Protecting Infrastructure from Cyber AttacksMaurice Dawson
The Department of Homeland Security (DHS) has become more concerned with cyber attacks on infrastructure such as supervisory control and data acquisition (SCADA) systems. An attack in Iran has proven that the landscape of cyber warfare is continually evolving. As the SCADA systems are the systems that autonomously monitor and adjust switching among other processes within critical infrastructures such as nuclear plants, and power grids DHS has become concerned about these systems as they are unmanned frequently and remotely accessed. A vulnerability such as remote access could allow anyone to take control of assets to critical infrastructure remotely. There has been increasing mandates, and directives to ensure any system deployed meets stringent requirements. As the Stuxnet worm has become a reality, future attacks could be malicious code directly targeting specific locations of critical infrastructure. This paper will address methods to protect infrastructure from cyber attacks using a hybrid of certification & accreditation (C&A) processes and information assurance (IA) controls.
The growth of IoT is occurring at an incredible rate, justly raising alarms about IoT security and IoT privacy issues as we become increasingly reliant on these intelligent, interconnected devices in our lives and businesses. How are we to protect billions of devices from attacks and intrusions that could compromise our personal privacy, public safety, or business viability? Building an IoT solution involves securing sensors, devices, networks, cloud platforms, web applications, and mobile applications for diverse industries. This presentation examines the landscape of emerging security challenges posed by connected devices and offers a catalog of security deployment patterns that have been successfully used by some of the worlds most well known OEMs to deploy connected product fleets.
Protecting Infrastructure from Cyber AttacksMaurice Dawson
The Department of Homeland Security (DHS) has become more concerned with cyber attacks on infrastructure such as supervisory control and data acquisition (SCADA) systems. An attack in Iran has proven that the landscape of cyber warfare is continually evolving. As the SCADA systems are the systems that autonomously monitor and adjust switching among other processes within critical infrastructures such as nuclear plants, and power grids DHS has become concerned about these systems as they are unmanned frequently and remotely accessed. A vulnerability such as remote access could allow anyone to take control of assets to critical infrastructure remotely. There has been increasing mandates, and directives to ensure any system deployed meets stringent requirements. As the Stuxnet worm has become a reality, future attacks could be malicious code directly targeting specific locations of critical infrastructure. This paper will address methods to protect infrastructure from cyber attacks using a hybrid of certification & accreditation (C&A) processes and information assurance (IA) controls.
The growth of IoT is occurring at an incredible rate, justly raising alarms about IoT security and IoT privacy issues as we become increasingly reliant on these intelligent, interconnected devices in our lives and businesses. How are we to protect billions of devices from attacks and intrusions that could compromise our personal privacy, public safety, or business viability? Building an IoT solution involves securing sensors, devices, networks, cloud platforms, web applications, and mobile applications for diverse industries. This presentation examines the landscape of emerging security challenges posed by connected devices and offers a catalog of security deployment patterns that have been successfully used by some of the worlds most well known OEMs to deploy connected product fleets.
In today’s connected world, cyber security is a topic that nobody can afford to ignore. In recent years the number and frequency of attacks on industrial devices and other critical infrastructure has risen dramatically. Recent news stories about hackers shutting down critical infrastructure have left many companies wondering if they are vulnerable to similar attacks. In this webinar we will discuss the most common security threats and unique challenges in securing industrial networks. We will introduce the current standards and share some useful resources and best practices for addressing industrial cyber security.
Key Takeaways:
1. Gain perspective regarding common security threats facing industrial networks.
2. Learn about the relevant standards governing industrial cyber security.
3. Increase understanding of some best practices for securing industrial networks.
CyCron 1 is a cyber security-focused conference for the Industrial Control Systems.
The event will cater to the power generation, transmission and distribution, water
utilities, chemicals, oil and gas, pipelines, data centers, medical devices, energy,
utility transportation, manufacturing, and other industrial and critical
infrastructure organizations.
CyCron 1 will address the myriad cyber threats facing operators of ICS around the
world, and will address topics covering ICSs, including protection for SCADA
systems, plant control systems, engineering workstations, substation equipment,
programmable logic controllers (PLCs), and other field control system devices.
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...Byres Security Inc.
Eric Byres, CTO of Byres Security, presents the seven steps to industrial-strength security with Tofino™.
0:03 - Tofino - The Industrial Security Solution - Eric Byres gives a brief overview of some of the issues with today's firewalls, and introduces the Tofino Industrial Security Solution.
