SlideShare a Scribd company logo
Restricting
Authenticating
Tracking
User Access?
Time Is Not
On Our Side!
Page 1 of 2
12100 Sunrise Valley Dr. Suite 290-1 Reston, VA 20191
Supervisory Control And Data Acquisition (SCADA) networks
pervade the industry. These small microcontroller systems are used to
control large industrial machines and systems. SCADA systems are
predominantly used for monitoring industrial systems, often in remote
locations.
Typically remote terminal units and Programmable Logic Controllers are
connected to enterprise networks using a “telemetry” network. Where
the telemetry network meets the enterprise computer network, gateways
permit two-way communications between the SCADA network and the
traditional corporate network.
SCADA systems were designed to be highly efficient, but they were not
necessarily designed with security in mind. Because security was not the
primary consideration, SCADA telemetry networks may be highly
vulnerable to exploitation. Because SCADA systems control and provide
feedback on industrial processes, exploitation of these systems could
seriously disrupt key industrial processes, such as power generation, lift
and crane systems, and transportation systems.
There are numerous entry points to SCADA telemetry networks:
• Compromise of WLAN and/or wireless networks that connect
SCADA systems to each other and to control systems
• Compromise of gateways from traditional computer networks to the
SCADA network
• Improper physical access to key control systems
• Access to telemetry networks and modification of command-level
traffic (typically this traffic is unencrypted)
• Application-level vulnerabilities in SCADA control software
• SCADA traffic encapsulated in TCP/IP and transmitted over public
networks
SCADA exposure will short-circuit US utilities!
What is it? Where are the vulnerabilities? • What should be considered?
SCADA systems
were designed to
be highly efficient,
but they were not
necessarily designed
with security in mind.
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWN
These vectors are but a limited selection of the entry points for SCADA
networks. Because of the traditional use of SCADA networks, encryp-
tion of traffic between endpoints is often forgone.
The most memorable SCADA attack was STUXNET. STUXNET
attacked the centrifuge control SCADA systems in Iran, rendering them
useless.
Organizations need a structured approach to securing SCADA systems.
While firmware manufacturers may be slow to respond to security
requirements, organizations must take the following preventive initia-
tives:
• Implement simple but effective controls that separate SCADA
networks from general computer network systems.
• Monitor SCADA system activities for abnormal conditions.
• Upgrade and assess SCADA firmware on a regular basis.
• Where bounds checking has been implemented (for controller move-
ment such as stepper-motor controlled systems), the configuration
scripts for SCADA devices must cover movement bounds to avoid
damaging control hardware.
Finally, while there are many technological aspects to controlling
SCADA systems, we cannot overlook the human element.
Contact VIMRO now to learn more about how to secure SCADA
systems, telemetry networks, and gateway systems—and to control the
human effect on SCADA systems.
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Authored by VIMRO’s Cybersecurity Leaders
SCADA exposure will
short-circuit US utilities!
Page 2 of 2
The most memorable
SCADA attack was
STUXNET!

More Related Content

PPTX
SECURE Out-of-Band Management
PPTX
Service providers presentation
PDF
ICS security
PPTX
Cdi federal 2019
PDF
IJSRED-V2I2P15
PDF
PT-DTS SCADA Security using MaxPatrol
PDF
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
PPTX
Hands on robotics in coimbatore
SECURE Out-of-Band Management
Service providers presentation
ICS security
Cdi federal 2019
IJSRED-V2I2P15
PT-DTS SCADA Security using MaxPatrol
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
Hands on robotics in coimbatore

What's hot (17)

