This document discusses security issues with SCADA (Supervisory Control and Data Acquisition) systems. SCADA systems are used to control critical infrastructure like water treatment plants, oil and gas pipelines, electrical grids, and nuclear power plants. However, SCADA systems often have weak security protections due to using outdated protocols and hardware that cannot be easily upgraded. This makes SCADA networks vulnerable to attacks that could disrupt important systems and endanger public safety. The document outlines several past attacks on SCADA networks and control systems that demonstrate these risks. Improving SCADA security will require collaboration between different fields like control systems engineering and cybersecurity.
Cyber Security: Differences between Industrial Control Systems and ICT Approach
This document discusses the differences between industrial control systems (ICS) and information technology (IT) in terms of cyber security. ICS are used in industrial production to control systems like SCADA and DCS, while IT refers to general business computing. Key differences are that ICS have stricter availability requirements, longer lifecycles, proprietary protocols and specialized software. The document also notes that modern ICS now leverage more off-the-shelf IT components and standards, making them more interconnected and vulnerable to cyber threats like hacking. Finally, it presents ABB's approach to ICS cyber security which includes assessment, first aid services, monitoring with Industrial Defender, and lifelong maintenance through assessment and training.
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems face security threats due to outdated protocols with no encryption, long lifespans of 40 years without updates, and systems left unpatched due to maintainability concerns. The researcher worked on a European project with an Austrian electrical distributor to access a real-world testbed. Using custom plugins, they were able to launch a man-in-the-middle attack to hide an earth fault from operators by spoofing ARP packets and manipulating traffic. Signature-based detection is insufficient for ICS/SCADA systems, so anomaly detection using machine learning is being explored to identify suspicious traffic like malware or backdoors on the typically consistent and predictable ICS
The document discusses whether patching control systems is an effective security practice given the challenges of securing industrial control systems. It makes three key points:
1. Patching insecure-by-design devices provides minimal risk reduction since attackers can achieve their goals by exploiting legitimate system features rather than vulnerabilities.
2. Most industrial control systems operate within an insecure-by-design zone, so patching may not prevent attacks since attackers do not need to exploit systems to cause damage.
3. Many control system components have low impact even if compromised, so patching provides little benefit given the effort. Prioritizing patching for systems directly accessible from untrusted networks is recommended over broadly patching everything.
The document discusses cyber security issues related to industrial control systems (ICS) and critical infrastructures. It notes the increasing interdependence between critical infrastructures and the potential for cyber threats to cause disruptions. The document outlines the heterogeneous nature of ICS/SCADA environments and some historical reasons they were considered secure. However, technological changes like increased connectivity now expose these systems to threats. The document advocates a "defense-in-depth" approach to secure ICS, including segregating networks, controlling remote access, and adopting security practices from frameworks. Failure to properly secure ICS could allow threats to cause availability issues, data loss or corruption, and operational disruptions impacting public safety.
This document provides guidance for securing industrial control systems such as SCADA and DCS. It identifies threats and vulnerabilities to these systems and recommends security countermeasures. ICSs often control critical infrastructure systems and face risks due to increased network connectivity and standardized protocols. The document outlines developing a security program including assessing risks, deploying controls, and network segmentation best practices to isolate control systems from other networks.
Presented at ISACA's EuroCACS 2015 (Copenhaguen).
Understand the impact of Industrial Control Systems (ICS) on the security ecosystem.
Expand the knowledge on SCADA systems and how cyberattacks can have physical consequences, bridging the cyber and physical worlds.
This document summarizes a presentation on cyber security in real-time systems. It discusses threats to industrial control systems and SCADA systems, and the differences between traditional IT and industrial control system cultures. It provides examples of attacks on industrial control systems and poor monitoring of SCADA systems. It suggests that security operations centers may provide common ground between IT and ICS. Finally, it discusses recent media reports relating to hacking of rail signaling systems and aircraft systems.
This talk is about how to get into ICS security, whether you’re a control system engineer or an IT security analyst. It will cover the basic paths you can take to get involved, including some helpful resources and standards to help get you started. The ICS Security industry needs more people to help protect Critical Infrastructure!