1:14 - Step 1: Plug and Play Installation - No plant downtime, No special training required for installation.
1:46 - Step 2: Discover Tofino - Have your Tofino report in with only a couple mouse clicks.
1:55 - Step 3: Customize Tofino - Deploy multiple security functions with one appliance.
2:11 - Step 4: Examine Your Network and Diagram it - Using Tofino allows you to map your network and build a diagram.
2:20 - Step 5: Command Your Tofino - Having specialized IT knowledge or command line programming is not required, and most human errors are avoided.
2:44 - Step 6: Test Mode - With test mode, there are no process upsets and traffic is allowed through, but Tofino notes which traffic would have been blocked based on the rules that were set.
3:05 - Step 7: Protect Your Plant - Protect your plant with no interruptions to the network and no downtime.
3:34 - Tofino Industrial Security Solution Key Components - Eric Byres explains the three key components - Security Appliances, Loadable Security Modules, and Central Management Platform.
European smart grid cyber and scada securityYulia Rotar
European Smart Grid Cyber and SCADA Security Conference by the SMi Group, London, UK, 10-11 March 2014.
Get in touch with us via mmalik@smi-online.co.uk
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
Industrial infrastructures are growing in size and complexity. And it’s all too clear that traditional enterprise IT solutions have not been successful in safeguarding them from
cyber-attack.
They do not meet the best-practice deep-packet inspection capability in the field, nor do they place an emphasis on zone protection network segmentation.
As well, they tend to focus on preventing loss of confidential information, rather than
what really matters in the industrial world – reliability and integrity of the system.In this architecture, a Cybridge is used as a one way content filter gateway which enables the extraction and export of protocol data and information from within the industrial networks, carried upon industrial protocols, to enterprise networks.
This allows safe and easy integration of the machine data coming from the SCADA
network in enterprise reporting and statistical services, within external or public networks without any Cyber-attacks apprehension.
Augmentation of a SCADA based firewall against foreign hacking devices IJECEIAES
An Industrial firewall is a system used to supervise and regulate traffic to and from a network for the purpose of securing appliances on a network. It analyzes the data passing through it to an already defined surveillance criteria or protocols, discarding data that does not meet the protocol’s requirements. In effect, it is a filter preventing undesirable network traffic and selectively limiting the type of transmission that occurs between a secured transmission line. In this research paper a SCADA based Firewall is implemented for protection of the data transmission to a PLC, against external hacking devices. This firewall is virtually exposed to several external hackers and the degree of vulnerability is carefully studied, in order to develop an ideal Firewall.
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
Do you have a GDPR Roadmap?
- How to measure Cybersecurity Preparedness
- Oversight of Third Parties
- Related International Standards
- Killing Cloud Quickly?
Technology aspects:
- International/EU PII Customer Case Studies
- Available Data Protection Options
- How to Integrate Security into Application Development
- Security Metrics
As the need for digital transformation continues, IoT development and adoption for both enterprises and consumers are also on the rise. One of the main challenges in allowing multiple device connectivity is cybersecurity. Here are the challenges enterprises are facing when ensuring security for their IoT connections.
Andrew Ginter, Waterfall's VP Industrial Security speaks to three networks at the DHS ICSJWG 2019 event in Springfield, MA. Secure sites, however, generally do not use three security standards - two are unavoidable and three is two too many.
In today’s connected world, cyber security is a topic that nobody can afford to ignore. In recent years the number and frequency of attacks on industrial devices and other critical infrastructure has risen dramatically. Recent news stories about hackers shutting down critical infrastructure have left many companies wondering if they are vulnerable to similar attacks. In this webinar we will discuss the most common security threats and unique challenges in securing industrial networks. We will introduce the current standards and share some useful resources and best practices for addressing industrial cyber security.
Key Takeaways:
1. Gain perspective regarding common security threats facing industrial networks.
2. Learn about the relevant standards governing industrial cyber security.
3. Increase understanding of some best practices for securing industrial networks.
CyCron 1 is a cyber security-focused conference for the Industrial Control Systems.
The event will cater to the power generation, transmission and distribution, water
utilities, chemicals, oil and gas, pipelines, data centers, medical devices, energy,
utility transportation, manufacturing, and other industrial and critical
infrastructure organizations.
