SlideShare une entreprise Scribd logo
1  sur  11
Were we Just Hacked? Applying
Digital Forensic Techniques for your
Industrial Control Systems
• Matt Luallen , Co-Founder,
Dragos Security LLC
• Robert M. Lee, Co-Founder,
Dragos Security LLC
• Peter Welander, Content
Manager, Control Engineering,
CFE Media
Speakers:
Were we Just Hacked? Applying
Digital Forensic Techniques for your
Industrial Control Systems
Matt E. Luallen and Robert M. Lee
1. Identifying a Compromise
• How to determine you’ve been hacked
– What are simple things you can do NOW to
detect
– Capabilities of hackers and general attack
scenario
• Be cautious in performing an active response
immediately!
– Keep in mind that the indication may be an
outcome of months of backdoors or possibly just
a false indicator
Hacked – assumptions
• At this time you must assume two things
– Your communications and capabilities are being
eavesdropped upon
– Your assets can be denied service or misused
• Does the hack immediately appear as if it can
impact the entire operation? Could there be
loss of life? Are you authorized to perform
any changes such as the extreme situation of
taking the operations offline? Do you have
an out of band communication capability?
2. What’s Next?
• After you’ve been compromised:
– Tools available to identify and analyze
intrusions
– Handling “too much” data
– Contact the right people
• Internal
• Trusted Peers
• Vendors
• Government
Trustworthiness Validation
• Interview personnel for history of odd behavior
– (e.g. strange emails, system behavior, phone calls, control operations)
• Physical facility inspections
– Any devices and attributes that are abnormal
• Review and compare system baselines to active host settings
– Host images (Windows, *nix, Applications)
– Processed logic
– Device firmware
– Network communications
• Review operational logs for indicators
– Historian, OPC, HMI, IT system logging and any other log-enabled device
• Do you have mechanisms to compare active systems to known good images and
communication profiles?
• What if you do not have the capabilities in house?
– Do you have an outsourcing agreement in place to manage incidents?
3. How Do We Prepare?
• Preparing before or after the compromise
– Tools for monitoring traffic
– Creating chokepoints and understanding
– Questions to ask to determine your readiness
• Future Efforts and Research Needed
– PLC/PAC/Embedded Device specific tools
– Validation, customization, and testing of
known methodologies/tools
Follow on discussions at:
www.DragosSecurity.com
• Matt Luallen , Co-Founder,
Dragos Security LLC
• Robert M. Lee, Co-Founder,
Dragos Security LLC
• Peter Welander, Content
Manager, Control Engineering,
CFE Media
Speakers:
Were we Just Hacked? Applying
Digital Forensic Techniques for your
Industrial Control Systems

Contenu connexe

Tendances

Validating Non Functional Requirements
Validating Non Functional RequirementsValidating Non Functional Requirements
Validating Non Functional RequirementsReuben Korngold
 
2008 Presentation Intelli Check
2008 Presentation Intelli Check2008 Presentation Intelli Check
2008 Presentation Intelli Checkledererand
 
Florin Coada: MOBILE TESTING - A SIMPLE SOLUTION TO YOUR MOBILE SECURITY TESTING
Florin Coada: MOBILE TESTING - A SIMPLE SOLUTION TO YOUR MOBILE SECURITY TESTINGFlorin Coada: MOBILE TESTING - A SIMPLE SOLUTION TO YOUR MOBILE SECURITY TESTING
Florin Coada: MOBILE TESTING - A SIMPLE SOLUTION TO YOUR MOBILE SECURITY TESTINGIevgenii Katsan
 
Capturing Measurable Non Functional Requirements
Capturing Measurable Non Functional RequirementsCapturing Measurable Non Functional Requirements
Capturing Measurable Non Functional RequirementsShehzad Lakdawala
 
The Power Of RPA Using Rapise
The Power Of RPA Using RapiseThe Power Of RPA Using Rapise
The Power Of RPA Using RapiseInflectra
 
Employee monitoring-solutions-from-refog
Employee monitoring-solutions-from-refogEmployee monitoring-solutions-from-refog
Employee monitoring-solutions-from-refogRefogCom
 
Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924Solarwinds N-able
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesSharing Slides Training
 
Non functional requirements. do we really care…?
Non functional requirements. do we really care…?Non functional requirements. do we really care…?
Non functional requirements. do we really care…?OSSCube
 