This slideshow was presented February 2, 2016 and developed for the Iowa Infragard team and discusses the Importance of Security Cyber-Physical Control systems, Elements of a control system, the manufacturing supply chain and consequences of cyber attacks in industrial environments. Please feel free to reach out with questions or comments.
Industrial control systems (ICS) are used to control industrial processes and manufacturing equipment. They face unique security challenges compared to traditional IT systems due to their real-time operation and custom hardware and software. This document discusses several past ICS cyber attacks and identifies vulnerabilities in ICS security architecture, configuration management, patch management, and change testing. Proper ICS security requires a cross-functional team approach and careful management of the specialized ICS environment.
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
This webinar will help you get more informed on PenTesting in SCADA and also best practices and methods used on risk assessment. Learning about the criticality in industry, makes you more flexible to boost the skills.
Main points covered:
• The SCADA ICS function in critical infrastructure industry
• Risk exposure of IT vs. SCADA ICS from Cyber Security Perspective
• Do's and don’ts of Vulnerability Assessment and Penetration Testing in SCADA ICS Environment
Presenter:
This webinar was presented by Pedro Putu Wirya, an IT and ICS Security Consultant with an extensive experience in ISMS, and PECB Certified Trainer.
Link of the recorded session published on YouTube: https://youtu.be/icq-RTwusZ8
With the new Industrial Network standards like ISA-IEC62443 companies are evolving their IT and OT networks to face evolving threats. This presentation will cover industrial networking best practices, secure architectures and segregation techniques that can be used by all businesses to prevent a minor business network breach from becoming an industrial catastrophe.
Topics Covered in this Seminar Include:
Overview Of Cyber Threat
Introduction - ISA IEC Industrial Control Security Standards
An Example - Advanced Persistent Threat (APT)
ISA/IEC 62443-3-2 Network Separation - An APT countermeasure
The next step in APT defenses System Certification to ISA/IEC 62443 Cybersecurity Standards
ISA/IEC 62443 Cybersecurity Standards Current Efforts
The Future of ISA/IEC 62443 Cybersecurity Standards
Industrial Control Security USA Sacramento California Oct 13/14
This document provides information about the Industrial Control Cybersecurity conference to be held on October 13-14, 2015 in Sacramento, California. The conference will address key topics such as vulnerability detection and mitigation in critical infrastructure sectors like energy, oil, gas, electric and water. It will feature presentations from industry and government leaders as well as cybersecurity experts. The goal is to enhance public-private collaboration and information sharing to improve security of national infrastructure systems.
This document discusses cyber security concerns regarding smart grid technology integration. It outlines how increased data sharing and connectivity between new and legacy systems introduces new cyber vulnerabilities. It then summarizes existing cyber security standards from organizations like ISO, NERC, and IEC that can provide frameworks for addressing these vulnerabilities. Finally, it notes challenges integrating new technologies with legacy systems and the need for a strategic roadmap to help guide secure technology adoption.
Practical Approaches to Securely Integrating Business and Production
Presented @ 2016 ISA Process Control & Safety Symposium, November 10, 2016
The exchange of key information between business operations, suppliers, customers, production, and ultimately the production equipment itself can provide significant financial and productivity advantages. This presentation will discuss some practical approaches to utilizing the cyber security principles from ISA/IEC 62443 in order to integrate the business and production environments. It will also present some of the different solutions for meeting a variety of scenarios, such as data historians, patching/updating, and remote maintenance.
In today’s connected world, cyber security is a topic that nobody can afford to ignore. In recent years the number and frequency of attacks on industrial devices and other critical infrastructure has risen dramatically. Recent news stories about hackers shutting down critical infrastructure have left many companies wondering if they are vulnerable to similar attacks. In this webinar we will discuss the most common security threats and unique challenges in securing industrial networks. We will introduce the current standards and share some useful resources and best practices for addressing industrial cyber security.
