good information about why and how.
ENISA STUDY

              Inter‐X: Resilience of the Internet
              Interconnection Ecosystem

              Chris Hall
              Richard Clayton
              Ross Anderson
              Evangelos Ouzouni
ENISA STUDY

                             Inter‐X: Resilience of the Internet
                             Interconnection Ecosystem

                             Chris Hall
                             Richard Clayton
                             Ross Anderson
                             Evangelos Ouzouni


 “It does appear likely that the Internet could suffer systemic
  failure, leading perhaps to local failures and system‐wide
                          congestion”
THREATS
Failure of the infrastructure on which the internet depends
•   Power transmission system
•   Human infrastructure needed to maintain it (for example if
    pandemic flu causes millions of people to stay at home out of fear
    of infection).
Cascading technical failures
•   Perhaps during changeover from IPv4 to IPv6
•   Common‐mode failures involving updates to popular makes of
    router (or PC) may also fall under this heading.
A coordinated attack
•   A capable opponent disrupts the BGP fabric by broadcasting
    thousands of bogus routes, either via a large AS or from a large
    number of compromised routers.
THREATS
Market failure
• Internet Transit may not be a viable business.
Economic issues – “The tragedy of the commons”
• Increasing resilience benefits everyone, but requires
  coordinated action. E.g improving BGP is costly and must be
  done at an individual level.
Regulatory failure
• Misinformed/over regulation, and under regulation can lead to
  problems (related to above two issues)
CAN WE PROTECT AND ASSURE
THE INTERNET?
The fist stage of protecting and assuring any critical infrastructure
is to take stock of and understand its components.
• But this is very difficult in the case of the internet.
Each AS/ISP has an NOC (Network Operation Centre) but there is
no NOC for the internet as a whole
• There is no map of physical connections – their
  location, capacity, etc.;
• There is no map of traffic and traffic volume
• there is no map of the interconnections between ASs
WHY THE LACK OF
INFORMATION?
•   The complexity and scale of the Internet would make this an
    immense task, and potentially very costly.
     •   An AS level topology is possible, but we would ideally have
         something at the router level.
      • We would ideally also like to understand interdependencies
         with the power network.
•   The internet is constantly growing in size and evolving (e.g. the
    rise of CDNs)
•   The routing system is dynamic, so very difficult to model.
•   Some of the information is sensitive
     •  Gathering this information could be a security risk
     •  The information will have commercial sensitivity, for example
        traffic levels.
•   There is a lack of good metrics available.
RECOMMENDATIONS
The report makes four recommendations


1. We need a better understanding of failure
• Incident Investigation
   • An independent body should thoroughly investigate all
     major incidents and report publicly on the causes, effects
     and lessons to be learned. Incident correlation and
     analysis may lead to assessment and forecast models.
• Data Collection of Network Performance Measurements
    • Consistent, long-term data collection
RECOMMENDATIONS
2. Further research into resilience
    • Research into Resilience Metrics and Measurement
      Frameworks
    • Development and Deployment of Secure Inter‐domain
      Routing
    • Research into AS Incentives that Improve Resilience
RECOMMENDATIONS
3 . The promotion of good practice
   • Promotion and Sharing of Good Practice on Internet
     Interconnections
   • Independent Testing of Equipment and Protocols
   • Conduct Regular Cyber Exercises on the Interconnection
     Infrastructure
RECOMMENDATIONS
4. That policy makers become more engages
   • Plan for transit market failure
   • Debate traffic prioritisation
   • Work towards a reliance certification scheme
KEY POINTS
Infrastructure is often controlled and monitored by IT systems
• SCADA systems are the common type
• Government organisations such as the CPNI are concerned
  about the vulnerability of these systems to failures and attack
Digital technologies are becoming critical infrastructure in their
own right
• The Internet is becoming increasingly critical.
• The resilience of the internet is not a given.

