SlideShare a Scribd company logo
Critical Infrastructure Assessment Techniques
to Prevent Threats & Vulnerabilities
MR. SHAKEEL ALI
10th International Conference on Software QA and Testing on Embedded Systems
Short Biography
 Security Enthusiast, Evangelist, and Researcher
 Founder - Cipher Storm Ltd, UK
 Founder - Ethical-Hacker.Net
 BackBox Linux Contributor - A next-generation penetration testing
platform
 Web Application Security Consortium (WASC) Project - Threat
Classification TC v2
 Book Publications:
 BackTrack 4: Assuring Security by Penetration Testing (April
2011), Packt Publishing, ISBN: 1849513945
 Cyber Security Standards, Practices and Industrial Applications:
Systems and Methodologies (August 2011), IGI Global
Publishing, ISBN: 1609608518
2
Agenda
 Embedded System Applications In ICS
 Historic Incidents - What we have learned?
 ICS Network Architecture - Possible Attack Vectors
 Vulnerabilities - Broad View
 Threats - Who is targeting ICS?
 Prevention Strategies and Recommendations
 Risk Management Checklist
 ICS Evaluation Criteria
 References and Additional Reading
3
Embedded System Applications In ICS
 Several types of Embedded Systems :
 Supervisory control and data acquisition (SCADA)
 Distributed control systems (DCS)
 Programmable logic controllers (PLC)
 Human Machine Interface (HMI)
 Remote Terminal Units (RTU)
 Common Use:
 Electrical power generation and distribution, Chemical
plant, Water management, Manufacturing facility,
Transportation, Telecommunication, Oil and gas
production, Nuclear power plant, Pharmaceutical,
Defense systems, Wind energy, etc.
4
Historic Incidents - What we have learned?
 January 2003, Davis-Besse Nuclear Power Plant, Ohio,
Slammer worm infected the whole network and disabled
the safety monitoring systems.
 January 2005, a cyber attack knocked out power supply in
three cities in the North of Rio De Janeiro, Brazil affecting
tens of thousands of people.
 September 2007, a cyber attack caused major disruptions
affecting more than 3 million people in dozens of cities in
the Brazilian state of Espírito Santo.
 July 2010, a computer worm “Stuxnet” has targeted
Siemens industrial platforms (Siemens PCS7, WinCC and
STEP7) running on Windows OS. First of its kind included
with Programmable Logic Controller (PLC) rootkit.
5
6
Vulnerabilities - Broad View
 Easy to carry sophisticated/multi-layered attacks
 Confidence in commercial software
 Interconnected, web-enabled systems on
distributed networks
 Competitive energy market
 High performance & reliability requirements
 Control Systems are inherently insecure
 Developed without security in mind
 Mostly with no firewall and intrusion detection
capabilities
 Improper authentication controls
7
 Use of open protocols (ICCP / CIM / DNP3 / Modbus /
Profibus), increased use of intelligent devices, and
lack of encryption.
 Insecure real-time OS at the control-processor
level
 Remote access to these systems (dial-in
modems, PC-Anywhere, FTP, etc)
 Default vendor passwords (sometimes hardcoded
into the firmware)
 Host machines that control SCADA/DCS systems
(XWindows or ActiveX controls)
8
 Communications systems are used to send
control signals (wired and wireless) could be
jammed or manipulated via spoofing and DoS
attacks.
 Proprietary operating systems (Windows, Unix,
QNX, RTX, VxWorks)
 Access through corporate networks (application
and network level attacks)
 Lack of communication within an operational
organization
9
Threats - Who is targeting ICS?
 Hackers
 Hackers come in many forms
 Technically cognizant hackers with detailed knowledge
of energy systems
 Cyber-terrorists
 No known/public example of cyber-terrorism to date
 Terrorist groups are constantly developing cyber
attack capabilities
 Insiders
 Employee with detailed knowledge
 Disgruntled employees or ex-employees
10
 State-sponsored cyber warfare activists
 Nation-states are actively developing cyber warfare
capabilities
 Resources, capabilities, knowledge, and competences
of the control systems and technologies
11
Prevention Strategies and Recommendations
 Identifying Critical Risks
 Develop business strategies to address control system
vulnerabilities, threats, technology limitations, etc.
 Information sharing platform for cross-sector attacks
 Develop and implement strong encryption mechanism
 Regular assessment through SCADA Test Bed
 Legacy Systems Security
 Developing security solutions
 Long-term plan for legacy system development life cycle
 Implement secure connection best practices
 Security plan for incident response and recovery
 Security Tools
 Develop automated system for managing security alerts
12
 Measurable security through metrics/standards
 Identifying effective perimeter security solutions
 System Architecture
 An integrated intrusion detection and prevention solution
 Security test harness
 Secure architecture with plug-and-play compatibility
 Staff Security Awareness
 Decisions that may introduce vulnerabilities into
management and control system
 Background Checks
 Regular checks on current employees, new hires, and
contractors
 Establish a security perimeter
13
 Secure and minimize remote connections to
control networks
 Secure and minimize local connections between
corporate networks and control systems
 Implement strong access control
 Develop control system security policies and
procedures
 Encrypt communications channels (SSL VPNs,
SSH, PKI)
 Use one-way connections (diode firewall)
 Use dial-back modems, token-based
authentication (e.g. RSA SecurID)
14
 Disable all the unnecessary applications,
services, and ports
 Remove or change all default/vendor-supplied
passwords (e.g. SNMP community strings)
 Develop security tools and technologies for real-
time OS suitable for your control systems
environment
 Conduct an in-depth control systems cyber
security audit
 Embedded systems quality assurance through
formal verification and validation
 Develop and maintain BC/DR plan
15
Risk Management Checklist
 Identify critical functions and assets, and the impacts
of their loss
 Identify what protects and supports the critical assets
 Evaluate and rank the potential threats and
vulnerabilities
 Assess risk and determine priorities for asset
protection
 Identify best mitigation strategies and their costs
 Initiate a security enhancement program
 Assist plant operators in identifying priorities for
protecting energy infrastructure
16
ICS Evaluation Criteria
17
References and Additional Reading
 [1] SCADA Security Research Tools
http://www.digitalbond.com/tools/
 [2] Security Assessment Toolset
http://www.scadahacker.com/tools.html
 [3] Getting Started on ICS and SCADA
Security
Part(1): http://www.tofinosecurity.com/blog/getting-
started-ics-and-scada-security-part-1-2
Part(2): http://www.tofinosecurity.com/blog/getting-
started-ics-and-scada-security-part-2-2
18
 [4] Security Advisories and Exploits
http://www.digitalbond.com/scadapedia/vulnerability-
notes/
http://aluigi.altervista.org/adv.htm
http://www.scadahacker.com/vulndb/ics-vuln-ref-
list.html
 [5] Jyostna, K., PADMAJA, V. (2011). Secure
Embedded System Networking: An Advanced
Security Perspective. International Journal of
Engineering Science and Technology (IJEST).
3 (5), 3854.
19
END OF PRESENTATION