PDF
Guideline for the certification of wind turbine service technicians 2015 july
PDF
IT vs. OT: ICS Cyber Security in TSOs
PDF
Hands on robotics in coimbatore
PDF
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
ODP
Securing control systems v0.4
PDF
Hands on robotics in coimbatore
PPTX
Nozomi Fortinet Accelerate18
PDF
Nozomi Networks Q1_2018 Company Introduction
PPTX
SANS ICS Security Survey Report 2016
PDF
Securing SCADA
PDF
Nozomi Networks SCADAguardian - Data-Sheet
PPTX
SCADA Security in CDIC 2009
PDF
Securing Industrial Control System
PDF
Nozomi networks-solution brief
PDF
DHS - Recommendations for Securing Zigbee Networks in Process Control Systems
PDF
Guide scada and_industrial_control_systems_security
PDF
10. industrial networks safety and security tom hammond
Guideline for the certification of wind turbine service technicians 2015 july
IT vs. OT: ICS Cyber Security in TSOs
Hands on robotics in coimbatore
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Securing control systems v0.4
Hands on robotics in coimbatore
Nozomi Fortinet Accelerate18
Nozomi Networks Q1_2018 Company Introduction
SANS ICS Security Survey Report 2016
Securing SCADA
Nozomi Networks SCADAguardian - Data-Sheet
SCADA Security in CDIC 2009
Securing Industrial Control System
Nozomi networks-solution brief
DHS - Recommendations for Securing Zigbee Networks in Process Control Systems
Guide scada and_industrial_control_systems_security
10. industrial networks safety and security tom hammond
Ad

Viewers also liked (18)

PDF
PDF
Rotary club, dhone may 2013 pml
PPTX
Doe mij recht o God
PDF
$4.11 and Gametheory - Gray 2016
PDF
Diamond Gateway Women's Organization
PPTX
Comunicación digital...
PPTX
Jose Barazarte 20766230
DOC
Malgutasuna
PPT
Diapositivas derecho
PPTX
Pp king edward school
PDF
A redução do parto cesáreo
PPTX
Strategi Gerakan Dakwah Muhammadiyah
ODP
Museo del Louvre
PPT
Slogan and sales aid
PDF
04 мебель (32)
PDF
10 uvped
PDF
7 uvpsi
PDF
10) summer camp 2013
Rotary club, dhone may 2013 pml
Doe mij recht o God
$4.11 and Gametheory - Gray 2016
Diamond Gateway Women's Organization
Comunicación digital...
Jose Barazarte 20766230
Malgutasuna
Diapositivas derecho
Pp king edward school
A redução do parto cesáreo
Strategi Gerakan Dakwah Muhammadiyah
Museo del Louvre
Slogan and sales aid
04 мебель (32)
10 uvped
7 uvpsi
10) summer camp 2013
Ad

Similar to SCADA Exposure Will Short-Circuit US Utilities (20)

PDF
Securing SCADA
PDF
SCADA Systems Vulnerabilities and Blockchain Technology
PPTX
Scada Industrial Control Systems Penetration Testing
PPTX
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PDF
Encryption Security in SCADA Networks
PDF
David Blanco ISHM 8280-2016
PPTX
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
PPTX
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
PDF
Utilization of Encryption for Security in SCADA Networks
PPTX
Security Issues in SCADA based Industrial Control Systems
PPTX
SCADA Systems and its security!
PPT
LIBRARY RESEARCH PROJECT cyber security control inSCAD.ppt
PPT
LIBRARY RESEARCH PROJECT SECURITY CONTROL IN SCADA
PPTX
Scada security
PPTX
Scada slide
PPTX
SCADAPresentation.pptx information about scada
PPTX
Scada security webinar 2012
DOCX
Copyright © 2005, Sandia Corporation. The submitte.docx
PPTX
Training manual on scada
Securing SCADA
SCADA Systems Vulnerabilities and Blockchain Technology
Scada Industrial Control Systems Penetration Testing
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Encryption Security in SCADA Networks
David Blanco ISHM 8280-2016
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Utilization of Encryption for Security in SCADA Networks
Security Issues in SCADA based Industrial Control Systems
SCADA Systems and its security!
LIBRARY RESEARCH PROJECT cyber security control inSCAD.ppt
LIBRARY RESEARCH PROJECT SECURITY CONTROL IN SCADA
Scada security
Scada slide
SCADAPresentation.pptx information about scada
Scada security webinar 2012
Copyright © 2005, Sandia Corporation. The submitte.docx
Training manual on scada

More from FitCEO, Inc. (FCI) (20)