More Related Content

What's hot

Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers Nathan Wallace, PhD, PE
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar Nnull The Open Security Community
 
amrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapalibuildersreviews
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkNathan Wallace, PhD, PE
 
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Digital Bond
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada securityYulia Rotar
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...Dale Butler
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?Digital Bond
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaDigital Bond
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Nathan Wallace, PhD, PE
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids Jishnu Pradeep
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cCharles Li
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackNicole Fucile-Borsian
 
Cloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research SummaryCloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research SummaryIntel IT Center
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security WebinarAVEVA
 
u10a1 Network and Security Architecture _FINAL - Kent Haubein
u10a1 Network and Security Architecture _FINAL - Kent Haubeinu10a1 Network and Security Architecture _FINAL - Kent Haubein
u10a1 Network and Security Architecture _FINAL - Kent HaubeinKent Haubein
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptMohit Rampal
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
 
amrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdf
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
 
Incident response
Incident responseIncident response
Incident response
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds Hack
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Cloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research SummaryCloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research Summary
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
 
u10a1 Network and Security Architecture _FINAL - Kent Haubein
u10a1 Network and Security Architecture _FINAL - Kent Haubeinu10a1 Network and Security Architecture _FINAL - Kent Haubein
u10a1 Network and Security Architecture _FINAL - Kent Haubein
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-ppt
 

Similar to CS5032 Lecture 20: Dependable infrastructure 2

The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Gridgueste0b5fe
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updatedskumartarget
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)TI Safe
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networksChetan Kumar S
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPTUpender Upr
 
Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ securityJisc
 
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTIII SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTRAJESHWARI M
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoTAhmed Banafa
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceAltoros
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
Network design consideration
Network design considerationNetwork design consideration
Network design considerationlavanya marichamy
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesThe IOT Academy
 
ML13198A409.pdf
ML13198A409.pdfML13198A409.pdf
ML13198A409.pdfpoolpandyM
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
 

Similar to CS5032 Lecture 20: Dependable infrastructure 2 (20)

The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updated
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networks
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ security
 
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTIII SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
 
Unit_3.pptx
Unit_3.pptxUnit_3.pptx
Unit_3.pptx
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
ML13198A409.pdf
ML13198A409.pdfML13198A409.pdf
ML13198A409.pdf
 
42 grid computing
42 grid computing42 grid computing
42 grid computing
 
42 grid computing
42 grid computing42 grid computing
42 grid computing
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 

More from John Rooksby

Designing apps lecture
Designing apps lectureDesigning apps lecture
Designing apps lectureJohn Rooksby
 
Implementing Ethics for a Mobile App Deployment
Implementing Ethics for a Mobile App DeploymentImplementing Ethics for a Mobile App Deployment
Implementing Ethics for a Mobile App DeploymentJohn Rooksby
 
Self tracking and digital health
Self tracking and digital healthSelf tracking and digital health
Self tracking and digital healthJohn Rooksby
 
Digital Health From an HCI Perspective - Geraldine Fitzpatrick
Digital Health From an HCI Perspective - Geraldine FitzpatrickDigital Health From an HCI Perspective - Geraldine Fitzpatrick
Digital Health From an HCI Perspective - Geraldine FitzpatrickJohn Rooksby
 
How to evaluate and improve the quality of mHealth behaviour change tools
How to evaluate and improve the quality of mHealth behaviour change toolsHow to evaluate and improve the quality of mHealth behaviour change tools
How to evaluate and improve the quality of mHealth behaviour change toolsJohn Rooksby
 
Guest lecture: Designing mobile apps
Guest lecture: Designing mobile appsGuest lecture: Designing mobile apps
Guest lecture: Designing mobile appsJohn Rooksby
 
Talk at UCL: Mobile Devices in Everyday Use
Talk at UCL: Mobile Devices in Everyday UseTalk at UCL: Mobile Devices in Everyday Use
Talk at UCL: Mobile Devices in Everyday UseJohn Rooksby
 
Intimacy and Mobile Devices
Intimacy and Mobile DevicesIntimacy and Mobile Devices
Intimacy and Mobile DevicesJohn Rooksby
 
CS5032 Lecture 2: Failure
CS5032 Lecture 2: FailureCS5032 Lecture 2: Failure
CS5032 Lecture 2: FailureJohn Rooksby
 
CS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureCS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureJohn Rooksby
 
CS5032 Lecture 14: Organisations and failure 2
CS5032 Lecture 14: Organisations and failure 2CS5032 Lecture 14: Organisations and failure 2
CS5032 Lecture 14: Organisations and failure 2John Rooksby
 
CS5032 Lecture 13: organisations and failure
CS5032 Lecture 13: organisations and failureCS5032 Lecture 13: organisations and failure
CS5032 Lecture 13: organisations and failureJohn Rooksby
 
