1 / 23

SCADA Security

SCADA Security. Supervisory Control and Data Acquisition Mr Mark Rydell. SCADA Lesson. What is SCADA? Why is SCADA Security important? How SCADA Systems Evolved. SCADA systems. SCADA – Supervisory Control and Data Acquisition

kamilia
Télécharger la présentation

SCADA Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SCADA Security Supervisory Control and Data Acquisition Mr Mark Rydell

  2. SCADA Lesson • What is SCADA? • Why is SCADA Security important? • How SCADA Systems Evolved

  3. SCADA systems • SCADA – Supervisory Control and Data Acquisition • SCADA systems are vital components of most nation’s critical infrastructures • SCADA systems control: • Gas pipelines • Water and wastewater systems • Transportation systems • Electrical Utilities • Refineries and chemical plants • Manufacturing operations

  4. SCADA Systems SCADA systems are intended to provide a human operator with updated real-time information about the current state of the remote process being monitored, as well as the ability to manipulate the process remotely. William T. Shaw

  5. SCADA Systems • Used to monitor and remotely control critical industrial processes • Industrial control systems (ICS) • SCADA systems • Distributed Control Systems (DCS) • Programmable Logic Controllers (PLC) • SCADA Components • Master Terminal Unit (Architecture unique) • Human Machine Interface • Remote Terminal Unit • Communications

  6. SCADA Systems • Highly distributed • Geographically separated assets • Centralized data acquisition and control are critical • Oil and gas pipelines • Electrical power grids • Railway transportation systems • Field devices control local operations

  7. Distributed Control System • Supervisory control of multiple integrated systems responsible for a local process • DCSs used extensively in process-based industries • Examples: • Oil and gas refineries • Electrical power generation • Automotive production • Feedback loops maintain set points • Programmable logic controllers used in the field

  8. Programmable Logic Controllers • Computer based solid state devices • Control industrial equipment and processes • Regulate process flow • Automobile assembly line

  9. SCADA, DCS or PLCCompare and Contrast • Location • SCADA – geographically dispersed • DCS and PLC – factory centered • Communications • SCADA – long distance, slow speed • DCS and PLC – LAN, high speed • Control • SCADA – supervisory level • DCS and PLC – closed feedback loops

  10. SCADA – Why the emphasis? • SCADA Supports Critical Infrastructures • 80-90% of critical infrastructures (CI) are privately owned and operated • Critical to National survival and prosperity, yet dependent on industries driven by profit, not security

  11. SCADA – Why the emphasis? • Many challenges exist when securing SCADA • Complex systems…patching, rebooting, authentication • Preponderance of legacy hardware, software and transmission protocols ($) • Multiple and divers access points…by design…radio, wireless, phone • The need to connect to business network • The Cyberwar Plan. Article by Shane Harris, Saturday, Nov. 14, 2009: President Obama confirmed that cyber-warriors have aimed at American networks. "We know that cyber-intruders have probed our electrical grid," he said at the White House in May, when he unveiled the next stage of the national cyber-security strategy. The president also confirmed, for the first time, that the weapons of cyberwar had claimed victims. "In other countries, cyberattacks have plunged entire cities into darkness." • Video

  12. SCADA Evolution • 1960s – Integrated Circuit led to minicomputers capable of computer control of processes • Confined to one physical location • Not connected to an external network • Local area network • Closed loop control • Proprietary protocols

  13. SCADA Evolution • 1960 -1980s – Central Architectures • Single powerful computer performing all functions • 2nd identical computer for redundancy

  14. SCADA Evolution • 1980s to present – Distributed Architectures • Multiple computers networked together with each performing a specific function • LAN improvements – practical and possible • Functions: • Remote terminal polling • Complex applications processing • Historian – data archiving and trending • Graceful degradation

  15. SCADA Evolution • 1990s to present – Client/Server • Powerful PCs • TCP/IP networking • High speed Ethernet • Commercial real-time operating systems • Looking more like IT systems • Scalable and fault tolerant • Smart software makes redundancy easy

  16. SCADA Evolution • Human Machine Interface • Printouts • Map board • Mimic panel • Video projection technology

  17. SCADA EvolutionHMI Example

  18. SCADA Evolution • Remote Terminal Unit • Electronic devices located at key measurement and control points • Originally hardwired devices with limited capabilities and one proprietary communications protocol • Modern RTUs contain their own microprocessors and can support multiple sophisticated protocols

  19. SCADA Evolution • Communications • Initially used telephone systems and radio transmitters designed for voice • Slow • Some remote areas had to build their own communication systems • Latest systems are digital networks designed to transfer data • TCP/IP • Wireless including cellular and satellite

  20. SCADA Evolution Summary • SCADA systems are based on computer technology so they have evolved with computer technology • New technologies have also been introduced to SCADA systems • Huge decreases in proprietary nature

  21. SCADA Evolution Summary • The Good News • Cheaper • Interoperable between vendors • Larger pool of available workers • The Bad News • Susceptible to malware, hackers and cyber attacks • We can’t go back. We must provide secure designs for now & the future

  22. And Finally…. (CBS Transcript) Nothing has ever changed the world as quickly as the Internet has. Less than a decade ago, "60 Minutes“ went to the Pentagon to do a story on something called information warfare, or cyber war as some people called it. It involved using computers and the Internet as weapons. Much of it was still theory, but we were told that before too long it might be possible for a hacker with a computer to disable critical infrastructure in a major city and disrupt essential services, to steal millions of dollars from banks all over the world, infiltrate defense systems, extort millions from public companies, and even sabotage our weapons systems. Today it's not only possible, all of that has actually happened, plus a lot more we don't even know about. It's why President Obama has made cyber war defense a top national priority and why some people are already saying that the next big war is less likely to begin with a bang than a blackout. "Can you imagine your life without electric power?" Retired Admiral Mike McConnell asked correspondent Steve Kroft. Until February of this year, McConnell was the nation's top spy. As chief of national intelligence, he oversaw the Central Intelligence Agency, the Defense Intelligence Agency and the National Security Agency. Few people know as much about cyber warfare, and our dependency on the power grid, and the computer networks that deliver our oil and gas, pump and purify our water, keep track of our money, and operate our transportation systems. "If I were an attacker and I wanted to do strategic damage to the United States, I would either take the cold of winter or the heat of summer, I probably would sack electric power on the U.S. East Cost, summer, I probably would sack electric power on the U.S. East Cost, maybe the West Coast, and attempt to cause a cascading effect. All of those things are in the art of the possible from a sophisticated attacker," McConnell explained.

  23. And Finally…. "Do you believe our adversaries have the capability of bringing down a power grid?" Kroft asked. "I do," McConnell replied. Asked if the U.S. is prepared for such an attack, McConnell told Kroft, "No. The United States is not prepared for such an attack."

More Related