SlideShare a Scribd company logo
1 of 18
Security Optimization For the Digital Oilfield
EntNet 2008 Panel On Communication Networks For Oil, Gas,
Energy and Casino Industries
Raife F. Smith II, Ph.D., P.E.
Professor
Department of Electrical Engineering
Southern University, Baton Rouge, LA
Security Optimization For the Digital Oilfield
The oil and gas industry relies on a wide variety of
information and communications technologies (ICT) to
meet its requirements for automation, surveillance,
security and information transfer.
Security Optimization For the Digital Oilfield
The “Digital Oilfield” (“eField”, “iField”, “SmartField”) is
increasingly seen as the best way for oil and gas companies
to reduce lifting costs and dramatically improve recovery
and safety, and enhance employee retention and job
satisfaction.
Security Optimization For the Digital Oilfield
What exactly is the “Digital Oilfield” or “Digital Oilfield
of The Future (DOFF)?
Digital Oilfield is the evolution and convergence of a
number of oil and gas drilling, exploration, and digital
control techniques coupled with standardized
communication technologies.
Security Optimization For the Digital Oilfield
The technologies associated with Digital Oilfields, most of
which are based on Internet Protocol (IP) and wireless
communications, allow real-time production and equipment
data to be viewed in locations many hundreds, or even
thousands of miles away.
Security Optimization For the Digital Oilfield
Digital Oilfield Technology has the potential of bringing
real-time data to many part of the business, potentially
allowing more informed trading and risk management and
potentially more informed decisions where other parts of the
business depend on either the volume or quality of the oil or
gas being exported.
Security Optimization For the Digital Oilfield
Digital Oilfield Technology has the potential to allow much
closer integration between company subject matter experts,
and local assets.
Often access to deep subject matter expertise lies with
“gurus” within a centralized function, or is dispersed around
the company. Perversely this often has the impact of
removing such expertise from the place where it is most
needed.
Security Optimization For the Digital Oilfield
The “Digital Oilfield” (“eField”, “iField”, “SmartField”)
offers much promise for higher levels of automation and
information transfer, but it comes with a price.
As more “intelligence” is deployed into the field, the
opportunity for compromise, distributed error and sabotage
rises exponentially.
Security Optimization For the Digital Oilfield
Often, the excitement over a new technological
concept’s benefits overshadows proper concern for its
vulnerabilities and shortcomings.
Security Optimization For the Digital Oilfield
As oilfield operations become more and more integrated
by information and communications technology, care
must be taken to minimize the effects of adverse
conditions (e.g. viruses, misappropriation of data from
within and from outside the network, etc.).
Security Optimization For the Digital Oilfield
The challenge is to maintain a high degree of
service and interoperability while optimizing
security.
Security Optimization For the Digital Oilfield
Security Vulnerabilities For The Digital Oilfield
1. Growing attack sophistication.
2. Lack of employee adherence to security policy.
3. Increasing complexity of security solutions.
Security Optimization For the Digital Oilfield
Security Vulnerabilities For The Digital Oilfield
4. Managing increasing network traffic. The larger
the enterprise, the greater the risk posed by
internal sources.
5. Insider abuse of network access.
6. Managing vendor access to the network.
Security Optimization For the Digital Oilfield
The best practices developed for perimeter (edge)
security still apply, but they must now be deployed
more pervasively and become an integral part of a
new distributed, dynamic network architecture.
Security Optimization For the Digital Oilfield
For optimal security, the Digital Oilfield
administrator(s) must:
1. Strictly control individual user access to network
services and data.
2. Audit the behavior of individual users in real
time to ensure compliance with security policies
and regulations.
Security Optimization For the Digital Oilfield
For optimal security, the Digital Oilfield
administrator(s) must:
3. Implement a strict network partitioning scheme
(domain allocation) with appropriate traffic routing
(traffic directionality) and policies for threat
containment.
4. Rigorously manage the network’s topology (physical
arrangement) and growth and contraction (size).
Security Optimization For the Digital Oilfield
For optimal security, the Digital Oilfield
administrator(s) must:
5. Implement a thorough test and evaluation plan (for
both performance and potential security risk) for new
information and communications technologies that
are under consideration for deployment.
Security Optimization For the Digital Oilfield
Questions?