CS5032 Lecture 10: Learning from failure 2
CS5032 Lecture 10: Learning from failure 2CS5032 Lecture 10: Learning from failure 2
CS5032 Lecture 10: Learning from failure 2John Rooksby
 
CS5032 Lecture 9: Learning from failure 1
CS5032 Lecture 9: Learning from failure 1CS5032 Lecture 9: Learning from failure 1
CS5032 Lecture 9: Learning from failure 1John Rooksby
 
CS5032 Lecture 6: Human Error 2
CS5032 Lecture 6: Human Error 2CS5032 Lecture 6: Human Error 2
CS5032 Lecture 6: Human Error 2John Rooksby
 
CS5032 Lecture 5: Human Error 1
CS5032 Lecture 5: Human Error 1CS5032 Lecture 5: Human Error 1
CS5032 Lecture 5: Human Error 1John Rooksby
 
Testing Sociotechnical Systems: Passport Issuing
Testing Sociotechnical Systems: Passport IssuingTesting Sociotechnical Systems: Passport Issuing
Testing Sociotechnical Systems: Passport IssuingJohn Rooksby
 
Testing Sociotechnical Systems: Heathrow Terminal 5
Testing Sociotechnical Systems: Heathrow Terminal 5Testing Sociotechnical Systems: Heathrow Terminal 5
Testing Sociotechnical Systems: Heathrow Terminal 5John Rooksby
 

More from John Rooksby (20)

Designing apps lecture
Designing apps lectureDesigning apps lecture
Designing apps lecture
 
Implementing Ethics for a Mobile App Deployment
Implementing Ethics for a Mobile App DeploymentImplementing Ethics for a Mobile App Deployment
Implementing Ethics for a Mobile App Deployment
 
Self tracking and digital health
Self tracking and digital healthSelf tracking and digital health
Self tracking and digital health
 
Digital Health From an HCI Perspective - Geraldine Fitzpatrick
Digital Health From an HCI Perspective - Geraldine FitzpatrickDigital Health From an HCI Perspective - Geraldine Fitzpatrick
Digital Health From an HCI Perspective - Geraldine Fitzpatrick
 
How to evaluate and improve the quality of mHealth behaviour change tools
How to evaluate and improve the quality of mHealth behaviour change toolsHow to evaluate and improve the quality of mHealth behaviour change tools
How to evaluate and improve the quality of mHealth behaviour change tools
 
Guest lecture: Designing mobile apps
Guest lecture: Designing mobile appsGuest lecture: Designing mobile apps
Guest lecture: Designing mobile apps
 
Talk at UCL: Mobile Devices in Everyday Use
Talk at UCL: Mobile Devices in Everyday UseTalk at UCL: Mobile Devices in Everyday Use
Talk at UCL: Mobile Devices in Everyday Use
 
Fitts' Law
Fitts' LawFitts' Law
Fitts' Law
 
Intimacy and Mobile Devices
Intimacy and Mobile DevicesIntimacy and Mobile Devices
Intimacy and Mobile Devices
 
Making data
Making dataMaking data
Making data
 
CS5032 Lecture 2: Failure
CS5032 Lecture 2: FailureCS5032 Lecture 2: Failure
CS5032 Lecture 2: Failure
 
CS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructureCS5032 Lecture 19: Dependable infrastructure
CS5032 Lecture 19: Dependable infrastructure
 
CS5032 Lecture 14: Organisations and failure 2
CS5032 Lecture 14: Organisations and failure 2CS5032 Lecture 14: Organisations and failure 2
CS5032 Lecture 14: Organisations and failure 2
 
CS5032 Lecture 13: organisations and failure
CS5032 Lecture 13: organisations and failureCS5032 Lecture 13: organisations and failure
CS5032 Lecture 13: organisations and failure
 
CS5032 Lecture 10: Learning from failure 2
CS5032 Lecture 10: Learning from failure 2CS5032 Lecture 10: Learning from failure 2
CS5032 Lecture 10: Learning from failure 2
 
CS5032 Lecture 9: Learning from failure 1
CS5032 Lecture 9: Learning from failure 1CS5032 Lecture 9: Learning from failure 1
CS5032 Lecture 9: Learning from failure 1
 
CS5032 Lecture 6: Human Error 2
CS5032 Lecture 6: Human Error 2CS5032 Lecture 6: Human Error 2
CS5032 Lecture 6: Human Error 2
 