More Related Content

PDF
Embedded Systems Security: Building a More Secure Device
PPTX
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
PPT
What is NAC
PPTX
Sangfor ngfw 修订版
PPTX
What is Next-Generation Antivirus?
PDF
McAffee_Security and System Integrity in Embedded Devices
PPTX
SCADA Security Training
Embedded Systems Security: Building a More Secure Device
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
What is NAC
Sangfor ngfw 修订版
What is Next-Generation Antivirus?
McAffee_Security and System Integrity in Embedded Devices
SCADA Security Training

What's hot (20)

PPTX
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
PDF
IoT Hardware Teardown, Security Testing & Control Design
PDF
Reference Security Architecture for Mobility- Insurance
PPTX
Cybersecurity framework v1-1_presentation
PPTX
Mobile slide
PPTX
Understanding Application Threat Modelling & Architecture
PDF
Network access control (nac)
PPTX
Alienvault threat alerts in spiceworks
PDF
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
PDF
Tcl security testing services v0 03 kvs 180511
PPTX
Wireless Communiction Security
PDF
Industrial Control Security USA Sacramento California Oct 13/14
PDF
UTM & Next-Gen Firewall Solution: What's the difference?
PDF
Offensive cyber security engineer updated
PPTX
Nac market
PPTX
Network Control Access for Non-IT Professionals
PPTX
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
PDF
Industrial Control Cyber Security Europe 2015
PDF
Cyber Security for Critical Infrastructure
PPTX
Application security
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
IoT Hardware Teardown, Security Testing & Control Design
Reference Security Architecture for Mobility- Insurance
Cybersecurity framework v1-1_presentation
Mobile slide
Understanding Application Threat Modelling & Architecture
Network access control (nac)
Alienvault threat alerts in spiceworks
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Tcl security testing services v0 03 kvs 180511
Wireless Communiction Security
Industrial Control Security USA Sacramento California Oct 13/14
UTM & Next-Gen Firewall Solution: What's the difference?
Offensive cyber security engineer updated
Nac market
Network Control Access for Non-IT Professionals
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Industrial Control Cyber Security Europe 2015
Cyber Security for Critical Infrastructure
Application security
Ad

Similar to Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerabilities (20)