CyCron 1 will address the myriad cyber threats facing operators of ICS around the
world, and will address topics covering ICSs, including protection for SCADA
systems, plant control systems, engineering workstations, substation equipment,
programmable logic controllers (PLCs), and other field control system devices.
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...Byres Security Inc.
Eric Byres, CTO of Byres Security, presents the seven steps to industrial-strength security with Tofino™.
0:03 - Tofino - The Industrial Security Solution - Eric Byres gives a brief overview of some of the issues with today's firewalls, and introduces the Tofino Industrial Security Solution.
1:14 - Step 1: Plug and Play Installation - No plant downtime, No special training required for installation.
1:46 - Step 2: Discover Tofino - Have your Tofino report in with only a couple mouse clicks.
1:55 - Step 3: Customize Tofino - Deploy multiple security functions with one appliance.
2:11 - Step 4: Examine Your Network and Diagram it - Using Tofino allows you to map your network and build a diagram.
2:20 - Step 5: Command Your Tofino - Having specialized IT knowledge or command line programming is not required, and most human errors are avoided.
2:44 - Step 6: Test Mode - With test mode, there are no process upsets and traffic is allowed through, but Tofino notes which traffic would have been blocked based on the rules that were set.
3:05 - Step 7: Protect Your Plant - Protect your plant with no interruptions to the network and no downtime.
3:34 - Tofino Industrial Security Solution Key Components - Eric Byres explains the three key components - Security Appliances, Loadable Security Modules, and Central Management Platform.
European smart grid cyber and scada securityYulia Rotar
European Smart Grid Cyber and SCADA Security Conference by the SMi Group, London, UK, 10-11 March 2014.
Get in touch with us via mmalik@smi-online.co.uk
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
Industrial infrastructures are growing in size and complexity. And it’s all too clear that traditional enterprise IT solutions have not been successful in safeguarding them from
cyber-attack.
They do not meet the best-practice deep-packet inspection capability in the field, nor do they place an emphasis on zone protection network segmentation.
As well, they tend to focus on preventing loss of confidential information, rather than
what really matters in the industrial world – reliability and integrity of the system.In this architecture, a Cybridge is used as a one way content filter gateway which enables the extraction and export of protocol data and information from within the industrial networks, carried upon industrial protocols, to enterprise networks.
This allows safe and easy integration of the machine data coming from the SCADA
network in enterprise reporting and statistical services, within external or public networks without any Cyber-attacks apprehension.
Augmentation of a SCADA based firewall against foreign hacking devices IJECEIAES
An Industrial firewall is a system used to supervise and regulate traffic to and from a network for the purpose of securing appliances on a network. It analyzes the data passing through it to an already defined surveillance criteria or protocols, discarding data that does not meet the protocol’s requirements. In effect, it is a filter preventing undesirable network traffic and selectively limiting the type of transmission that occurs between a secured transmission line. In this research paper a SCADA based Firewall is implemented for protection of the data transmission to a PLC, against external hacking devices. This firewall is virtually exposed to several external hackers and the degree of vulnerability is carefully studied, in order to develop an ideal Firewall.
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
Do you have a GDPR Roadmap?
- How to measure Cybersecurity Preparedness
- Oversight of Third Parties
- Related International Standards
- Killing Cloud Quickly?
Technology aspects:
- International/EU PII Customer Case Studies
- Available Data Protection Options
- How to Integrate Security into Application Development
- Security Metrics
As the need for digital transformation continues, IoT development and adoption for both enterprises and consumers are also on the rise. One of the main challenges in allowing multiple device connectivity is cybersecurity. Here are the challenges enterprises are facing when ensuring security for their IoT connections.
Andrew Ginter, Waterfall's VP Industrial Security speaks to three networks at the DHS ICSJWG 2019 event in Springfield, MA. Secure sites, however, generally do not use three security standards - two are unavoidable and three is two too many.
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
SUMMARY - Current power grids increasingly emerging into smart networked grids and are more accessible from the public internet which poses new cyber threats in the grid. More computer based systems are introduced into power networks in order to monitor and control the network. Future model smart grid and micro grid systems will be based on data flows for communication of system status, usage and control throughout the network infrastructure in addition to the power flow. This creates new security threats on the power grid. Instead of relying mainly on power plants for power generation, there will be a combination of multiple generation sources and at the same time wider use of electrical computer based equipment by consumers. Both increase the amount of data flows in the network as well as introduce additional vulnerable spots. Vulnerability of the power grid to cyber-attacks increases even more because of the wide use of SCADA networks. SCADA networks are more accessible to the internet and lack authentication and authorization mechanisms therefore expose the grid to threats such as DDOS, Data interception, Data alteration and additional hacking threats.