CS5032 Lecture 5: Human Error 1
CS5032 Lecture 5: Human Error 1CS5032 Lecture 5: Human Error 1
CS5032 Lecture 5: Human Error 1
 
Testing Sociotechnical Systems: Passport Issuing
Testing Sociotechnical Systems: Passport IssuingTesting Sociotechnical Systems: Passport Issuing
Testing Sociotechnical Systems: Passport Issuing
 
Testing Sociotechnical Systems: Heathrow Terminal 5
Testing Sociotechnical Systems: Heathrow Terminal 5Testing Sociotechnical Systems: Heathrow Terminal 5
Testing Sociotechnical Systems: Heathrow Terminal 5
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

CS5032 Lecture 20: Dependable infrastructure 2

  • 2. IN THIS LECTURE… More on infrastructure Control systems • SCADA systems Digital Infrastructure • The internet as infrastructure • Resilience of the internet
  • 3. CONTROL SYSTEMS IT is used for monitoring and controlling infrastructure in many industries • Oil and Gas • Air Traffic Controls and Railways • Power Generation and Transmission • Water Management • Manufacturing • Production Plants Infrastructure is inherently distributed, and therefore so are the systems that control and monitor it
  • 4. TYPES OF CONTROL SYSTEM Automated system/ Programmable Logic Controllers (PLCs) • logic embedded into components • Often a low level building block for larger systems Supervisory Control and Data Acquisition (SCADA) • Extend automated systems to allow remote monitoring and control • Data flow to other systems often automated • Typically used where components are not in one location Distributed Control System (DCS) • Similar to SCADA but monitoring and control embedded across the system, and so lacks the hierarchy of SCADA
  • 5. CONTROL SYSTEMS Manufacturing Execution Systems • Extends SCADA with batch processes Energy Management Systems • A type of SCADA system used for electricity management and control Building Control Systems • Control the lighting, heating, energy usage, and security of a building
  • 6. SCADA SCADA is normally a software package designed to display information, log data and show alarms • Programmable logic units control infrastructure components • Data acquisition by remote terminal units • Data sent to control centre • Control Centre monitors system, and issues commands Hardly talked about until recently, now a major concern • Reliability • Security
  • 7. SCADA SECURITY Security issues are arising because of a changing context No longer able to rely on security by obscurity • Until recently, SCADA systems were mainly proprietary. • Now progressively reliant on standard IT technologies (Microsoft Windows, TCP/IP, web browsers, wireless technologies, etc.) No longer able to rely on security by isolation • Until recently, SCADA systems were isolated networks. But now: • Direct connections to vendors for maintenance, stock ordering etc. • Connected to enterprise systems, which in turn are on the Internet. • Workers connecting their laptops to the internet. • Some SCADA systems connected directly to the internet.
  • 8. SCADA SECURITY Infrastructure providers very good at physical security, but often have little appreciation of IT security Standard security tools and techniques can be used, although there are some complexities • For example, It may not be possible to install anti-virus protection on process control systems, owing to the lack of processor power on legacy systems, the age of operating systems or the lack of vendor certification. • Security testing on process control systems must also be approached with extreme caution – security scanning can seriously affect the operation of many control devices. • There are sometimes few opportunities to take the systems off- line for routine testing, patching and maintenance.
  • 9. SCADA DEPENDABILITY There is a great deal of concern about the dependability of SCADA systems • Poorly designed or engineered systems may not be reliable • Vulnerable to cyber-attack SCADA systems will be key targets in any cyber attack • STUXNET Extreme concern (paranoia?) shown by UK and USA about hackers in Russia and China
  • 11. DIGITAL INFRASTRUCTURE Forms of digital infrastructure • Public and Private Cable Networks • Mobile networks • Satellite and broadcast services • Data Centres • The Internet • Clouds Information technology has a complex status as infrastructure. It is more complex than most, if not all other forms of infrastructure. • Hard – physical systems • Soft – protocols, layers of abstraction, services, etc. • Infrastructure as “a relation” (S.L. Star)
  • 12. THE INTERNET AS INFRASTRUCTURE The internet is a key infrastructure for modern society • Certainly critical to the economy • Other infrastructures coming to rely on it The internet is often taken for granted. The common assumption is that the internet is dependable. • The myth of the “bombproof” network • The myth of the “free/open” system