PPTX
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
PPT
Power Grid Communications & Control Systems
PPT
Control system including PLC cybersecurity
PPTX
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
PDF
Cyber security colombo meetup
PPTX
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
PPT
Cybersecurity for Control Systems: Current State and Future Vision pt.1
PDF
Securing SCADA
PDF
Securing SCADA
PDF
ICS security
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PDF
Sb securing-industrial-control-systems-with-fortinet
PPTX
Critical Infrastructure Security by Subodh Belgi
PPT
Industrial control systems cybersecurity.ppt
PDF
Defending Industrial Control Systems From Cyberattack
PDF
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
PDF
Defending industrial control systems from cyber attack
PDF
Seven recommendations for bolstering industrial control system cyber security
PDF
CISA GOV - Seven Steps to Effectively Defend ICS
PDF
Defending Industrial Control Systems From Cyberattack
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Power Grid Communications & Control Systems
Control system including PLC cybersecurity
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Cyber security colombo meetup
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Securing SCADA
Securing SCADA
ICS security
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Sb securing-industrial-control-systems-with-fortinet
Critical Infrastructure Security by Subodh Belgi
Industrial control systems cybersecurity.ppt
Defending Industrial Control Systems From Cyberattack
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
Defending industrial control systems from cyber attack
Seven recommendations for bolstering industrial control system cyber security
CISA GOV - Seven Steps to Effectively Defend ICS
Defending Industrial Control Systems From Cyberattack
Ad

Recently uploaded (20)

PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Internet___Basics___Styled_ presentation
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Funds Management Learning Material for Beg
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
DOCX
Unit-3 cyber security network security of internet system
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
artificial intelligence overview of it and more
PDF
Testing WebRTC applications at scale.pdf
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPT
tcp ip networks nd ip layering assotred slides
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Paper PDF World Game (s) Great Redesign.pdf
Internet___Basics___Styled_ presentation
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Cloud-Scale Log Monitoring _ Datadog.pdf
presentation_pfe-universite-molay-seltan.pptx
SAP Ariba Sourcing PPT for learning material
Funds Management Learning Material for Beg
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Unit-3 cyber security network security of internet system
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
WebRTC in SignalWire - troubleshooting media negotiation
Design_with_Watersergyerge45hrbgre4top (1).ppt
artificial intelligence overview of it and more
Testing WebRTC applications at scale.pdf
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Slides PPTX World Game (s) Eco Economic Epochs.pptx
tcp ip networks nd ip layering assotred slides
Introuction about ICD -10 and ICD-11 PPT.pptx
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰

Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerabilities

  • 1. Critical Infrastructure Assessment Techniques to Prevent Threats & Vulnerabilities MR. SHAKEEL ALI 10th International Conference on Software QA and Testing on Embedded Systems
  • 2. Short Biography  Security Enthusiast, Evangelist, and Researcher  Founder - Cipher Storm Ltd, UK  Founder - Ethical-Hacker.Net  BackBox Linux Contributor - A next-generation penetration testing platform  Web Application Security Consortium (WASC) Project - Threat Classification TC v2  Book Publications:  BackTrack 4: Assuring Security by Penetration Testing (April 2011), Packt Publishing, ISBN: 1849513945  Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies (August 2011), IGI Global Publishing, ISBN: 1609608518 2
  • 3. Agenda  Embedded System Applications In ICS  Historic Incidents - What we have learned?  ICS Network Architecture - Possible Attack Vectors  Vulnerabilities - Broad View  Threats - Who is targeting ICS?  Prevention Strategies and Recommendations  Risk Management Checklist  ICS Evaluation Criteria  References and Additional Reading 3
  • 4. Embedded System Applications In ICS  Several types of Embedded Systems :  Supervisory control and data acquisition (SCADA)  Distributed control systems (DCS)  Programmable logic controllers (PLC)  Human Machine Interface (HMI)  Remote Terminal Units (RTU)  Common Use:  Electrical power generation and distribution, Chemical plant, Water management, Manufacturing facility, Transportation, Telecommunication, Oil and gas production, Nuclear power plant, Pharmaceutical, Defense systems, Wind energy, etc. 4
  • 5. Historic Incidents - What we have learned?  January 2003, Davis-Besse Nuclear Power Plant, Ohio, Slammer worm infected the whole network and disabled the safety monitoring systems.  January 2005, a cyber attack knocked out power supply in three cities in the North of Rio De Janeiro, Brazil affecting tens of thousands of people.  September 2007, a cyber attack caused major disruptions affecting more than 3 million people in dozens of cities in the Brazilian state of Espírito Santo.  July 2010, a computer worm “Stuxnet” has targeted Siemens industrial platforms (Siemens PCS7, WinCC and STEP7) running on Windows OS. First of its kind included with Programmable Logic Controller (PLC) rootkit. 5
  • 6. 6
  • 7. Vulnerabilities - Broad View  Easy to carry sophisticated/multi-layered attacks  Confidence in commercial software  Interconnected, web-enabled systems on distributed networks  Competitive energy market  High performance & reliability requirements  Control Systems are inherently insecure  Developed without security in mind  Mostly with no firewall and intrusion detection capabilities  Improper authentication controls 7
  • 8.  Use of open protocols (ICCP / CIM / DNP3 / Modbus / Profibus), increased use of intelligent devices, and lack of encryption.  Insecure real-time OS at the control-processor level  Remote access to these systems (dial-in modems, PC-Anywhere, FTP, etc)  Default vendor passwords (sometimes hardcoded into the firmware)  Host machines that control SCADA/DCS systems (XWindows or ActiveX controls) 8
  • 9.  Communications systems are used to send control signals (wired and wireless) could be jammed or manipulated via spoofing and DoS attacks.  Proprietary operating systems (Windows, Unix, QNX, RTX, VxWorks)  Access through corporate networks (application and network level attacks)  Lack of communication within an operational organization 9
  • 10. Threats - Who is targeting ICS?  Hackers  Hackers come in many forms  Technically cognizant hackers with detailed knowledge of energy systems  Cyber-terrorists  No known/public example of cyber-terrorism to date  Terrorist groups are constantly developing cyber attack capabilities  Insiders  Employee with detailed knowledge  Disgruntled employees or ex-employees 10
  • 11.  State-sponsored cyber warfare activists  Nation-states are actively developing cyber warfare capabilities  Resources, capabilities, knowledge, and competences of the control systems and technologies 11
  • 12. Prevention Strategies and Recommendations  Identifying Critical Risks  Develop business strategies to address control system vulnerabilities, threats, technology limitations, etc.  Information sharing platform for cross-sector attacks  Develop and implement strong encryption mechanism  Regular assessment through SCADA Test Bed  Legacy Systems Security  Developing security solutions  Long-term plan for legacy system development life cycle  Implement secure connection best practices  Security plan for incident response and recovery  Security Tools  Develop automated system for managing security alerts 12
  • 13.  Measurable security through metrics/standards  Identifying effective perimeter security solutions  System Architecture  An integrated intrusion detection and prevention solution  Security test harness  Secure architecture with plug-and-play compatibility  Staff Security Awareness  Decisions that may introduce vulnerabilities into management and control system  Background Checks  Regular checks on current employees, new hires, and contractors  Establish a security perimeter 13
  • 14.  Secure and minimize remote connections to control networks  Secure and minimize local connections between corporate networks and control systems  Implement strong access control  Develop control system security policies and procedures  Encrypt communications channels (SSL VPNs, SSH, PKI)  Use one-way connections (diode firewall)  Use dial-back modems, token-based authentication (e.g. RSA SecurID) 14
  • 15.  Disable all the unnecessary applications, services, and ports  Remove or change all default/vendor-supplied passwords (e.g. SNMP community strings)  Develop security tools and technologies for real- time OS suitable for your control systems environment  Conduct an in-depth control systems cyber security audit  Embedded systems quality assurance through formal verification and validation  Develop and maintain BC/DR plan 15
  • 16. Risk Management Checklist  Identify critical functions and assets, and the impacts of their loss  Identify what protects and supports the critical assets  Evaluate and rank the potential threats and vulnerabilities  Assess risk and determine priorities for asset protection  Identify best mitigation strategies and their costs  Initiate a security enhancement program  Assist plant operators in identifying priorities for protecting energy infrastructure 16
  • 18. References and Additional Reading  [1] SCADA Security Research Tools http://www.digitalbond.com/tools/  [2] Security Assessment Toolset http://www.scadahacker.com/tools.html  [3] Getting Started on ICS and SCADA Security Part(1): http://www.tofinosecurity.com/blog/getting- started-ics-and-scada-security-part-1-2 Part(2): http://www.tofinosecurity.com/blog/getting- started-ics-and-scada-security-part-2-2 18
  • 19.  [4] Security Advisories and Exploits http://www.digitalbond.com/scadapedia/vulnerability- notes/ http://aluigi.altervista.org/adv.htm http://www.scadahacker.com/vulndb/ics-vuln-ref- list.html  [5] Jyostna, K., PADMAJA, V. (2011). Secure Embedded System Networking: An Advanced Security Perspective. International Journal of Engineering Science and Technology (IJEST). 3 (5), 3854. 19