SlideShare a Scribd company logo
1 of 25
SCADA security, 2013 Slide 1
SCADA systems security
SCADA security, 2013 Slide 2
24/7 infrastructure availability
• The infrastructure controlled by SCADA
systems and PLCs often has to be
continuously available and must operate as
expected
SCADA security, 2013 Slide 3
Continuous operation
• In some cases, it may
be very disruptive to
switch off PLC-
controlled equipment
as it is impossible to
predict when the
system will be required
SCADA security, 2013 Slide 4
Critical SCADA systems
• Failure of controlled systems can lead to
direct loss of life due to equipment failure or
indirect losses due to failure of the critical
infrastructure controlled by SCADA systems
• SCADA must therefore be dependable
– Safety and reliability
– Security
SCADA security, 2013 Slide 5
SCADA safety and reliability
• SCADA safety and reliability
– Needs specific safety analysis techniques for
PLCs because they are programmed in a
different way (ladder logic)
– SCADA systems are designed with
redundancy and backup, which contributes to
the availability of these systems
SCADA security, 2013 Slide 6
SCADA security
SCADA security, 2013 Slide 7
SCADA legacy systems
• Security through isolation
– SCADA systems, historically, were unconcerned
with security because they were isolated systems
• Security through obscurity
– Non-standard programming languages and
protocols used.
SCADA security, 2013 Slide 8
Security through isolation
• If a system is not connected to the
Internet, then it cannot be penetrated by
attacks from the Internet
• This is the so-called ‘air gap’ between the
SCADA system and the rest of the world
SCADA security, 2013 Slide 9
Maroochy Water Breach
• The Maroochy Water Breach (see video) was a
cyberattack on a sewage treatment system in
Australia carried out by an insider
SCADA security, 2013 Slide 10
Security through obscurity
• Approach to security that is based on the fact
that information about a system is not widely
known or available so the assumption is that
few people can successfully attack the
system from outside
SCADA security, 2013 Slide 11
Security through obscurity
• Susceptible to insider attack from those who
know the information inside the organization
• SCADA systems are sold globally – therefore
information is available to other countries who
may be potentially hostile
• Information on SCADA systems can be stolen
and used by attackers
SCADA security, 2013 Slide 12
SCADA connectivity
• 3rd generation SCADA systems are now
reliant on standard IT technologies and
protocols (Microsoft Windows, TCP/IP,
web browsers, organisational wireless
networks, etc.)
• Integrated with older SCADA systems
SCADA security, 2013 Slide 13
Internet-based SCADA
SCADA security, 2013 Slide 14
SCADA legacy systems
• There are a huge number of 2nd generation SCADA
systems that are still in use and are likely to remain in use
for many years
– Infrastructure systems can have a 20+ year lifetime
• However, these are now being ‘updated’ with new
equipment which is network-connected
• These older legacy systems were developed without
security awareness and so are particularly vulnerable to
attack
SCADA security, 2013 Slide 15
The myth of the ‘air gap’
• Direct connections to vendors for
maintenance, stock ordering etc.
• Connected to enterprise systems,
which in turn are on the Internet.
SCADA security, 2013 Slide 16
The myth of the air gap
• PCs used by operators may be multi-
functional and internet connected
• Operators transfer information using
USB drives
SCADA security, 2013 Slide 17
SCADA vulnerabilities
SCADA security, 2013 Slide 18
SCADA security vulnerabilities
• Weak passwords
• Open to port scanning to discover SCADA systems
on network
• Lack of input validation –buffer overflow and SQL
poisoning
• Unencrypted network traffic
SCADA security, 2013 Slide 19
SCADA security challenges
• SCADA systems and PLC software is normally
developed by engineering companies with very
limited experience of developing secure systems
• The system developers are usually domain experts
(oil and gas engineers, power engineers, etc.) rather
than software engineers.
• They may have had no training in security
techniques.
SCADA security, 2013 Slide 20
SCADA security challenges
• Not always possible to use standard security
tools and techniques:
– It may not be possible to install anti-virus
protection on process control systems,
owing to the lack of processor power on
legacy systems, the age of operating
systems or the lack of vendor certification.
SCADA security, 2013 Slide 21
SCADA security challenges
• Security testing on process control systems
must also be approached with extreme
caution – security scanning can seriously
affect the operation of many control devices.
• There are sometimes few opportunities to
take the systems off-line for routine testing,
patching and maintenance.
SCADA security, 2013 Slide 22
Improving SCADA security
• Government and industry reports to raise
awareness of SCADA security issues
• Establishment of bodies specifically concerned
with infrastructure protection who can advise on
SCADA system security
SCADA security, 2013 Slide 23
Improving SCADA security
• Better security education and training for SCADA
developers
• Need for regulators to become involved – security
certification
SCADA security, 2013 Slide 24
© David Shankbone 2012
SCADA security, 2013 Slide 25
Summary
• Government organisations are seriously concerned
about the vulnerability of SCADA systems to
cyberattacks and the consequences for our national
infrastructure
• SCADA systems connected to internet so vulnerable to
external attack
• SCADA systems are often old systems that were built
without security concerns – therefore are vulnerable to
external attack