  • 13. INCIDENTS It is straightforward to divert traffic away from its proper destination by announcing invalid routes. • 2008, Pakistan advertises invalid routes for YouTube, bringing it down for a couple hours. • 2010, China Telecom advertises a number of invalid routes, effectively hijacking 15% of Internet addresses for 18 minutes. Exploitation of latent bugs in BGP (Border Gateway Protocol) • August 2010, an experiment triggers a bug in some routers, causing their neighbours to terminate BGP sessions, and for many routes to be lost.
  • 14. INCIDENTS Vulnerability of cables • Undersea cables near Alexandria in Egypt were cut in December 2008. Dependence on electrical power. • A large power outage in Brazil in November 2009 caused significant disruption, though it lasted only four and a half hours The internet appears to have been resilient during major disasters • 9/11 Terror Attacks • Hurricane Katrina • Tohoku Earthquake But we don’t have good information about why and how.
  • 15. ENISA STUDY Inter‐X: Resilience of the Internet Interconnection Ecosystem Chris Hall Richard Clayton Ross Anderson Evangelos Ouzouni
  • 16. ENISA STUDY Inter‐X: Resilience of the Internet Interconnection Ecosystem Chris Hall Richard Clayton Ross Anderson Evangelos Ouzouni “It does appear likely that the Internet could suffer systemic failure, leading perhaps to local failures and system‐wide congestion”
  • 17. THREATS Failure of the infrastructure on which the internet depends • Power transmission system • Human infrastructure needed to maintain it (for example if pandemic flu causes millions of people to stay at home out of fear of infection). Cascading technical failures • Perhaps during changeover from IPv4 to IPv6 • Common‐mode failures involving updates to popular makes of router (or PC) may also fall under this heading. A coordinated attack • A capable opponent disrupts the BGP fabric by broadcasting thousands of bogus routes, either via a large AS or from a large number of compromised routers.
  • 18. THREATS Market failure • Internet Transit may not be a viable business. Economic issues – “The tragedy of the commons” • Increasing resilience benefits everyone, but requires coordinated action. E.g improving BGP is costly and must be done at an individual level. Regulatory failure • Misinformed/over regulation, and under regulation can lead to problems (related to above two issues)
  • 19. CAN WE PROTECT AND ASSURE THE INTERNET? The fist stage of protecting and assuring any critical infrastructure is to take stock of and understand its components. • But this is very difficult in the case of the internet. Each AS/ISP has an NOC (Network Operation Centre) but there is no NOC for the internet as a whole • There is no map of physical connections – their location, capacity, etc.; • There is no map of traffic and traffic volume • there is no map of the interconnections between ASs
  • 20. WHY THE LACK OF INFORMATION? • The complexity and scale of the Internet would make this an immense task, and potentially very costly. • An AS level topology is possible, but we would ideally have something at the router level. • We would ideally also like to understand interdependencies with the power network. • The internet is constantly growing in size and evolving (e.g. the rise of CDNs) • The routing system is dynamic, so very difficult to model. • Some of the information is sensitive • Gathering this information could be a security risk • The information will have commercial sensitivity, for example traffic levels. • There is a lack of good metrics available.
  • 21. RECOMMENDATIONS The report makes four recommendations 1. We need a better understanding of failure • Incident Investigation • An independent body should thoroughly investigate all major incidents and report publicly on the causes, effects and lessons to be learned. Incident correlation and analysis may lead to assessment and forecast models. • Data Collection of Network Performance Measurements • Consistent, long-term data collection
  • 22. RECOMMENDATIONS 2. Further research into resilience • Research into Resilience Metrics and Measurement Frameworks • Development and Deployment of Secure Inter‐domain Routing • Research into AS Incentives that Improve Resilience
  • 23. RECOMMENDATIONS 3 . The promotion of good practice • Promotion and Sharing of Good Practice on Internet Interconnections • Independent Testing of Equipment and Protocols • Conduct Regular Cyber Exercises on the Interconnection Infrastructure
  • 24. RECOMMENDATIONS 4. That policy makers become more engages • Plan for transit market failure • Debate traffic prioritisation • Work towards a reliance certification scheme
  • 25. KEY POINTS Infrastructure is often controlled and monitored by IT systems • SCADA systems are the common type • Government organisations such as the CPNI are concerned about the vulnerability of these systems to failures and attack Digital technologies are becoming critical infrastructure in their own right • The Internet is becoming increasingly critical. • The resilience of the internet is not a given.

Editor's Notes

  1. This is the parlance of CPNT