The transition from present to future model has already begun and rapidly growing while it already poses new security challenges which must be attended immediately. It is essential to introduce immediately a single comprehensive security solution which will provide fast detection and prevention tools to cope with a variety of threats with different nature and from multiple sources. The solution should not be tightly coupled with each device in the network so it won’t require upgrade of the devices inside the grid.
The Cyber defense solution should be versatile using variety of cyber technologies such as Firewalls, anomaly detection, Big Data analytics, machine learning and more in a network wise combination.
Securing Critical Infrastructures with a cybersecurity digital twin Massimiliano Masi
Critical Infrastructures are common targets for cyber-and-physical attacks. Smart Grids, Water Transport Systems, Railway, or Motorway witness an increase of malware and attacks partially due to the IT/OT convergence. Usually, critical infrastructures are composed by legacy software or hardware that cannot be easily patched or upgraded, facilitating the work of the attackers by exposing vulnerabilities solved in IT decades ago. Moreover, it is usually impossible to have a test system for such infrastructures, where a security countermeasure is evaluated for its impact. In fact, in OT systems, availability is of its utmost importance, thus adding a security countermeasure has to be carefully evaluated to not hinder such property. To overcome such shortcomings, digital twins are used. In this talk, it will be presented how digital twins specifically devised for cybersecurity are used for the evaluation of threats in cyber-and-physical systems in an industrial environment. In particular, it will be shown how a digital twin will be systematically derived from the Architectural representation of a real-world industrial system (the "collaborative intelligent transport system") and how the security measures are evaluated with an specific architectural view.
Recommended Solutions to Major Security Challenges Facing OT & IT Personnel w...Power System Operation
The electric power industry has come a long way since the 1900s, with respect to evolving from legacy analog devices to new and advanced digital technologies. “Today, microprocessor devices used by power utilities have advanced into smarter and more intelligent devices, known as intelligent electronic devices (IEDs). These IEDs aid power operators, technicians, and engineers in better decision making, offering more tools for controlling and monitoring power flow that can perform routine maintenance testing via remote control and automated functions. IEDs can detect and protect against various power fault and system disturbance scenarios along with providing power flow waveforms, metering data, and supervisory control and data acquisition (SCADA) functionality.” [1]
As power control systems and operational technology (OT) systems continue to progress so does their dependence on information technology (IT) systems for communications and enterprise network connectivity. The OT world of SCADA and control systems for power substations continues to evolve with more influence, products and services from the IT world. The need for a unified cyber/physical security approach within the smart substation environment that protects the overall goal of safely delivering electric power to customers is not only a laudable goal, but an absolute requirement as the two traditional OT and IT environments start to become a single solution. The OT and IT convergence are a reality due to the integrated and complex computing e.g. networking and communications taking place within OT environments. This paper reviews some of the major security challenges facing OT and IT convergence with power utilities, particularly within smart grid (SG) and smart substation environments. Also, recommendations are provided for implementing and maintaining proper security controls in the new combined OT/IT environment.
Threats to industrial control systems are on the rise. This briefing explores potential threats and vulnerabilities as well as what organizations can do to guard against them.
This primary focus of study was to investigate how cyber risks in ICT infrastructures of supply chains are managed. As its theoretical base, the study used the Adaptive Security Architecture framework that has been employed by most IT security specialists. Five experienced IT experts participated in a semi-structured interview to provide practical insights on the state of cybersecurity in supply chains operations from various industries. Their responses were analyzed based on the four stages of prediction, prevention, detection and response.
This study offers a new framework that suggests cybersecurity requires anticipatory vigilance, profiling malevolence, instantaneous response and uncompromised recovery to dealing with the cyber threats posing disruptions to supply chains.
Iot Cyber Security & Vulnerabilities Challenges and Opportunities in Security of Internet of Things
Security is the Key
Inherent Security Challenges
Threat Spectrum – Trends
Securing the “Things”
IoT Cybersecurity – Security Triad
Threat Model
Availability threats
Integrity threats
Authenticity threats
Confidentiality threats
Non-repudiation/accountability threats
Become the best version of most in-demand cybersecurity experts with the best cybersecurity certifications to guide OT security frameworks. Foresee cybersecurity threats as a specialized OT security professional and gain big!
