SlideShare une entreprise Scribd logo
1  sur  16
Why SCADA, ICS
& Embedded
Devices continue
to be a threat
DUMB SECURITY & SMART GRIDSDUMB SECURITY & SMART GRIDSDUMB SECURITY & SMART GRIDS
Faris A. Al-Kharusi, MPhil, MSc., GWCBA
AGENDA
SCADA, ICS & Embedded Devices
• Evolution of theThreat
• Industry Standards vs. Residential Realities
Specific Contemporary Challenges
• The {C}oldWar
• Paradigm Shift
CybersecurityWorld-View
• Weak vs. Strong Implementations
• The Real Calculation of Risk (InformationAssurance)
Do’s & Don’t of Smart Projects
• Data Storage & Security Policy
• Knowledge & Competency
• BCP & DRP
AGENDA
The Story So Far
• Hard-Coded Passwords.
• Hard-Coded Firmware (Exploits
can not be patched!)
• Lack of belief that critical
infrastructure is internet-facing.
• Reconnaissance can be done
anonymously with low likelihood
of detection.
• Lack of skill-sets to conduct
forensics minimize reporting on
intrusions.
Evolution of theThreat: How We Got Here
– Complex interdependencies
arose …
– The IP/TCP Landscape has
opened the doors to ease of
setup since the early 80’s ...
Evolution of theThreat: GlobalView
– Bacnet (port 47808)
– DNP3 (port 20000)
– EtherNet/IP (port 44818)
– Niagara Fox (ports 1911 )
– IEC-104 (port 2404)
– Red Lion (port 789)
– Modbus (port 502)
– Siemens S7 (port 102)
AndThe Internet ofThings Grows Regionally
UPnP - UDP Port 1900
- Mobile Devices
- CCTV
- Biometric Readers
- Energy Generators
- Card Readers
- Appliances
- POS Kiosks
- Routers
- Printers
- And the list goes on …
Industry Standards
The “Perfect
Landscape” as
conveyed in our
security centric
minds …
Residential Outlook
And the current
reality …
The {C}oldWar
Paradigm Shift
Real-TimeOperations:Weak Implementations
Sifting through Events
Real-TimeOperations: Strong Implementations
IntelligentAlarms & Exception Based Surveillance
The Real Calculation of Risk
Risk =
Threat x
Vulnerability x
Consequence
Stop fighting yesterday’s war today . . .
The Do’s
• Understand consequence of your
vulnerabilities.
• Use Local Clouds – keep ownership
of your Data.
• Think clearly about your Data
Analytics strategy as it pertains
guarding your assets.
The Don’ts
• Stop treating your security
decision’s like it is 2005.
• Outsource all the knowledge and
competency (especially around
forensics) to a third-party.
• Expect proprietary or complex
setups to provide protection.
ThankYou &
Feel FreeTo
Ask Questions

Contenu connexe

Tendances

Tendances (7)

Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeter
 
The design and implementation of intelligent campus security tracking system ...
The design and implementation of intelligent campus security tracking system ...The design and implementation of intelligent campus security tracking system ...
The design and implementation of intelligent campus security tracking system ...
 
UMC FTSG Software
UMC FTSG SoftwareUMC FTSG Software
UMC FTSG Software
 
Airport as a Smartcity - Naftemporiki IoT 2016
Airport as a Smartcity - Naftemporiki IoT 2016Airport as a Smartcity - Naftemporiki IoT 2016
Airport as a Smartcity - Naftemporiki IoT 2016
 
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection Sy...
 
Towards Better Availability and Accountability for IoT Updates by means of a ...
Towards Better Availability and Accountability for IoT Updates by means of a ...Towards Better Availability and Accountability for IoT Updates by means of a ...
Towards Better Availability and Accountability for IoT Updates by means of a ...
 
Microcontrollers disruption v9.0
Microcontrollers disruption v9.0Microcontrollers disruption v9.0
Microcontrollers disruption v9.0
 

Similaire à Smart Grids & Dumb Security => A Guide For Business Managers

Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSU
Mohit Rampal
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
2012 Reenergize the Americas 3B: Angel Avila
2012 Reenergize the Americas 3B: Angel Avila2012 Reenergize the Americas 3B: Angel Avila
2012 Reenergize the Americas 3B: Angel Avila
Reenergize
 

Similaire à Smart Grids & Dumb Security => A Guide For Business Managers (20)

Stories from the Trainyard!
Stories from the Trainyard!Stories from the Trainyard!
Stories from the Trainyard!
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?
 