Key Takeaways:
1. Gain perspective regarding common security threats facing industrial networks.
2. Learn about the relevant standards governing industrial cyber security.
3. Increase understanding of some best practices for securing industrial networks.
The document discusses cyber security risks for SCADA systems used in water and wastewater treatment plants. Modern SCADA systems now use open network protocols and wireless connectivity, leaving them vulnerable to attacks. The most destructive cyber attack targeted Siemens PLCs at an Iranian nuclear facility using a infected USB drive. If a water treatment plant's SCADA system is compromised, it could lead to over or under dosing of chemicals, loss of water pressure, or disabled alarms. Mott MacDonald offers cyber security risk analyses and programs to help clients address vulnerabilities and obtain federal funding to implement solutions.
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
This presentation explains the ANSI/ISA-99 and IEC 62443 standards for industrial control systems (ICS). It describes the Zone and Conduit security model and how it is used in an plant or factory. As well, the issues of security configuration errors are discussed. A case history of zone security deployment for a Safety Integrated System in a refinery is provided. For additional information see www.tofinosecurity.com.
Electrical protective or emergency shutdown systems are utilized
throughout the petrochemical industry for safety and to avoid severe environmental and/or economic events. Requirements
fur these critical systems are that they work every time, on demand, and do not initiate nuisance events. These requirements were difficult to achieve in most early systems but the systems have improved over the years. Emergency shutdown system design has been unregulated in the U.S., but new standards will require strict guidelines for design, application, docllmentation, and software testing and control.
SCADA systems are used to monitor and control equipment and processes in industries like oil/gas, water treatment, and manufacturing. They gather data in real-time from remote locations and send control commands back. SCADA has evolved through 3 generations from standalone monolithic systems to distributed systems on local networks to today's networked systems using open standards and wide area networks. Security issues need to be addressed like encrypting communications, securing devices, auditing networks, and implementing threat protection. The future of SCADA involves more sophisticated systems that can handle huge data volumes and territories with some having artificial intelligence capabilities.
This document provides an overview of SCADA (Supervisory Control and Data Acquisition) systems, including basic terminology, components, architecture, communication protocols, applications, security vulnerabilities, and threats. It defines sensors, actuators, relays, PLCs, HMIs, RTUs. It describes the typical SCADA architecture with a master system collecting data from remote units via communication networks. Examples of common industrial protocols like Modbus are provided. Applications of SCADA for monitoring, control, alarm handling and data logging are outlined. Security risks from malware, insiders, hackers and terrorists exploiting vulnerabilities in old operating systems and web interfaces are summarized. The 2015 Ukraine grid cyberattack is reviewed as a case study.
This document discusses trends in threats to SCADA (Supervisory Control and Data Acquisition) systems. It notes that as SCADA systems increasingly use commercial off-the-shelf software and connect to the internet, they have become more vulnerable to cyber threats. The document outlines how SCADA systems work and components like RTUs, PLCs, and HMIs. It also discusses issues like the mistaken belief that SCADA systems are secure due to physical security or isolation from the internet. The conclusion suggests that as capabilities and opportunities for threats increase, the future operational environment will be more vulnerable if an actor emerges with the intent to cause harm.
The document provides an overview of control systems security from the perspective of the U.S. Department of Homeland Security. It discusses critical infrastructure sectors, risk drivers like modernization and globalization, vulnerability lifecycles, findings from control system assessments, and several cyber incidents involving control systems that impacted industrial operations. The department works to improve control system security through assessments, training, partnerships with industry, and developing guidance on topics like cyber forensics and firewall deployment.
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...
For a number of years, some industries have used UPSs as a matter of course in applications requiring
uninterrupted process control. These include power-generation facilities, both fossil and nuclear, and petrochemical
plants and refineries.
Recently, other types of industrial companies (pulp and paper mills, steel mills, pharmaceutical manufacturing and
cogeneration facilities) have created a need for UPSs by incorporating DCSs into their plants to control their
processes. Additional control equipment, such as supervisory control and data acquisition (SCADA) systems,
energy management systems (EMSs), boiler-control and microprocessor-based instrumentation, give power
protection an even more important role in industry.