Digital process management
Digital process managementDigital process management
Digital process managementLarry Karisny
 
AMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramAMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramIvanti
 
Network Configuration and Audit Simplified
Network Configuration and Audit SimplifiedNetwork Configuration and Audit Simplified
Network Configuration and Audit SimplifiedChristopher Willard
 
Non-Functional Requirements
Non-Functional RequirementsNon-Functional Requirements
Non-Functional RequirementsYuriy Guts
 
Non functional performance requirements v2.2
Non functional performance requirements v2.2Non functional performance requirements v2.2
Non functional performance requirements v2.2Ian McDonald
 
Cybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD IssueCybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD IssueRobert E Jones
 
3 florin coada - sast in the days of dev ops
3   florin coada - sast in the days of dev ops3   florin coada - sast in the days of dev ops
3 florin coada - sast in the days of dev opsIevgenii Katsan
 

Tendances (19)

Validating Non Functional Requirements
Validating Non Functional RequirementsValidating Non Functional Requirements
Validating Non Functional Requirements
 
2008 Presentation Intelli Check
2008 Presentation Intelli Check2008 Presentation Intelli Check
2008 Presentation Intelli Check
 
Florin Coada: MOBILE TESTING - A SIMPLE SOLUTION TO YOUR MOBILE SECURITY TESTING
Florin Coada: MOBILE TESTING - A SIMPLE SOLUTION TO YOUR MOBILE SECURITY TESTINGFlorin Coada: MOBILE TESTING - A SIMPLE SOLUTION TO YOUR MOBILE SECURITY TESTING
Florin Coada: MOBILE TESTING - A SIMPLE SOLUTION TO YOUR MOBILE SECURITY TESTING
 
9. Vulnerability Assessments-cyber51
9. Vulnerability Assessments-cyber519. Vulnerability Assessments-cyber51
9. Vulnerability Assessments-cyber51
 
Capturing Measurable Non Functional Requirements
Capturing Measurable Non Functional RequirementsCapturing Measurable Non Functional Requirements
Capturing Measurable Non Functional Requirements
 
The Power Of RPA Using Rapise
The Power Of RPA Using RapiseThe Power Of RPA Using Rapise
The Power Of RPA Using Rapise
 
Employee monitoring-solutions-from-refog
Employee monitoring-solutions-from-refogEmployee monitoring-solutions-from-refog
Employee monitoring-solutions-from-refog
 
Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 
Non functional requirements. do we really care…?
Non functional requirements. do we really care…?Non functional requirements. do we really care…?
Non functional requirements. do we really care…?
 
Digital process management
Digital process managementDigital process management
Digital process management
 
Writing srs
Writing srsWriting srs
Writing srs
 
AMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramAMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management Program
 
Noc outsourcing
Noc outsourcingNoc outsourcing
Noc outsourcing
 
Network Configuration and Audit Simplified
Network Configuration and Audit SimplifiedNetwork Configuration and Audit Simplified
Network Configuration and Audit Simplified
 
Non-Functional Requirements
Non-Functional RequirementsNon-Functional Requirements
Non-Functional Requirements
 
Non functional performance requirements v2.2
Non functional performance requirements v2.2Non functional performance requirements v2.2
Non functional performance requirements v2.2
 
Cybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD IssueCybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD Issue
 
3 florin coada - sast in the days of dev ops
3   florin coada - sast in the days of dev ops3   florin coada - sast in the days of dev ops
3 florin coada - sast in the days of dev ops
 

En vedette

Willowglen Canada, Total SCADA Solutions
Willowglen Canada, Total SCADA SolutionsWillowglen Canada, Total SCADA Solutions
Willowglen Canada, Total SCADA SolutionsMikeVanderZee
 
The Building Blocks of Manufacturing Excellence
The Building Blocks of Manufacturing ExcellenceThe Building Blocks of Manufacturing Excellence
The Building Blocks of Manufacturing ExcellenceControlEng
 
Wireless Mobility
Wireless MobilityWireless Mobility
Wireless MobilityControlEng
 
Instructivo instructivo 2013
Instructivo   instructivo 2013Instructivo   instructivo 2013
Instructivo instructivo 2013MundoImpositivo
 
