SlideShare a Scribd company logo
Marco Biancardi, Power Systems Division, BU Power Generation, October 2013

Cyber Security
Differences between Industrial
Control Systems and ICT approach
Introduction
Definitions
Information Technology (IT)* is the application of computers
and telecommunications equipment to store, retrieve,
transmit and manipulate data, often in the context of a
business or other enterprise. The term is commonly used as
a synonym for computers and computer networks

Industrial Control System (ICS)* is a general term that
encompasses several types of control systems used in
industrial production, including supervisory control and data
acquisition (SCADA) systems, distributed control systems
(DCS), and other smaller control system configurations such
as programmable logic controllers (PLC) often found in the
industrial sectors and critical infrastructures
* Source: Wikipedia
Introduction
Cyber security: a definition
Measures taken to protect a computer or computer system
(as on the Internet) against unauthorized access or attack*

*Source: Merriam-Webster’s dictionary
Introduction
Why is it an issue?

Isolated devices

Point to point
interfaces

Proprietary
networks

Standard
Ethernet/IPbased networks

Interconnected
systems

Distributed
systems

Modern SCADA, automation, protection and control systems :
 leverage commercial off the shelf IT components (i.e. MS Windows, Internet
Explorer)
 use standardized, IP based communication protocols
 are distributed and highly interconnected
 use mobile devices and storage media
Modern control systems are specialized IT systems, with multiple vulnerabilities

Hacking

Employee Mistake
Malicious software
installed via USB port
Differences
Office IT vs Utilities/Industry: …they are different!
Corporate/Office IT

Utilities/Industry

Environment

Offices and «mobile»

«in the field»

People/Equipment
Ratio

# of Equipment ~= # of people

Few people, many equipment.

Object under protection

Information

Industrial process: availability

Risk Impact

Information disclosure, $$$

Safety (life), Health, Environment, Information disclosure, loss of
production, downtime, repairing costs, $$$

Availability
requirements

3,65 days)

System lifetime

3-5 years

15-30 years

Security focus

Central Servers (CPU, memory,…) and
PC

Server/PC + distributed systems, Sensors, PLC,…

Operating systems

Windows

Windows + proprietary

Software

Consumer Software , normally used on
PC

Specific

Protocols

Well known (HTTP over TCP/IP ,…) /
mainly web

Industrial (TCP/IP, Vendor specific) / polling

Procedure

Well known (password,…)

Specific

Main actors

IBM, SAP, Oracle, etc.

ABB, Siemens, GE, Honeywell, Emerson, etc.

95%-99% (accept. downtime/year: 18,25 –

99,9%-99,999% (accept. downtime/year: 8,76 hrs – 5,25 minutes)
Introduction
A definition in the context of power and automation
technology
*source
MerriamWebster’s
dictionary

Measures taken to protect a
computer or computer
system (as on the Internet)
against unauthorized access
or attack*
translates into
Measures taken to protect
the reliability, integrity and
availability of power and
automation technologies
against unauthorized
access or attack
Threats
Where are attack sources?


Accidents / Mistakes



Rogue insider



Malware



Thieves / Extortionists



Enemies / Terrorists

Likelihood



Likelihood is unknown



Consequences are potentially huge
Threats
What if…


What if this information gets disclosed



What if someone opens a breaker



What if it does not open when it should



What if I cannot operate a device/PLC



What if someone else can operate a device/PLC



What if a transformer is overloaded due to a wrong
temperature reading?



What if a protection is not working properly?



What if a not-authorized person can access
supervision/control network?



What if a not-authorized person can access DSO/TSO
network?



What if a blackout happen in cold winter?
Threats
World news
Solutions
How can you proceed?

Keeping up-to-date
Awareness

Check Actual Status

Assessment

What if…

Follow-up

Dedicated solutions

Continuous monitoring

Cyber
Security Cycle

Operational
Security

100% Security does not exist. Security:
 Is not a product but a process

Risk
Mitigation
Solutions
ABB Service Approach
Different
service
levels,
based on
project
status

1. ASSESSMENT
Site Inventory
Risk Assesment
2. FIRST-AID SERVICE
Design Review
HW update & Hardening
SW service

Analysis

Report

Patch management
Account management
Antivirus management
Backup&Restore management

3. INDUSTRIAL DEFENDER
Manage
Monitor

hardware/software

4. ACROSS-LIFE
Keeping up-to-date
Training

Recurrent Reports/ Coursewares
Why ABB
Defense in depth

Strong
(Secure)
ABB
products
+
Industrial
Defender
Solutions

Defense in depth
Cyber Security: Differences between Industrial Control Systems and ICT Approach

More Related Content

PDF
Active Directory in ICS: Lessons Learned From The Field
PDF
Critical infrastructure
PDF
Nist 800 82 ICS Security Auditing Framework
PPT
Lecture2 Introduction to Digital Forensics.ppt
PPTX
Dos attack
PPTX
Security Threats at OSI layers
PPT
Software security
PPTX
Malware Static Analysis
Active Directory in ICS: Lessons Learned From The Field
Critical infrastructure
Nist 800 82 ICS Security Auditing Framework
Lecture2 Introduction to Digital Forensics.ppt
Dos attack
Security Threats at OSI layers
Software security
Malware Static Analysis