This document provides an introduction to the Table Definition Language (TDL) and Exchange Data Language (EDL) for use by Advanced Metering Infrastructure (AMI) systems deployed using ANSI C12.19 tables and ANSI C12.22 networks. It defines key terms related to AMI, time-based pricing, load control, performance metrics, auditing, and legal units of measure. The presentation also outlines the TDL and EDL documents and import/export process, and discusses benefits of registering ANSI C12.19 data models using TDL and EDL.
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
Supervisory control and data acquisition (SCADA) systems have their own constrains and specifications. These systems control many of our critical industrial infrastructures, yet they are hardly secured. The biggest problem in securing these systems is the lack of cryptography support especially that most SCADA systems work in real-time which is not compatible with most cryptography algorithms. Additionally, a SCADA network may include a huge amount of embedded devices with little computational powers which adds to the cost of any security improvement. In this paper we present a new approach that would secure SCADA communications by coding information without the need of the complex cryptography algorithms. The reconfigurable information transmitter agent (RITA) protocol that we present does not need the already installed devices to be modified nor replaced, it only needs to add costless electrical chips to these devices. This approach can also be used to secure any type of communication that respects the protocol's constraints.
Industrial control systems like SCADA are critical to national infrastructure but pose security challenges. They control crucial systems like pipelines and electrical utilities. While initially proprietary, SCADA systems now use open standards and IT components, making them vulnerable to cyber attacks which could have catastrophic impacts. A defense-in-depth strategy is needed, combining network segmentation, firewalls, log collection, and host and network intrusion prevention/detection to secure these vital systems.
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMJim Gilsinn
This document discusses network reliability monitoring as a complement to network security monitoring (NSM) and security information and event management (SIEM) for industrial control systems. It notes that while NSM works well for monitoring traffic crossing between zones in ICS networks, it is less effective in lower level zones where most traffic remains internal. Network reliability monitoring provides an alternative by developing profiles of normal network traffic and scanning for deviations that could indicate issues. While complex algorithms are not needed, it requires strong protocol knowledge and root cause analysis can be difficult. Examples are given showing network reliability metrics and how man-in-the-middle attacks did not significantly impact traffic.
This document provides an overview of SCADA (Supervisory Control and Data Acquisition) security challenges and strategies. It describes common SCADA system components and functionality. It then discusses increasing cyber threats to SCADA systems from sources like hostile governments and employees. The document outlines various physical and cyber vulnerabilities in SCADA systems and components. It recommends security standards from organizations like NIST, ISA, and NERC to help mitigate risks. The document also provides guidelines on physical asset security and cybersecurity strategies.
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
This document discusses the differences between industrial control systems (ICS) and information technology (IT) in terms of cyber security. ICS are used in industrial production to control systems like SCADA and DCS, while IT refers to general business computing. Key differences are that ICS have stricter availability requirements, longer lifecycles, proprietary protocols and specialized software. The document also notes that modern ICS now leverage more off-the-shelf IT components and standards, making them more interconnected and vulnerable to cyber threats like hacking. Finally, it presents ABB's approach to ICS cyber security which includes assessment, first aid services, monitoring with Industrial Defender, and lifelong maintenance through assessment and training.
Industrial Control System Security Overviewpgmaynard
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems face security threats due to outdated protocols with no encryption, long lifespans of 40 years without updates, and systems left unpatched due to maintainability concerns. The researcher worked on a European project with an Austrian electrical distributor to access a real-world testbed. Using custom plugins, they were able to launch a man-in-the-middle attack to hide an earth fault from operators by spoofing ARP packets and manipulating traffic. Signature-based detection is insufficient for ICS/SCADA systems, so anomaly detection using machine learning is being explored to identify suspicious traffic like malware or backdoors on the typically consistent and predictable ICS
The document discusses whether patching control systems is an effective security practice given the challenges of securing industrial control systems. It makes three key points:
1. Patching insecure-by-design devices provides minimal risk reduction since attackers can achieve their goals by exploiting legitimate system features rather than vulnerabilities.
2. Most industrial control systems operate within an insecure-by-design zone, so patching may not prevent attacks since attackers do not need to exploit systems to cause damage.