Gumienny Przemysław T-5 SpaceUP
Gumienny Przemysław T-5 SpaceUPGumienny Przemysław T-5 SpaceUP
Gumienny Przemysław T-5 SpaceUPPrzemyslaw Gumienny
 
Presentation1
Presentation1Presentation1
Presentation1Andy Mac
 
Energy in Factory Automation and the Role of Industrial Networks
Energy in Factory Automation and the Role of Industrial Networks Energy in Factory Automation and the Role of Industrial Networks
Energy in Factory Automation and the Role of Industrial Networks ControlEng
 
중국에서 스타트업하는 육하원칙 꿀팁 유채원
중국에서 스타트업하는 육하원칙 꿀팁 유채원중국에서 스타트업하는 육하원칙 꿀팁 유채원
중국에서 스타트업하는 육하원칙 꿀팁 유채원Eva Yoo
 
Creating an Integrated Marketing Campaign for Impact and Results
Creating an Integrated Marketing Campaign for Impact and ResultsCreating an Integrated Marketing Campaign for Impact and Results
Creating an Integrated Marketing Campaign for Impact and ResultsControlEng
 
Presentation ferrari
Presentation ferrariPresentation ferrari
Presentation ferrariling_tum
 
Integrating the Marketing and Engineering Points of View in Marketing Communi...
Integrating the Marketing and Engineering Points of View in Marketing Communi...Integrating the Marketing and Engineering Points of View in Marketing Communi...
Integrating the Marketing and Engineering Points of View in Marketing Communi...ControlEng
 
State of the Industry Update and How Thriving Companies Succeed
State of the Industry Update andHow Thriving Companies SucceedState of the Industry Update andHow Thriving Companies Succeed
State of the Industry Update and How Thriving Companies SucceedControlEng
 
Social Media in the B-to-B World, Part 2
Social Media in the B-to-B World, Part 2Social Media in the B-to-B World, Part 2
Social Media in the B-to-B World, Part 2ControlEng
 
Marketing New Product Introductions in Mobility & SaaS: Ideation to Marketing...
Marketing New Product Introductions in Mobility & SaaS: Ideation to Marketing...Marketing New Product Introductions in Mobility & SaaS: Ideation to Marketing...
Marketing New Product Introductions in Mobility & SaaS: Ideation to Marketing...ControlEng
 
Industrial Branding: The Lost Art in the Industrial Marketplace
Industrial Branding: The Lost Art in the Industrial MarketplaceIndustrial Branding: The Lost Art in the Industrial Marketplace
Industrial Branding: The Lost Art in the Industrial MarketplaceControlEng
 
How to Run a Successful Integrated Marketing Program
How to Run a Successful Integrated Marketing ProgramHow to Run a Successful Integrated Marketing Program
How to Run a Successful Integrated Marketing ProgramControlEng
 

En vedette (20)

Willowglen Canada, Total SCADA Solutions
Willowglen Canada, Total SCADA SolutionsWillowglen Canada, Total SCADA Solutions
Willowglen Canada, Total SCADA Solutions
 
Musik fighters i
Musik fighters iMusik fighters i
Musik fighters i
 
The Building Blocks of Manufacturing Excellence
The Building Blocks of Manufacturing ExcellenceThe Building Blocks of Manufacturing Excellence
The Building Blocks of Manufacturing Excellence
 
Wireless Mobility
Wireless MobilityWireless Mobility
Wireless Mobility
 
Instructivo instructivo 2013
Instructivo   instructivo 2013Instructivo   instructivo 2013
Instructivo instructivo 2013
 
Gumienny Przemysław T-5 SpaceUP
Gumienny Przemysław T-5 SpaceUPGumienny Przemysław T-5 SpaceUP
Gumienny Przemysław T-5 SpaceUP
 
Presentation1
Presentation1Presentation1
Presentation1
 
Vitisens EU FP7 Project
Vitisens EU FP7 ProjectVitisens EU FP7 Project
Vitisens EU FP7 Project
 
Apex 2012 2013
Apex 2012 2013Apex 2012 2013
Apex 2012 2013
 
Energy in Factory Automation and the Role of Industrial Networks
Energy in Factory Automation and the Role of Industrial Networks Energy in Factory Automation and the Role of Industrial Networks
Energy in Factory Automation and the Role of Industrial Networks
 