What's hot (20)

PPTX
Handling digital crime scene
PPT
CONVENTIONAL ENCRYPTION
PPTX
CISSP - Security Assessment
PPTX
Vapt( vulnerabilty and penetration testing ) services
PPTX
What is security testing and why it is so important?
PPTX
34088.Chapter-2.pptx
PPTX
CISSP Chapter 1 Risk Management
PPTX
Honeypot ppt1
PPTX
Network traffic analysis with cyber security
PPTX
powershell-is-dead-epic-learnings-london
PDF
Introduction IDS
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Designing Virtual Network Security Architectures
PPTX
Introduction to Common Weakness Enumeration (CWE)
PPT
All about Honeypots & Honeynets
PPT
Info Security - Vulnerability Assessment
PPTX
Threat Hunting - Moving from the ad hoc to the formal
PPTX
Hardware Security
PDF
Bulding Soc In Changing Threat Landscapefinal
PPT
Networking and penetration testing
Handling digital crime scene
CONVENTIONAL ENCRYPTION
CISSP - Security Assessment
Vapt( vulnerabilty and penetration testing ) services
What is security testing and why it is so important?
34088.Chapter-2.pptx
CISSP Chapter 1 Risk Management
Honeypot ppt1
Network traffic analysis with cyber security
powershell-is-dead-epic-learnings-london
Introduction IDS
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Designing Virtual Network Security Architectures
Introduction to Common Weakness Enumeration (CWE)
All about Honeypots & Honeynets
Info Security - Vulnerability Assessment
Threat Hunting - Moving from the ad hoc to the formal
Hardware Security
Bulding Soc In Changing Threat Landscapefinal
Networking and penetration testing
Ad

Viewers also liked (7)

PDF
Flex your Database on 12c's Flex ASM Flex Cluster
PDF
Leidos Capabilities Lite Brochure
PDF
Flex Your Database on 12c's Flex ASM and Flex Cluster
PPTX
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
PDF
Cisco Internet of Things
PPTX
Tripwire IP360 Vulnerability Management Scanning Best Practices
PPTX
MASTERS OF THE UNIVERSE
Flex your Database on 12c's Flex ASM Flex Cluster
Leidos Capabilities Lite Brochure
Flex Your Database on 12c's Flex ASM and Flex Cluster
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
Cisco Internet of Things
Tripwire IP360 Vulnerability Management Scanning Best Practices
MASTERS OF THE UNIVERSE
Ad

Similar to Cyber Security: Differences between Industrial Control Systems and ICT Approach (20)

PPTX
CyberSecurity Best Practices for the IIoT
PPT
Smart Grid Cyber Security
PDF
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
PPTX
Internet of things security "Hardware Security"
PPTX
Scada Industrial Control Systems Penetration Testing
PPTX
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
PPT
Chapter - One.ppt
PDF
Io t security defense in depth charles li v1 20180425c
PPT
New internet security
PPT
NewIinternet security
PDF
introduction to #OT cybersecurity for O&M teams.pdf
PDF
The journey to ICS - Extended
PDF
Esd notes iae
PPTX
Security of IOT,OT And IT.pptx
PPTX
Removing Security Roadblocks to IoT Deployment Success
PPT
Introduction To Embedded Systems
PPT
Ecommerce Security
PPTX
Nozomi Fortinet Accelerate18
PPTX
Isa Chapters Cyber is Hard presentation v1.0
PDF
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
CyberSecurity Best Practices for the IIoT
Smart Grid Cyber Security
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
Internet of things security "Hardware Security"
Scada Industrial Control Systems Penetration Testing
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Chapter - One.ppt
Io t security defense in depth charles li v1 20180425c
New internet security
NewIinternet security
introduction to #OT cybersecurity for O&M teams.pdf
The journey to ICS - Extended
Esd notes iae
Security of IOT,OT And IT.pptx
Removing Security Roadblocks to IoT Deployment Success
Introduction To Embedded Systems
Ecommerce Security
Nozomi Fortinet Accelerate18
Isa Chapters Cyber is Hard presentation v1.0
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...

More from Community Protection Forum (20)