More Related Content

What's hot

Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013scttmcvy
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Yokogawa1
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewNaresh Rao
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToJim Gilsinn
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseChris Sistrunk
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityChris Sistrunk
 
Industrial Security.pdf
Industrial Security.pdfIndustrial Security.pdf
Industrial Security.pdfAhmedRKhan
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskMighty Guides, Inc.
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 

What's hot (20)

Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
SCADA Security
SCADA SecuritySCADA Security
SCADA Security
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
ICS security
ICS securityICS security
ICS security
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
Industrial Security.pdf
Industrial Security.pdfIndustrial Security.pdf
Industrial Security.pdf
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity Risk
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 

Similar to Scada security

LIBRARY RESEARCH PROJECT SECURITY CONTROL IN SCADA
LIBRARY RESEARCH  PROJECT SECURITY CONTROL IN SCADALIBRARY RESEARCH  PROJECT SECURITY CONTROL IN SCADA
LIBRARY RESEARCH PROJECT SECURITY CONTROL IN SCADASonuSingh81247
 
LIBRARY RESEARCH PROJECT cyber security control inSCAD.ppt
LIBRARY RESEARCH  PROJECT cyber security control inSCAD.pptLIBRARY RESEARCH  PROJECT cyber security control inSCAD.ppt
LIBRARY RESEARCH PROJECT cyber security control inSCAD.pptSonuSingh81247
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security TrainingBryan Len
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...TI Safe
 
SCADA Systems and its security!
SCADA Systems and its security!SCADA Systems and its security!
SCADA Systems and its security!Shiv Sahni
 
SCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesSCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesFitCEO, Inc. (FCI)
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...EC-Council
 
Scada Basic Training
Scada Basic TrainingScada Basic Training
Scada Basic TrainingSagar Ghadge
 
Session 17 - SCADA Introduction
Session 17 - SCADA IntroductionSession 17 - SCADA Introduction
Session 17 - SCADA IntroductionVidyaIA
 
Training manual on scada
Training manual on scadaTraining manual on scada
Training manual on scadabhavuksharma10
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration TestingAhmed Sherif
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 

Similar to Scada security (20)

Introducing scada
Introducing scadaIntroducing scada
Introducing scada
 
LIBRARY RESEARCH PROJECT SECURITY CONTROL IN SCADA
LIBRARY RESEARCH  PROJECT SECURITY CONTROL IN SCADALIBRARY RESEARCH  PROJECT SECURITY CONTROL IN SCADA
LIBRARY RESEARCH PROJECT SECURITY CONTROL IN SCADA
 
LIBRARY RESEARCH PROJECT cyber security control inSCAD.ppt
LIBRARY RESEARCH  PROJECT cyber security control inSCAD.pptLIBRARY RESEARCH  PROJECT cyber security control inSCAD.ppt
LIBRARY RESEARCH PROJECT cyber security control inSCAD.ppt
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
 
SCADA Systems and its security!
SCADA Systems and its security!SCADA Systems and its security!
SCADA Systems and its security!
 
Why SIL3 (ENG)
Why SIL3 (ENG)Why SIL3 (ENG)
Why SIL3 (ENG)
 
SCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesSCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US Utilities
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
 
Scada Basic Training
Scada Basic TrainingScada Basic Training
Scada Basic Training
 
Session 17 - SCADA Introduction
Session 17 - SCADA IntroductionSession 17 - SCADA Introduction
Session 17 - SCADA Introduction
 
SCADA Introduction
SCADA IntroductionSCADA Introduction
SCADA Introduction
 
Training manual on scada
Training manual on scadaTraining manual on scada
Training manual on scada
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration Testing
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 

More from sommerville-videos

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systemssommerville-videos
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems scriptsommerville-videos
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classificationsommerville-videos
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systemssommerville-videos
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systemssommerville-videos
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processessommerville-videos
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activitiessommerville-videos
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineeringsommerville-videos
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernssommerville-videos
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processessommerville-videos
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challengessommerville-videos
 

More from sommerville-videos (20)

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classification
 
Reuse landscape
Reuse landscapeReuse landscape
Reuse landscape
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systems
 
Scaling agile
Scaling agileScaling agile
Scaling agile
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
User stories
User storiesUser stories
User stories
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processes
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineering
 
Why se script
Why se scriptWhy se script
Why se script
 
Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
Airbus Flight Control System
Airbus Flight Control SystemAirbus Flight Control System
Airbus Flight Control System
 
Warsaw airbus accident
Warsaw airbus accidentWarsaw airbus accident
Warsaw airbus accident
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concerns
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processes
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
 
Intro to requirements eng.
Intro to requirements eng.Intro to requirements eng.
Intro to requirements eng.
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Scada security

