SlideShare a Scribd company logo
CYBER SECURITY
J.JAYAKUMAR
Contents
• Cyber security measures
• Authentication
• Attackers
• Types of Attacks
• Possible solutions to this attacks
• Digital Signature
• Smart Meters
Security measures
• Privacy : only the sender and intended receiver(s)
can understand the content of a message.
• Integrity : The message arrives in time at the
receiver in exactly the same way it was sent.
• Message authentication : The receiver can be sure
of the sender’s identity and that the message
does not come from an imposter.
• Non-repudiation A receiver is able to prove that a
message came from a specific sender and the
sender is unable to deny sending the message.
Encryption and decryption
Types of Encryption
• Symmetric key encryption
- Substitution cipher
- Transposition cipher
- One-time pad
• Public key encryption
Substitution cipher
• In this process each character is replaced by
another character.
• An example of a mapping in a substitution
cipher system is shown below:
• HELLO THERE will produce KQSSZ JKQFQ as
Cipher text
Transposition cipher
Data encryption standard
Digital signatures
• A digital signature allows the signing of digital messages by
the Sender in such a way that:
• 1. The Receiver can verify the claimed identity of the Sender
(authentication).
• 2. The Receiver can prove and the Sender cannot deny that
the message has been sent by the
• specific user (non-repudiation).
• 3. The Receiver cannot modify the message and claim that the
modified message is the one that was received from the
Sender.
Types of digitally signing messages
secret Key signature,
public Key signature and the message digest.
Authentication based on shared secret key
Authentication based on shared secret key
a) A indicates to B that it wishes to communicate with B and sends his identity
with a large random number (NA) in Plain text.
b) B encrypts NA using a secret Key known to A and B and sends
Cipher text (EKAB (NA)) together with another large random number (NB) to A
as Plain text.
c) A decrypts the Cipher text received to check whether it gets the same
number (NA) that he sent to B and encrypts the number NB using a shared
secret Key and sends the Cipher text to B.
d) B decrypts the received Cipher text using a shared secret Key and checks
whether he gets the same number (NB) as that he sent.
Authentication based on shared secret key
Attackers & Types of Attack
Attackers
• script kiddies
• elite hackers
• Terrorists
• employees, competitors, or customers
Categories of Attacks
• Component-wise
• protocol-wise
• topology-wise.
Classification of Attacks
1) Malware spreading
2) Access through database links
3) Compromising communication equipment:
4) Injecting false information
5) Network Availability
6) Eavesdropping and traffic analysis
7) Modbus security issue
Possible solution
1) Identity should be verified through strong
authentication mechanisms.
2) Malware protection on both Embedded and
General purpose systems.
3) Network Intrusion Prevention System (IPS)
and Network Intrusion Detection System (IDS)
defences to protect the system from outside
and inside attacks.
4) Vulnerability assessments
5) To educate the network users about security best
practices
6) Devices must know the sources and destinations
they communicate with.
7) Devices should support Virtual Private Network
(VPN) architectures for secure communication.
8) Devices must use Public key Infrastructure (PKI)
to secure communication
• From the huge amount of transferred data,
utilities should only collect the data needed to
achieve their goals.
• Control system and IT security engineers should
be equally involved in securing the smart grid
network.
© ABB Group
December 8, 2022 | Slide 18
Cyber Security standards
Standard Main Focus Status
NIST SGIP-CSWG Smart Grid Interoperability Panel – Cyber Security
Working Group
On-going *
NERC CIP NERC CIP Cyber Security regulation for North
American power utilities
Released,
On-going *
IEC 62351 Data and Communications Security Partly released,
On-going *
IEEE PSRC/H13 &
SUB/C10
Cyber Security Requirements for Substation
Automation, Protection and Control Systems
On-going*
IEEE 1686 IEEE Standard for Substation Intelligent Electronic
Devices (IEDs) Cyber Security Capabilities
Finalized
ISA S99 Industrial Automation and Control System Security Partly released,
On-going *
• Graphical representation of
scope and completeness of
Cyber Security for Substation
Automation
Standards and their scope
Cyber Security for Substation
Automation
Relevant standards – NERC-CIP
CIP 002 - Critical Cyber Asset Identification
CIP 003 - Security Management Controls
CIP 004 - Personnel and Training
CIP 005 - Electronic Security Perimeter(s)
CIP 006 - Physical Security of Critical Cyber Assets
CIP 007 - Systems Security Management
CIP 008 - Incident Reporting and Response Planning
CIP 009 - Recovery Plans for Critical Cyber Asset