PDF
The Role of the Commonwealth in Cyberspace
PDF
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
PDF
Industrial Safety and Security in Horizon 2020
PDF
New Frontiers for Nuclear Power Plants Safety
PDF
New Models and New Technologies for an Integrated Risk Management in Complex ...
PDF
Cyber Security Challenges: how are we facing them?
PDF
How Security can be stronger than a Firewall: 13 different ways breaking thro...
PDF
Security Projects & Projects Safety
PDF
Security of the Supply Chain & Commerce Facilitation with a PM approach
PDF
A Cyberwarfare Weapon: Slowreq
PDF
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
PDF
Touristic Port Security
PDF
Cyber Security Applications for Smart Communities
PDF
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
PDF
Critical Infrastructure and Cyber Security: trends and challenges
PDF
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
PDF
IT vs. OT: ICS Cyber Security in TSOs
PDF
Cyber Security and the National Central Banks
PDF
Smart Cities: Technologies for Efficient and Sustainable Cities
PDF
The DRIHM Infrastructure Design and Projects Experience
The Role of the Commonwealth in Cyberspace
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Industrial Safety and Security in Horizon 2020
New Frontiers for Nuclear Power Plants Safety
New Models and New Technologies for an Integrated Risk Management in Complex ...
Cyber Security Challenges: how are we facing them?
How Security can be stronger than a Firewall: 13 different ways breaking thro...
Security Projects & Projects Safety
Security of the Supply Chain & Commerce Facilitation with a PM approach
A Cyberwarfare Weapon: Slowreq
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Touristic Port Security
Cyber Security Applications for Smart Communities
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Critical Infrastructure and Cyber Security: trends and challenges
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
IT vs. OT: ICS Cyber Security in TSOs
Cyber Security and the National Central Banks
Smart Cities: Technologies for Efficient and Sustainable Cities
The DRIHM Infrastructure Design and Projects Experience

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
KodekX | Application Modernization Development
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Cloud computing and distributed systems.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
KodekX | Application Modernization Development
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Cloud computing and distributed systems.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
The AUB Centre for AI in Media Proposal.docx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Cyber Security: Differences between Industrial Control Systems and ICT Approach

  • 1. Marco Biancardi, Power Systems Division, BU Power Generation, October 2013 Cyber Security Differences between Industrial Control Systems and ICT approach
  • 2. Introduction Definitions Information Technology (IT)* is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. The term is commonly used as a synonym for computers and computer networks Industrial Control System (ICS)* is a general term that encompasses several types of control systems used in industrial production, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as programmable logic controllers (PLC) often found in the industrial sectors and critical infrastructures * Source: Wikipedia
  • 3. Introduction Cyber security: a definition Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack* *Source: Merriam-Webster’s dictionary
  • 4. Introduction Why is it an issue? Isolated devices Point to point interfaces Proprietary networks Standard Ethernet/IPbased networks Interconnected systems Distributed systems Modern SCADA, automation, protection and control systems :  leverage commercial off the shelf IT components (i.e. MS Windows, Internet Explorer)  use standardized, IP based communication protocols  are distributed and highly interconnected  use mobile devices and storage media Modern control systems are specialized IT systems, with multiple vulnerabilities Hacking Employee Mistake Malicious software installed via USB port
  • 5. Differences Office IT vs Utilities/Industry: …they are different! Corporate/Office IT Utilities/Industry Environment Offices and «mobile» «in the field» People/Equipment Ratio # of Equipment ~= # of people Few people, many equipment. Object under protection Information Industrial process: availability Risk Impact Information disclosure, $$$ Safety (life), Health, Environment, Information disclosure, loss of production, downtime, repairing costs, $$$ Availability requirements 3,65 days) System lifetime 3-5 years 15-30 years Security focus Central Servers (CPU, memory,…) and PC Server/PC + distributed systems, Sensors, PLC,… Operating systems Windows Windows + proprietary Software Consumer Software , normally used on PC Specific Protocols Well known (HTTP over TCP/IP ,…) / mainly web Industrial (TCP/IP, Vendor specific) / polling Procedure Well known (password,…) Specific Main actors IBM, SAP, Oracle, etc. ABB, Siemens, GE, Honeywell, Emerson, etc. 95%-99% (accept. downtime/year: 18,25 – 99,9%-99,999% (accept. downtime/year: 8,76 hrs – 5,25 minutes)
  • 6. Introduction A definition in the context of power and automation technology *source MerriamWebster’s dictionary Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack* translates into Measures taken to protect the reliability, integrity and availability of power and automation technologies against unauthorized access or attack
  • 7. Threats Where are attack sources?  Accidents / Mistakes  Rogue insider  Malware  Thieves / Extortionists  Enemies / Terrorists Likelihood  Likelihood is unknown  Consequences are potentially huge
  • 8. Threats What if…  What if this information gets disclosed  What if someone opens a breaker  What if it does not open when it should  What if I cannot operate a device/PLC  What if someone else can operate a device/PLC  What if a transformer is overloaded due to a wrong temperature reading?  What if a protection is not working properly?  What if a not-authorized person can access supervision/control network?  What if a not-authorized person can access DSO/TSO network?  What if a blackout happen in cold winter?
  • 10. Solutions How can you proceed? Keeping up-to-date Awareness Check Actual Status Assessment What if… Follow-up Dedicated solutions Continuous monitoring Cyber Security Cycle Operational Security 100% Security does not exist. Security:  Is not a product but a process Risk Mitigation
  • 11. Solutions ABB Service Approach Different service levels, based on project status 1. ASSESSMENT Site Inventory Risk Assesment 2. FIRST-AID SERVICE Design Review HW update & Hardening SW service Analysis Report Patch management Account management Antivirus management Backup&Restore management 3. INDUSTRIAL DEFENDER Manage Monitor hardware/software 4. ACROSS-LIFE Keeping up-to-date Training Recurrent Reports/ Coursewares
  • 12. Why ABB Defense in depth Strong (Secure) ABB products + Industrial Defender Solutions Defense in depth