Read more: https://shorturl.at/jsuGS
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
Varsha Sewlal
Executive Legal & Deputy Information Officer, Railway Safety Regulator on Cyber Attacks on Critical Infrastructure at Public Sector Cybersecurity Summit 2024. #PublicSec2024
Similar to How to protect energy distribution for millions of people against cyber attacks (real case) (20)
Em 2020 o mundo experimentou uma situação inédita para a maioria dos seres humanos: uma pandemia global, provocada por um vírus desconhecido, que gerou mudanças significativas na vida de todos. No universo das empresas, foi observado um movimento de intensa digitalização de processos e adequação ao distanciamento social. Muitas delas, inclusive as indústrias, adotaram o trabalho remoto para seus colaboradores. Conforme as empresas adaptaram as suas operações, os criminosos também estabeleceram mudanças. São facilmente encontradas notícias relativas a golpes por email, WhatsApp e telefone. E com “chave de ouro”, 2021 foi aberto com o mega (ou seriaTera?) vazamento de dados de brasileiros, o que fornece mais combustível para esses golpes. O ICS-SOC (Centro de Operações de Segurança Cibernética Industrial, localizado no Rio de Janeiro) da TI Safe protege seus clientes contra ataques cibernéticos que possam afetar suas operações, fundamentais para a população e a cadeia de suprimentos do Brasil.Os dados de (milhões de) ataques de 2020, relativos a projetos desenvolvidos pela empresa, foram analisados para entender o aumento dos ataques em relação a 2019. Por uma questão de privacidade dos dados dos clientes, as informações serão apresentadas em percentuais.
Opendatabay - Open Data Marketplace.pptxOpendatabay
Opendatabay.com unlocks the power of data for everyone. Open Data Marketplace fosters a collaborative hub for data enthusiasts to explore, share, and contribute to a vast collection of datasets.
First ever open hub for data enthusiasts to collaborate and innovate. A platform to explore, share, and contribute to a vast collection of datasets. Through robust quality control and innovative technologies like blockchain verification, opendatabay ensures the authenticity and reliability of datasets, empowering users to make data-driven decisions with confidence. Leverage cutting-edge AI technologies to enhance the data exploration, analysis, and discovery experience.
From intelligent search and recommendations to automated data productisation and quotation, Opendatabay AI-driven features streamline the data workflow. Finding the data you need shouldn't be a complex. Opendatabay simplifies the data acquisition process with an intuitive interface and robust search tools. Effortlessly explore, discover, and access the data you need, allowing you to focus on extracting valuable insights. Opendatabay breaks new ground with a dedicated, AI-generated, synthetic datasets.
Leverage these privacy-preserving datasets for training and testing AI models without compromising sensitive information. Opendatabay prioritizes transparency by providing detailed metadata, provenance information, and usage guidelines for each dataset, ensuring users have a comprehensive understanding of the data they're working with. By leveraging a powerful combination of distributed ledger technology and rigorous third-party audits Opendatabay ensures the authenticity and reliability of every dataset. Security is at the core of Opendatabay. Marketplace implements stringent security measures, including encryption, access controls, and regular vulnerability assessments, to safeguard your data and protect your privacy.
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...pchutichetpong
M Capital Group (“MCG”) expects to see demand and the changing evolution of supply, facilitated through institutional investment rotation out of offices and into work from home (“WFH”), while the ever-expanding need for data storage as global internet usage expands, with experts predicting 5.3 billion users by 2023. These market factors will be underpinned by technological changes, such as progressing cloud services and edge sites, allowing the industry to see strong expected annual growth of 13% over the next 4 years.
Whilst competitive headwinds remain, represented through the recent second bankruptcy filing of Sungard, which blames “COVID-19 and other macroeconomic trends including delayed customer spending decisions, insourcing and reductions in IT spending, energy inflation and reduction in demand for certain services”, the industry has seen key adjustments, where MCG believes that engineering cost management and technological innovation will be paramount to success.
MCG reports that the more favorable market conditions expected over the next few years, helped by the winding down of pandemic restrictions and a hybrid working environment will be driving market momentum forward. The continuous injection of capital by alternative investment firms, as well as the growing infrastructural investment from cloud service providers and social media companies, whose revenues are expected to grow over 3.6x larger by value in 2026, will likely help propel center provision and innovation. These factors paint a promising picture for the industry players that offset rising input costs and adapt to new technologies.