More Related Content

Similar to Smith EntNet2008 Slides.ppt

Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEY
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - mediumusmsystem
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 James Nesbitt
 
Securing chemical production and digital networks
Securing chemical production and digital networksSecuring chemical production and digital networks
Securing chemical production and digital networksSleepros
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations♟Sergej Epp
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Jack Shaffer
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetHarry Gunns
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingBryan Len
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 

Similar to Smith EntNet2008 Slides.ppt (20)

Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architecture
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - medium
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
Securing chemical production and digital networks
Securing chemical production and digital networksSecuring chemical production and digital networks
Securing chemical production and digital networks
 
16231
1623116231
16231
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex Training
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 

Smith EntNet2008 Slides.ppt

  • 1. Security Optimization For the Digital Oilfield EntNet 2008 Panel On Communication Networks For Oil, Gas, Energy and Casino Industries Raife F. Smith II, Ph.D., P.E. Professor Department of Electrical Engineering Southern University, Baton Rouge, LA
  • 2. Security Optimization For the Digital Oilfield The oil and gas industry relies on a wide variety of information and communications technologies (ICT) to meet its requirements for automation, surveillance, security and information transfer.
  • 3. Security Optimization For the Digital Oilfield The “Digital Oilfield” (“eField”, “iField”, “SmartField”) is increasingly seen as the best way for oil and gas companies to reduce lifting costs and dramatically improve recovery and safety, and enhance employee retention and job satisfaction.
  • 4. Security Optimization For the Digital Oilfield What exactly is the “Digital Oilfield” or “Digital Oilfield of The Future (DOFF)? Digital Oilfield is the evolution and convergence of a number of oil and gas drilling, exploration, and digital control techniques coupled with standardized communication technologies.
  • 5. Security Optimization For the Digital Oilfield The technologies associated with Digital Oilfields, most of which are based on Internet Protocol (IP) and wireless communications, allow real-time production and equipment data to be viewed in locations many hundreds, or even thousands of miles away.
  • 6. Security Optimization For the Digital Oilfield Digital Oilfield Technology has the potential of bringing real-time data to many part of the business, potentially allowing more informed trading and risk management and potentially more informed decisions where other parts of the business depend on either the volume or quality of the oil or gas being exported.
  • 7. Security Optimization For the Digital Oilfield Digital Oilfield Technology has the potential to allow much closer integration between company subject matter experts, and local assets. Often access to deep subject matter expertise lies with “gurus” within a centralized function, or is dispersed around the company. Perversely this often has the impact of removing such expertise from the place where it is most needed.
  • 8. Security Optimization For the Digital Oilfield The “Digital Oilfield” (“eField”, “iField”, “SmartField”) offers much promise for higher levels of automation and information transfer, but it comes with a price. As more “intelligence” is deployed into the field, the opportunity for compromise, distributed error and sabotage rises exponentially.
  • 9. Security Optimization For the Digital Oilfield Often, the excitement over a new technological concept’s benefits overshadows proper concern for its vulnerabilities and shortcomings.
  • 10. Security Optimization For the Digital Oilfield As oilfield operations become more and more integrated by information and communications technology, care must be taken to minimize the effects of adverse conditions (e.g. viruses, misappropriation of data from within and from outside the network, etc.).
  • 11. Security Optimization For the Digital Oilfield The challenge is to maintain a high degree of service and interoperability while optimizing security.
  • 12. Security Optimization For the Digital Oilfield Security Vulnerabilities For The Digital Oilfield 1. Growing attack sophistication. 2. Lack of employee adherence to security policy. 3. Increasing complexity of security solutions.
  • 13. Security Optimization For the Digital Oilfield Security Vulnerabilities For The Digital Oilfield 4. Managing increasing network traffic. The larger the enterprise, the greater the risk posed by internal sources. 5. Insider abuse of network access. 6. Managing vendor access to the network.
  • 14. Security Optimization For the Digital Oilfield The best practices developed for perimeter (edge) security still apply, but they must now be deployed more pervasively and become an integral part of a new distributed, dynamic network architecture.
  • 15. Security Optimization For the Digital Oilfield For optimal security, the Digital Oilfield administrator(s) must: 1. Strictly control individual user access to network services and data. 2. Audit the behavior of individual users in real time to ensure compliance with security policies and regulations.
  • 16. Security Optimization For the Digital Oilfield For optimal security, the Digital Oilfield administrator(s) must: 3. Implement a strict network partitioning scheme (domain allocation) with appropriate traffic routing (traffic directionality) and policies for threat containment. 4. Rigorously manage the network’s topology (physical arrangement) and growth and contraction (size).
  • 17. Security Optimization For the Digital Oilfield For optimal security, the Digital Oilfield administrator(s) must: 5. Implement a thorough test and evaluation plan (for both performance and potential security risk) for new information and communications technologies that are under consideration for deployment.
  • 18. Security Optimization For the Digital Oilfield Questions?