More Related Content

Similar to cyber security-2.pptx

Security Patterns for Software Development
Security Patterns for Software DevelopmentSecurity Patterns for Software Development
Security Patterns for Software Development
Narudom Roongsiriwong, CISSP
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
CAS
 
Kerberos Authentication Process In Windows
Kerberos Authentication Process In WindowsKerberos Authentication Process In Windows
Kerberos Authentication Process In Windowsniteshitimpulse
 
ch13 ABCD.ppt
ch13 ABCD.pptch13 ABCD.ppt
ch13 ABCD.ppt
georgejustymirobi1
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
Nishant Pahad
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
Bitcoin Association of Australia
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
MohitManna
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
tahirilyas92
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
anuragjagetiya
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
Mona Rajput
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
AdiseshaK
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
Prof. Dr. K. Adisesha
 

Similar to cyber security-2.pptx (20)

Security Patterns for Software Development
Security Patterns for Software DevelopmentSecurity Patterns for Software Development
Security Patterns for Software Development
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography
Cryptography Cryptography
Cryptography
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Kerberos Authentication Process In Windows
Kerberos Authentication Process In WindowsKerberos Authentication Process In Windows
Kerberos Authentication Process In Windows
 
ch13 ABCD.ppt
ch13 ABCD.pptch13 ABCD.ppt
ch13 ABCD.ppt
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 

More from jayakumar703719

pillars-deployment of SG.pptx
pillars-deployment of SG.pptxpillars-deployment of SG.pptx
pillars-deployment of SG.pptx
jayakumar703719
 
New Academic Year Decisions.pptx
New Academic Year Decisions.pptxNew Academic Year Decisions.pptx
New Academic Year Decisions.pptx
jayakumar703719
 
Lecture 8.pdf
Lecture 8.pdfLecture 8.pdf
Lecture 8.pdf
jayakumar703719
 
M2M.pptx
M2M.pptxM2M.pptx
M2M.pptx
jayakumar703719
 
Lect14-15 iotlevelsanddeploymenttemplates.pdf
Lect14-15 iotlevelsanddeploymenttemplates.pdfLect14-15 iotlevelsanddeploymenttemplates.pdf
Lect14-15 iotlevelsanddeploymenttemplates.pdf
jayakumar703719
 
M2M.pdf
M2M.pdfM2M.pdf
L1-Intro-IoT.pptx
L1-Intro-IoT.pptxL1-Intro-IoT.pptx
L1-Intro-IoT.pptx
jayakumar703719
 
intro-entreprenuership.pdf
intro-entreprenuership.pdfintro-entreprenuership.pdf
intro-entreprenuership.pdf
jayakumar703719
 

More from jayakumar703719 (8)

pillars-deployment of SG.pptx
pillars-deployment of SG.pptxpillars-deployment of SG.pptx
pillars-deployment of SG.pptx
 
New Academic Year Decisions.pptx
New Academic Year Decisions.pptxNew Academic Year Decisions.pptx
New Academic Year Decisions.pptx
 
Lecture 8.pdf
Lecture 8.pdfLecture 8.pdf
Lecture 8.pdf
 
M2M.pptx
M2M.pptxM2M.pptx
M2M.pptx
 
Lect14-15 iotlevelsanddeploymenttemplates.pdf
Lect14-15 iotlevelsanddeploymenttemplates.pdfLect14-15 iotlevelsanddeploymenttemplates.pdf
Lect14-15 iotlevelsanddeploymenttemplates.pdf
 
M2M.pdf
M2M.pdfM2M.pdf
M2M.pdf
 
L1-Intro-IoT.pptx
L1-Intro-IoT.pptxL1-Intro-IoT.pptx
L1-Intro-IoT.pptx
 
intro-entreprenuership.pdf
intro-entreprenuership.pdfintro-entreprenuership.pdf
intro-entreprenuership.pdf
 

Recently uploaded

DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 

Recently uploaded (20)

DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 

cyber security-2.pptx

  • 2. Contents • Cyber security measures • Authentication • Attackers • Types of Attacks • Possible solutions to this attacks • Digital Signature • Smart Meters
  • 3. Security measures • Privacy : only the sender and intended receiver(s) can understand the content of a message. • Integrity : The message arrives in time at the receiver in exactly the same way it was sent. • Message authentication : The receiver can be sure of the sender’s identity and that the message does not come from an imposter. • Non-repudiation A receiver is able to prove that a message came from a specific sender and the sender is unable to deny sending the message.
  • 5. Types of Encryption • Symmetric key encryption - Substitution cipher - Transposition cipher - One-time pad • Public key encryption
  • 6. Substitution cipher • In this process each character is replaced by another character. • An example of a mapping in a substitution cipher system is shown below: • HELLO THERE will produce KQSSZ JKQFQ as Cipher text
  • 9. Digital signatures • A digital signature allows the signing of digital messages by the Sender in such a way that: • 1. The Receiver can verify the claimed identity of the Sender (authentication). • 2. The Receiver can prove and the Sender cannot deny that the message has been sent by the • specific user (non-repudiation). • 3. The Receiver cannot modify the message and claim that the modified message is the one that was received from the Sender. Types of digitally signing messages secret Key signature, public Key signature and the message digest.
  • 10. Authentication based on shared secret key
  • 11. Authentication based on shared secret key a) A indicates to B that it wishes to communicate with B and sends his identity with a large random number (NA) in Plain text. b) B encrypts NA using a secret Key known to A and B and sends Cipher text (EKAB (NA)) together with another large random number (NB) to A as Plain text. c) A decrypts the Cipher text received to check whether it gets the same number (NA) that he sent to B and encrypts the number NB using a shared secret Key and sends the Cipher text to B. d) B decrypts the received Cipher text using a shared secret Key and checks whether he gets the same number (NB) as that he sent.
  • 12. Authentication based on shared secret key
  • 13. Attackers & Types of Attack Attackers • script kiddies • elite hackers • Terrorists • employees, competitors, or customers
  • 14. Categories of Attacks • Component-wise • protocol-wise • topology-wise.
  • 15. Classification of Attacks 1) Malware spreading 2) Access through database links 3) Compromising communication equipment: 4) Injecting false information 5) Network Availability 6) Eavesdropping and traffic analysis 7) Modbus security issue
  • 16. Possible solution 1) Identity should be verified through strong authentication mechanisms. 2) Malware protection on both Embedded and General purpose systems. 3) Network Intrusion Prevention System (IPS) and Network Intrusion Detection System (IDS) defences to protect the system from outside and inside attacks. 4) Vulnerability assessments
  • 17. 5) To educate the network users about security best practices 6) Devices must know the sources and destinations they communicate with. 7) Devices should support Virtual Private Network (VPN) architectures for secure communication. 8) Devices must use Public key Infrastructure (PKI) to secure communication • From the huge amount of transferred data, utilities should only collect the data needed to achieve their goals. • Control system and IT security engineers should be equally involved in securing the smart grid network.
  • 18. © ABB Group December 8, 2022 | Slide 18 Cyber Security standards Standard Main Focus Status NIST SGIP-CSWG Smart Grid Interoperability Panel – Cyber Security Working Group On-going * NERC CIP NERC CIP Cyber Security regulation for North American power utilities Released, On-going * IEC 62351 Data and Communications Security Partly released, On-going * IEEE PSRC/H13 & SUB/C10 Cyber Security Requirements for Substation Automation, Protection and Control Systems On-going* IEEE 1686 IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities Finalized ISA S99 Industrial Automation and Control System Security Partly released, On-going *
  • 19. • Graphical representation of scope and completeness of Cyber Security for Substation Automation Standards and their scope
  • 20. Cyber Security for Substation Automation Relevant standards – NERC-CIP CIP 002 - Critical Cyber Asset Identification CIP 003 - Security Management Controls CIP 004 - Personnel and Training CIP 005 - Electronic Security Perimeter(s) CIP 006 - Physical Security of Critical Cyber Assets CIP 007 - Systems Security Management CIP 008 - Incident Reporting and Response Planning CIP 009 - Recovery Plans for Critical Cyber Asset