According to M Capital Group: “Specifically, the long-term cost-saving opportunities available from the rise of remote managing will likely aid value growth for the industry. Through margin optimization and further availability of capital for reinvestment, strong players will maintain their competitive foothold, while weaker players exit the market to balance supply and demand.”
Show drafts
volume_up
Empowering the Data Analytics Ecosystem: A Laser Focus on Value
The data analytics ecosystem thrives when every component functions at its peak, unlocking the true potential of data. Here's a laser focus on key areas for an empowered ecosystem:
1. Democratize Access, Not Data:
Granular Access Controls: Provide users with self-service tools tailored to their specific needs, preventing data overload and misuse.
Data Catalogs: Implement robust data catalogs for easy discovery and understanding of available data sources.
2. Foster Collaboration with Clear Roles:
Data Mesh Architecture: Break down data silos by creating a distributed data ownership model with clear ownership and responsibilities.
Collaborative Workspaces: Utilize interactive platforms where data scientists, analysts, and domain experts can work seamlessly together.
3. Leverage Advanced Analytics Strategically:
AI-powered Automation: Automate repetitive tasks like data cleaning and feature engineering, freeing up data talent for higher-level analysis.
Right-Tool Selection: Strategically choose the most effective advanced analytics techniques (e.g., AI, ML) based on specific business problems.
4. Prioritize Data Quality with Automation:
Automated Data Validation: Implement automated data quality checks to identify and rectify errors at the source, minimizing downstream issues.
Data Lineage Tracking: Track the flow of data throughout the ecosystem, ensuring transparency and facilitating root cause analysis for errors.
5. Cultivate a Data-Driven Mindset:
Metrics-Driven Performance Management: Align KPIs and performance metrics with data-driven insights to ensure actionable decision making.
Data Storytelling Workshops: Equip stakeholders with the skills to translate complex data findings into compelling narratives that drive action.
Benefits of a Precise Ecosystem:
Sharpened Focus: Precise access and clear roles ensure everyone works with the most relevant data, maximizing efficiency.
Actionable Insights: Strategic analytics and automated quality checks lead to more reliable and actionable data insights.
Continuous Improvement: Data-driven performance management fosters a culture of learning and continuous improvement.
Sustainable Growth: Empowered by data, organizations can make informed decisions to drive sustainable growth and innovation.
By focusing on these precise actions, organizations can create an empowered data analytics ecosystem that delivers real value by driving data-driven decisions and maximizing the return on their data investment.
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
How to protect energy distribution for millions of people against cyber attacks (real case)
1. How to protect energy
distribution for millions of
people against cyber attacks
Case study
Thiago Branquinho
CTO & Founder
TI Safe
2. Thiago Branquinho – CTO, TI Safe
Critical
infrastructures
defender
Biologist
Information
Systems
Auditor
FIFA World
CUP 2014
Planner
Maker
Sustainability
activist
Origamist
5. Intrinsic issues of Electrical Systems
Variable and seasonal
Consumption, with
increasing trend
Subject to contingencies
and emergencies
Faults and defects in
equipment
Faults and short circuits
Maneuvers and topology
changes
Changes in the
availability of the energy
matrix
Changes in consumption
Events and disturbances
of varying duration, of
scheduled or sudden
occurrence
(unpredictable)
Other numerous
technical, financial and
legal issues (operational
margins, economic
operation, contracts)
6. Automation to minimize issues
• Protection
• Command
• Control
• Measurement
• Supervision
These functions
have specific
requirements
(e.g. response
time)
Automation
becomes
crucial
7. Electric power processes digitalization
Generation
•Measurements, command,
control and protection
•Alarms and Event Logging
Supervision and monitoring of
equipment status
•Start, stop, synchronization of
generator sets
•Supervision and control of the
elevating substation
•Dispatch of the plant (joint or
individual control):
•active power
•voltage / reactive
•Automatic spillway operation
•Hydro-energy programming,
flood and flow forecasting
Transmission
•Measurements, command,
control and protection
•Alarms and Event Logging
Supervision and monitoring of
equipment status
•Load Forecasting and Selective
Cutting
•Power Flow Control
•State Estimators
•Contingency analysis (safety
analysis)
•Optimization of generation and
transmission
•Coordination of maintenance,
etc.