PDF
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
PDF
Passwords don't work multifactor controls do!
PDF
HIPAA and HITECH Compliance Guide
PDF
Data exfiltration so many threats 2016
PDF
Cyber security audits and risk management 2016
PDF
Cyber Security Audits and Risk Management 20160119
PDF
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
PDF
Cyber Security Audits and Risk Management 20160119
PDF
Cyber security audits and risk management 2016
PDF
Cyber Security Audits and Risk Management 20160119
PDF
VIMRO Cyber Security Methodology
PDF
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
PDF
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
PDF
The Demystification of successful cybersecurity initiatives.
PDF
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
PDF
Internet of Things - A Different Kind of Scary v2
PDF
Cyber Insurance - What you need to know
PDF
PCI DSS Reaper - Are you ready - VIMRO
PDF
IPV6 a tale of two protocols
PDF
CODE INSPECTION VIMRO 2015 MHF
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Passwords don't work multifactor controls do!
HIPAA and HITECH Compliance Guide
Data exfiltration so many threats 2016
Cyber security audits and risk management 2016
Cyber Security Audits and Risk Management 20160119
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
Cyber Security Audits and Risk Management 20160119
Cyber security audits and risk management 2016
Cyber Security Audits and Risk Management 20160119
VIMRO Cyber Security Methodology
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
The Demystification of successful cybersecurity initiatives.
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Internet of Things - A Different Kind of Scary v2
Cyber Insurance - What you need to know
PCI DSS Reaper - Are you ready - VIMRO
IPV6 a tale of two protocols
CODE INSPECTION VIMRO 2015 MHF

SCADA Exposure Will Short-Circuit US Utilities

  • 1. Restricting Authenticating Tracking User Access? Time Is Not On Our Side! Page 1 of 2 12100 Sunrise Valley Dr. Suite 290-1 Reston, VA 20191 Supervisory Control And Data Acquisition (SCADA) networks pervade the industry. These small microcontroller systems are used to control large industrial machines and systems. SCADA systems are predominantly used for monitoring industrial systems, often in remote locations. Typically remote terminal units and Programmable Logic Controllers are connected to enterprise networks using a “telemetry” network. Where the telemetry network meets the enterprise computer network, gateways permit two-way communications between the SCADA network and the traditional corporate network. SCADA systems were designed to be highly efficient, but they were not necessarily designed with security in mind. Because security was not the primary consideration, SCADA telemetry networks may be highly vulnerable to exploitation. Because SCADA systems control and provide feedback on industrial processes, exploitation of these systems could seriously disrupt key industrial processes, such as power generation, lift and crane systems, and transportation systems. There are numerous entry points to SCADA telemetry networks: • Compromise of WLAN and/or wireless networks that connect SCADA systems to each other and to control systems • Compromise of gateways from traditional computer networks to the SCADA network • Improper physical access to key control systems • Access to telemetry networks and modification of command-level traffic (typically this traffic is unencrypted) • Application-level vulnerabilities in SCADA control software • SCADA traffic encapsulated in TCP/IP and transmitted over public networks SCADA exposure will short-circuit US utilities! What is it? Where are the vulnerabilities? • What should be considered? SCADA systems were designed to be highly efficient, but they were not necessarily designed with security in mind.
  • 2. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWN These vectors are but a limited selection of the entry points for SCADA networks. Because of the traditional use of SCADA networks, encryp- tion of traffic between endpoints is often forgone. The most memorable SCADA attack was STUXNET. STUXNET attacked the centrifuge control SCADA systems in Iran, rendering them useless. Organizations need a structured approach to securing SCADA systems. While firmware manufacturers may be slow to respond to security requirements, organizations must take the following preventive initia- tives: • Implement simple but effective controls that separate SCADA networks from general computer network systems. • Monitor SCADA system activities for abnormal conditions. • Upgrade and assess SCADA firmware on a regular basis. • Where bounds checking has been implemented (for controller move- ment such as stepper-motor controlled systems), the configuration scripts for SCADA devices must cover movement bounds to avoid damaging control hardware. Finally, while there are many technological aspects to controlling SCADA systems, we cannot overlook the human element. Contact VIMRO now to learn more about how to secure SCADA systems, telemetry networks, and gateway systems—and to control the human effect on SCADA systems. (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Authored by VIMRO’s Cybersecurity Leaders SCADA exposure will short-circuit US utilities! Page 2 of 2 The most memorable SCADA attack was STUXNET!