3. Many control system components have low impact even if compromised, so patching provides little benefit given the effort. Prioritizing patching for systems directly accessible from untrusted networks is recommended over broadly patching everything.
The document discusses cyber security issues related to industrial control systems (ICS) and critical infrastructures. It notes the increasing interdependence between critical infrastructures and the potential for cyber threats to cause disruptions. The document outlines the heterogeneous nature of ICS/SCADA environments and some historical reasons they were considered secure. However, technological changes like increased connectivity now expose these systems to threats. The document advocates a "defense-in-depth" approach to secure ICS, including segregating networks, controlling remote access, and adopting security practices from frameworks. Failure to properly secure ICS could allow threats to cause availability issues, data loss or corruption, and operational disruptions impacting public safety.
This document provides guidance for securing industrial control systems such as SCADA and DCS. It identifies threats and vulnerabilities to these systems and recommends security countermeasures. ICSs often control critical infrastructure systems and face risks due to increased network connectivity and standardized protocols. The document outlines developing a security program including assessing risks, deploying controls, and network segmentation best practices to isolate control systems from other networks.
Presented at ISACA's EuroCACS 2015 (Copenhaguen).
Understand the impact of Industrial Control Systems (ICS) on the security ecosystem.
Expand the knowledge on SCADA systems and how cyberattacks can have physical consequences, bridging the cyber and physical worlds.
This document summarizes a presentation on cyber security in real-time systems. It discusses threats to industrial control systems and SCADA systems, and the differences between traditional IT and industrial control system cultures. It provides examples of attacks on industrial control systems and poor monitoring of SCADA systems. It suggests that security operations centers may provide common ground between IT and ICS. Finally, it discusses recent media reports relating to hacking of rail signaling systems and aircraft systems.
Hacker Halted 2016 - How to get into ICS securityChris Sistrunk
This talk is about how to get into ICS security, whether you’re a control system engineer or an IT security analyst. It will cover the basic paths you can take to get involved, including some helpful resources and standards to help get you started. The ICS Security industry needs more people to help protect Critical Infrastructure!
This slideshow was presented February 2, 2016 and developed for the Iowa Infragard team and discusses the Importance of Security Cyber-Physical Control systems, Elements of a control system, the manufacturing supply chain and consequences of cyber attacks in industrial environments. Please feel free to reach out with questions or comments.
Industrial control systems (ICS) are used to control industrial processes and manufacturing equipment. They face unique security challenges compared to traditional IT systems due to their real-time operation and custom hardware and software. This document discusses several past ICS cyber attacks and identifies vulnerabilities in ICS security architecture, configuration management, patch management, and change testing. Proper ICS security requires a cross-functional team approach and careful management of the specialized ICS environment.
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
This webinar will help you get more informed on PenTesting in SCADA and also best practices and methods used on risk assessment. Learning about the criticality in industry, makes you more flexible to boost the skills.
Main points covered:
• The SCADA ICS function in critical infrastructure industry
• Risk exposure of IT vs. SCADA ICS from Cyber Security Perspective
• Do's and don’ts of Vulnerability Assessment and Penetration Testing in SCADA ICS Environment
Presenter:
This webinar was presented by Pedro Putu Wirya, an IT and ICS Security Consultant with an extensive experience in ISMS, and PECB Certified Trainer.
Link of the recorded session published on YouTube: https://youtu.be/icq-RTwusZ8
Secure Systems Security and ISA99- IEC62443Yokogawa1
With the new Industrial Network standards like ISA-IEC62443 companies are evolving their IT and OT networks to face evolving threats. This presentation will cover industrial networking best practices, secure architectures and segregation techniques that can be used by all businesses to prevent a minor business network breach from becoming an industrial catastrophe.