  • 1. SCADA security, 2013 Slide 1 SCADA systems security
  • 2. SCADA security, 2013 Slide 2 24/7 infrastructure availability • The infrastructure controlled by SCADA systems and PLCs often has to be continuously available and must operate as expected
  • 3. SCADA security, 2013 Slide 3 Continuous operation • In some cases, it may be very disruptive to switch off PLC- controlled equipment as it is impossible to predict when the system will be required
  • 4. SCADA security, 2013 Slide 4 Critical SCADA systems • Failure of controlled systems can lead to direct loss of life due to equipment failure or indirect losses due to failure of the critical infrastructure controlled by SCADA systems • SCADA must therefore be dependable – Safety and reliability – Security
  • 5. SCADA security, 2013 Slide 5 SCADA safety and reliability • SCADA safety and reliability – Needs specific safety analysis techniques for PLCs because they are programmed in a different way (ladder logic) – SCADA systems are designed with redundancy and backup, which contributes to the availability of these systems
  • 6. SCADA security, 2013 Slide 6 SCADA security
  • 7. SCADA security, 2013 Slide 7 SCADA legacy systems • Security through isolation – SCADA systems, historically, were unconcerned with security because they were isolated systems • Security through obscurity – Non-standard programming languages and protocols used.
  • 8. SCADA security, 2013 Slide 8 Security through isolation • If a system is not connected to the Internet, then it cannot be penetrated by attacks from the Internet • This is the so-called ‘air gap’ between the SCADA system and the rest of the world
  • 9. SCADA security, 2013 Slide 9 Maroochy Water Breach • The Maroochy Water Breach (see video) was a cyberattack on a sewage treatment system in Australia carried out by an insider
  • 10. SCADA security, 2013 Slide 10 Security through obscurity • Approach to security that is based on the fact that information about a system is not widely known or available so the assumption is that few people can successfully attack the system from outside
  • 11. SCADA security, 2013 Slide 11 Security through obscurity • Susceptible to insider attack from those who know the information inside the organization • SCADA systems are sold globally – therefore information is available to other countries who may be potentially hostile • Information on SCADA systems can be stolen and used by attackers
  • 12. SCADA security, 2013 Slide 12 SCADA connectivity • 3rd generation SCADA systems are now reliant on standard IT technologies and protocols (Microsoft Windows, TCP/IP, web browsers, organisational wireless networks, etc.) • Integrated with older SCADA systems
  • 13. SCADA security, 2013 Slide 13 Internet-based SCADA
  • 14. SCADA security, 2013 Slide 14 SCADA legacy systems • There are a huge number of 2nd generation SCADA systems that are still in use and are likely to remain in use for many years – Infrastructure systems can have a 20+ year lifetime • However, these are now being ‘updated’ with new equipment which is network-connected • These older legacy systems were developed without security awareness and so are particularly vulnerable to attack
  • 15. SCADA security, 2013 Slide 15 The myth of the ‘air gap’ • Direct connections to vendors for maintenance, stock ordering etc. • Connected to enterprise systems, which in turn are on the Internet.
  • 16. SCADA security, 2013 Slide 16 The myth of the air gap • PCs used by operators may be multi- functional and internet connected • Operators transfer information using USB drives
  • 17. SCADA security, 2013 Slide 17 SCADA vulnerabilities
  • 18. SCADA security, 2013 Slide 18 SCADA security vulnerabilities • Weak passwords • Open to port scanning to discover SCADA systems on network • Lack of input validation –buffer overflow and SQL poisoning • Unencrypted network traffic
  • 19. SCADA security, 2013 Slide 19 SCADA security challenges • SCADA systems and PLC software is normally developed by engineering companies with very limited experience of developing secure systems • The system developers are usually domain experts (oil and gas engineers, power engineers, etc.) rather than software engineers. • They may have had no training in security techniques.
  • 20. SCADA security, 2013 Slide 20 SCADA security challenges • Not always possible to use standard security tools and techniques: – It may not be possible to install anti-virus protection on process control systems, owing to the lack of processor power on legacy systems, the age of operating systems or the lack of vendor certification.
  • 21. SCADA security, 2013 Slide 21 SCADA security challenges • Security testing on process control systems must also be approached with extreme caution – security scanning can seriously affect the operation of many control devices. • There are sometimes few opportunities to take the systems off-line for routine testing, patching and maintenance.
  • 22. SCADA security, 2013 Slide 22 Improving SCADA security • Government and industry reports to raise awareness of SCADA security issues • Establishment of bodies specifically concerned with infrastructure protection who can advise on SCADA system security
  • 23. SCADA security, 2013 Slide 23 Improving SCADA security • Better security education and training for SCADA developers • Need for regulators to become involved – security certification
  • 24. SCADA security, 2013 Slide 24 © David Shankbone 2012
  • 25. SCADA security, 2013 Slide 25 Summary • Government organisations are seriously concerned about the vulnerability of SCADA systems to cyberattacks and the consequences for our national infrastructure • SCADA systems connected to internet so vulnerable to external attack • SCADA systems are often old systems that were built without security concerns – therefore are vulnerable to external attack