중국에서 스타트업하는 육하원칙 꿀팁 유채원
중국에서 스타트업하는 육하원칙 꿀팁 유채원중국에서 스타트업하는 육하원칙 꿀팁 유채원
중국에서 스타트업하는 육하원칙 꿀팁 유채원
 
Creating an Integrated Marketing Campaign for Impact and Results
Creating an Integrated Marketing Campaign for Impact and ResultsCreating an Integrated Marketing Campaign for Impact and Results
Creating an Integrated Marketing Campaign for Impact and Results
 
Presentation ferrari
Presentation ferrariPresentation ferrari
Presentation ferrari
 
Integrating the Marketing and Engineering Points of View in Marketing Communi...
Integrating the Marketing and Engineering Points of View in Marketing Communi...Integrating the Marketing and Engineering Points of View in Marketing Communi...
Integrating the Marketing and Engineering Points of View in Marketing Communi...
 
State of the Industry Update and How Thriving Companies Succeed
State of the Industry Update andHow Thriving Companies SucceedState of the Industry Update andHow Thriving Companies Succeed
State of the Industry Update and How Thriving Companies Succeed
 
Social Media in the B-to-B World, Part 2
Social Media in the B-to-B World, Part 2Social Media in the B-to-B World, Part 2
Social Media in the B-to-B World, Part 2
 
Marketing New Product Introductions in Mobility & SaaS: Ideation to Marketing...
Marketing New Product Introductions in Mobility & SaaS: Ideation to Marketing...Marketing New Product Introductions in Mobility & SaaS: Ideation to Marketing...
Marketing New Product Introductions in Mobility & SaaS: Ideation to Marketing...
 
Industrial Branding: The Lost Art in the Industrial Marketplace
Industrial Branding: The Lost Art in the Industrial MarketplaceIndustrial Branding: The Lost Art in the Industrial Marketplace
Industrial Branding: The Lost Art in the Industrial Marketplace
 
How to Run a Successful Integrated Marketing Program
How to Run a Successful Integrated Marketing ProgramHow to Run a Successful Integrated Marketing Program
How to Run a Successful Integrated Marketing Program
 
Cdd main
Cdd mainCdd main
Cdd main
 

Similaire à Were we Just Hacked? Applying Digital Forensic Techniques for your Industrial Control Systems

TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To BasicsJoel Cardella
 
New technologies security threats (Brussels 2014)
New technologies security threats (Brussels 2014)New technologies security threats (Brussels 2014)
New technologies security threats (Brussels 2014)Alexey Kachalin
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxAkramAlqadasi1
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider ThreatsLancope, Inc.
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).pptGooglePay16
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001eaiti
 
CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookSam Bowne
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglyAlgoSec
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Wendy Knox Everette
 
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxthreat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxImXaib
 

Similaire à Were we Just Hacked? Applying Digital Forensic Techniques for your Industrial Control Systems (20)

TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
 
New technologies security threats (Brussels 2014)
New technologies security threats (Brussels 2014)New technologies security threats (Brussels 2014)
New technologies security threats (Brussels 2014)
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Chapter-2 (1).pptx
Chapter-2 (1).pptxChapter-2 (1).pptx
Chapter-2 (1).pptx
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001
 
Cyber Resiliency
Cyber ResiliencyCyber Resiliency
Cyber Resiliency
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
 
9 - Security
9 - Security9 - Security
9 - Security
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the Ugly
 
OT Solution Overview.pptx
OT Solution Overview.pptxOT Solution Overview.pptx
OT Solution Overview.pptx
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxthreat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
 

Plus de ControlEng

Digital Manufacturing and Design Innovation Institute
Digital Manufacturing and Design Innovation InstituteDigital Manufacturing and Design Innovation Institute
Digital Manufacturing and Design Innovation InstituteControlEng
 
Wireless for Stationary Applications
Wireless for Stationary ApplicationsWireless for Stationary Applications
Wireless for Stationary ApplicationsControlEng
 
Engineers: A Day in the Life
Engineers: A Day in the LifeEngineers: A Day in the Life
Engineers: A Day in the LifeControlEng
 