2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation
 
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteGus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
 
Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7
 
Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware Dragos and CyberWire: ICS Ransomware
Dragos and CyberWire: ICS Ransomware
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Big Data for Big Power: How smart is the grid if the infrastructure is stupid?
Big Data for Big Power:  How smart is the grid if the infrastructure is stupid?Big Data for Big Power:  How smart is the grid if the infrastructure is stupid?
Big Data for Big Power: How smart is the grid if the infrastructure is stupid?
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
 
CCTV in the CLOUD
CCTV in the CLOUDCCTV in the CLOUD
CCTV in the CLOUD
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSU
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
DataBeers Malaga #20 especial datos y ciberseguridad- Fundamentals of Data Se...
DataBeers Malaga #20 especial datos y ciberseguridad- Fundamentals of Data Se...DataBeers Malaga #20 especial datos y ciberseguridad- Fundamentals of Data Se...
DataBeers Malaga #20 especial datos y ciberseguridad- Fundamentals of Data Se...
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
2012 Reenergize the Americas 3B: Angel Avila
2012 Reenergize the Americas 3B: Angel Avila2012 Reenergize the Americas 3B: Angel Avila
2012 Reenergize the Americas 3B: Angel Avila
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Big data, security, and the cloud
Big data, security, and the cloudBig data, security, and the cloud
Big data, security, and the cloud
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Smart Grids & Dumb Security => A Guide For Business Managers

  • 1.
  • 2. Why SCADA, ICS & Embedded Devices continue to be a threat DUMB SECURITY & SMART GRIDSDUMB SECURITY & SMART GRIDSDUMB SECURITY & SMART GRIDS Faris A. Al-Kharusi, MPhil, MSc., GWCBA
  • 3. AGENDA SCADA, ICS & Embedded Devices • Evolution of theThreat • Industry Standards vs. Residential Realities Specific Contemporary Challenges • The {C}oldWar • Paradigm Shift CybersecurityWorld-View • Weak vs. Strong Implementations • The Real Calculation of Risk (InformationAssurance) Do’s & Don’t of Smart Projects • Data Storage & Security Policy • Knowledge & Competency • BCP & DRP AGENDA
  • 4. The Story So Far • Hard-Coded Passwords. • Hard-Coded Firmware (Exploits can not be patched!) • Lack of belief that critical infrastructure is internet-facing. • Reconnaissance can be done anonymously with low likelihood of detection. • Lack of skill-sets to conduct forensics minimize reporting on intrusions.
  • 5. Evolution of theThreat: How We Got Here – Complex interdependencies arose … – The IP/TCP Landscape has opened the doors to ease of setup since the early 80’s ...
  • 6. Evolution of theThreat: GlobalView – Bacnet (port 47808) – DNP3 (port 20000) – EtherNet/IP (port 44818) – Niagara Fox (ports 1911 ) – IEC-104 (port 2404) – Red Lion (port 789) – Modbus (port 502) – Siemens S7 (port 102)
  • 7. AndThe Internet ofThings Grows Regionally UPnP - UDP Port 1900 - Mobile Devices - CCTV - Biometric Readers - Energy Generators - Card Readers - Appliances - POS Kiosks - Routers - Printers - And the list goes on …
  • 8. Industry Standards The “Perfect Landscape” as conveyed in our security centric minds …
  • 9. Residential Outlook And the current reality …
  • 14. The Real Calculation of Risk Risk = Threat x Vulnerability x Consequence
  • 15. Stop fighting yesterday’s war today . . . The Do’s • Understand consequence of your vulnerabilities. • Use Local Clouds – keep ownership of your Data. • Think clearly about your Data Analytics strategy as it pertains guarding your assets. The Don’ts • Stop treating your security decision’s like it is 2005. • Outsource all the knowledge and competency (especially around forensics) to a third-party. • Expect proprietary or complex setups to provide protection.

Notes de l'éditeur

  1. Courtesy Threat Toons
  2. Courtesy Threat Toons
  3. Image courtesy of Mark Fabro
  4. Image courtesy of SHODAN 2014
  5. Courtesy of SHODAN 2015
  6. Image courtesy of ATOS Origin
  7. Courtesy of Norton (2013)
  8. Courtesy of Google Images
  9. Courtesy of PlanX
  10. Courtesy of Mark Fabro