Distribution
•Command, control and
protection
•Measurements, billing and
billing
•Supervision and monitoring of
equipment and network status
•Engineering, planning and
network expansion
•Control of voltage and quality of
energy
•Load maneuvering and
rearrangement
•Coordination of maintenance,
location and defect repair
•Maintenance of network and
consumption database and
maps
•Customer service (links, support
and billing)
10. Electricity is the core of the critical infrastructure
Verner, Duane, Frederic Petit, and Kibaek Kim. “Incorporating Prioritization in Critical Infrastructure Security and Resilience Programs.”
Homeland Security Affairs 13, Article 7 (October 2017). https://www.hsaj.org/articles/14091
11. Who will be the next attacker?
http://energyskeptic.com/2014/terrorism-and-the-electric-power-grid/
12. In 2016 alone, the US Department of Homeland
Security Industrial Control Systems Cyber
Emergency Response Team responded to 290
incidents, including 63 in the critical
manufacturing sector, and 59 in the energy sector
More than one quarter of the incidents related to so-called
spear phishing attacks, which involve sending fraudulent
email in order to entice someone into disclosing confidential
information.
15. TI Safe’s ICS-SOC coverage
~40 million people
living on these
brazilian states
Map by Ricardo Marins Rosa - Own work, CC BY-SA 4.0,
httpscommons.wikimedia.orgwindex.phpcurid=58541820
16. TI Safe’s ICS-SOC (Industrial Control Systems – Security Operations Centre)
TI Safe's ICS-SOC integrates cyber
security functions with industrial
processes monitoring. It is a prepared
structure equipped to anticipate,
prevent, defend and respond to cyber
attacks against critical infrastructures.
Continuous
monitoring
Risk
managemtn
Cyber
intelligence
17. The focus is to predict
and prevent disruptive
incidents
Otherwise the infrastructure may not survive!
18. ICS-SOC main activities
Prevent Detect RespondPredict
Intelligence
The ICS-SOC expert
team with the support of
artificial intelligence
infers how the next
attacks will be and
establish measures to
prevent them in our
clients
cybersecurity
technologies protect the
environment and
provides occurrences
logs Non-compliances are
handled by the customer
in a manual or
automated manner
Good morning ladies and gentlemen!
I am Thiago Branquinho and I came here to present you how to protect energy distribution for millions of people against cyber attacks.
This lecture is based on our daily activities in our ICS-SOC at TI Safe
First, I would like to introduce myself. I am CTO of TI Safe.
In more than 20 years of work experience I did a lot of different things, as you can see here.
But today I am bringing my Critical Infrastructures Defender alter-ego.
Let’s start from the beggining.
I would like to bring you an overview of Electrical Power Systems
So, there are three main componentes: generation, transmission and distribution, until get to the end users for energy consumption.
These environments, by themselves, have a lot of intrinsic issues to be addressed.
For example, faults and defects in equipments, maneuvers to adapt to changes in the consumption profile and many other issues.
Thus, automation becomes crucial to minimize issues.
Functions as electric protection, command and control, measurement, and operational supervision have specific requirements to be addressed.
And only automation can save it.
Just to illustrate, I brought a non-exaustive list of activities usually automated on the electric power systems.
It is, definetely, a lot of digitalization.
But here comes an alert.
Since we have become higly dependent on automated systems, it is not possible to go back on non-digital fashion and live our normal life.
Thus, the affirmative: Digitalization without cybersecurity jeopardizes mankind.
And electricity is the core of the critical infrastructure. Almost everything depends on electric power nowadays. And everyone here in this room is plenty of sure that light will always shine when we flip the switch.
The point is... Who will be the next attacker? Can be anyone, including your brand new IoT device if misprogrammed.
We know that there are targetted attacks. But since the complexity of security tools is lowering down, anyone can become the next attacker.
As an expression of this, in 2016 the US Department of Homeland Security for Industrial Control Systems Cyber Emergency response Team responded to 290 incidentes, including 59 in the energy sector.
One quarter of the incidents involved fraudulent e-mail on spear phishing attacks.
So... How to protect the electrical power systems?
I would like to bring some reflection here...
If we create a direct analogy between Maslow’s hierarchy of human needs to the industry 4.0, we can include the top of the piramid the beautiful components that we all love to see. Integrated systems, 5G, 3D printers, artificial intelligence, robots, drones and anything else.
But we cannot forget that the basis of the piramid is the physiological needs and safety. It is exactly on the base where ICS cybersecurity resides.
So, if you consider stepping into the forth industrial revolution, I strongly recommend you to plug in security constrains prior to move forward.