Industrial Ethernet, Part 2: Case Studies
Industrial Ethernet,Part 2: Case StudiesIndustrial Ethernet,Part 2: Case Studies
Industrial Ethernet, Part 2: Case StudiesControlEng
 
Industrial Ethernet, Part 1: Technologies
Industrial Ethernet, Part 1: TechnologiesIndustrial Ethernet, Part 1: Technologies
Industrial Ethernet, Part 1: TechnologiesControlEng
 
Create Marketing Engineers Love
Create Marketing Engineers LoveCreate Marketing Engineers Love
Create Marketing Engineers LoveControlEng
 

Plus de ControlEng (6)

Digital Manufacturing and Design Innovation Institute
Digital Manufacturing and Design Innovation InstituteDigital Manufacturing and Design Innovation Institute
Digital Manufacturing and Design Innovation Institute
 
Wireless for Stationary Applications
Wireless for Stationary ApplicationsWireless for Stationary Applications
Wireless for Stationary Applications
 
Engineers: A Day in the Life
Engineers: A Day in the LifeEngineers: A Day in the Life
Engineers: A Day in the Life
 
Industrial Ethernet, Part 2: Case Studies
Industrial Ethernet,Part 2: Case StudiesIndustrial Ethernet,Part 2: Case Studies
Industrial Ethernet, Part 2: Case Studies
 
Industrial Ethernet, Part 1: Technologies
Industrial Ethernet, Part 1: TechnologiesIndustrial Ethernet, Part 1: Technologies
Industrial Ethernet, Part 1: Technologies
 
Create Marketing Engineers Love
Create Marketing Engineers LoveCreate Marketing Engineers Love
Create Marketing Engineers Love
 

Dernier

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 

Dernier (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Were we Just Hacked? Applying Digital Forensic Techniques for your Industrial Control Systems

  • 1. Were we Just Hacked? Applying Digital Forensic Techniques for your Industrial Control Systems
  • 2. • Matt Luallen , Co-Founder, Dragos Security LLC • Robert M. Lee, Co-Founder, Dragos Security LLC • Peter Welander, Content Manager, Control Engineering, CFE Media Speakers:
  • 3. Were we Just Hacked? Applying Digital Forensic Techniques for your Industrial Control Systems Matt E. Luallen and Robert M. Lee
  • 4. 1. Identifying a Compromise • How to determine you’ve been hacked – What are simple things you can do NOW to detect – Capabilities of hackers and general attack scenario • Be cautious in performing an active response immediately! – Keep in mind that the indication may be an outcome of months of backdoors or possibly just a false indicator
  • 5. Hacked – assumptions • At this time you must assume two things – Your communications and capabilities are being eavesdropped upon – Your assets can be denied service or misused • Does the hack immediately appear as if it can impact the entire operation? Could there be loss of life? Are you authorized to perform any changes such as the extreme situation of taking the operations offline? Do you have an out of band communication capability?
  • 6. 2. What’s Next? • After you’ve been compromised: – Tools available to identify and analyze intrusions – Handling “too much” data – Contact the right people • Internal • Trusted Peers • Vendors • Government
  • 7. Trustworthiness Validation • Interview personnel for history of odd behavior – (e.g. strange emails, system behavior, phone calls, control operations) • Physical facility inspections – Any devices and attributes that are abnormal • Review and compare system baselines to active host settings – Host images (Windows, *nix, Applications) – Processed logic – Device firmware – Network communications • Review operational logs for indicators – Historian, OPC, HMI, IT system logging and any other log-enabled device • Do you have mechanisms to compare active systems to known good images and communication profiles? • What if you do not have the capabilities in house? – Do you have an outsourcing agreement in place to manage incidents?
  • 8. 3. How Do We Prepare? • Preparing before or after the compromise – Tools for monitoring traffic – Creating chokepoints and understanding – Questions to ask to determine your readiness • Future Efforts and Research Needed – PLC/PAC/Embedded Device specific tools – Validation, customization, and testing of known methodologies/tools
  • 9. Follow on discussions at: www.DragosSecurity.com
  • 10. • Matt Luallen , Co-Founder, Dragos Security LLC • Robert M. Lee, Co-Founder, Dragos Security LLC • Peter Welander, Content Manager, Control Engineering, CFE Media Speakers:
  • 11. Were we Just Hacked? Applying Digital Forensic Techniques for your Industrial Control Systems