Topics Covered in this Seminar Include:
Overview Of Cyber Threat
Introduction - ISA IEC Industrial Control Security Standards
An Example - Advanced Persistent Threat (APT)
ISA/IEC 62443-3-2 Network Separation - An APT countermeasure
The next step in APT defenses System Certification to ISA/IEC 62443 Cybersecurity Standards
ISA/IEC 62443 Cybersecurity Standards Current Efforts
The Future of ISA/IEC 62443 Cybersecurity Standards
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
This document provides information about the Industrial Control Cybersecurity conference to be held on October 13-14, 2015 in Sacramento, California. The conference will address key topics such as vulnerability detection and mitigation in critical infrastructure sectors like energy, oil, gas, electric and water. It will feature presentations from industry and government leaders as well as cybersecurity experts. The goal is to enhance public-private collaboration and information sharing to improve security of national infrastructure systems.
This document discusses cyber security concerns regarding smart grid technology integration. It outlines how increased data sharing and connectivity between new and legacy systems introduces new cyber vulnerabilities. It then summarizes existing cyber security standards from organizations like ISO, NERC, and IEC that can provide frameworks for addressing these vulnerabilities. Finally, it notes challenges integrating new technologies with legacy systems and the need for a strategic roadmap to help guide secure technology adoption.
Practical Approaches to Securely Integrating Business and ProductionJim Gilsinn
Presented @ 2016 ISA Process Control & Safety Symposium, November 10, 2016
The exchange of key information between business operations, suppliers, customers, production, and ultimately the production equipment itself can provide significant financial and productivity advantages. This presentation will discuss some practical approaches to utilizing the cyber security principles from ISA/IEC 62443 in order to integrate the business and production environments. It will also present some of the different solutions for meeting a variety of scenarios, such as data historians, patching/updating, and remote maintenance.
In today’s connected world, cyber security is a topic that nobody can afford to ignore. In recent years the number and frequency of attacks on industrial devices and other critical infrastructure has risen dramatically. Recent news stories about hackers shutting down critical infrastructure have left many companies wondering if they are vulnerable to similar attacks. In this webinar we will discuss the most common security threats and unique challenges in securing industrial networks. We will introduce the current standards and share some useful resources and best practices for addressing industrial cyber security.
Key Takeaways:
1. Gain perspective regarding common security threats facing industrial networks.
2. Learn about the relevant standards governing industrial cyber security.
3. Increase understanding of some best practices for securing industrial networks.
The document discusses cyber security risks for SCADA systems used in water and wastewater treatment plants. Modern SCADA systems now use open network protocols and wireless connectivity, leaving them vulnerable to attacks. The most destructive cyber attack targeted Siemens PLCs at an Iranian nuclear facility using a infected USB drive. If a water treatment plant's SCADA system is compromised, it could lead to over or under dosing of chemicals, loss of water pressure, or disabled alarms. Mott MacDonald offers cyber security risk analyses and programs to help clients address vulnerabilities and obtain federal funding to implement solutions.
This presentation explains the ANSI/ISA-99 and IEC 62443 standards for industrial control systems (ICS). It describes the Zone and Conduit security model and how it is used in an plant or factory. As well, the issues of security configuration errors are discussed. A case history of zone security deployment for a Safety Integrated System in a refinery is provided. For additional information see www.tofinosecurity.com.
Evolution of protective systems in petro chemGlen Alleman
Electrical protective or emergency shutdown systems are utilized
throughout the petrochemical industry for safety and to avoid severe environmental and/or economic events. Requirements
fur these critical systems are that they work every time, on demand, and do not initiate nuisance events. These requirements were difficult to achieve in most early systems but the systems have improved over the years. Emergency shutdown system design has been unregulated in the U.S., but new standards will require strict guidelines for design, application, docllmentation, and software testing and control.
SCADA systems are used to monitor and control equipment and processes in industries like oil/gas, water treatment, and manufacturing. They gather data in real-time from remote locations and send control commands back. SCADA has evolved through 3 generations from standalone monolithic systems to distributed systems on local networks to today's networked systems using open standards and wide area networks. Security issues need to be addressed like encrypting communications, securing devices, auditing networks, and implementing threat protection. The future of SCADA involves more sophisticated systems that can handle huge data volumes and territories with some having artificial intelligence capabilities.
This document provides an overview of SCADA (Supervisory Control and Data Acquisition) systems, including basic terminology, components, architecture, communication protocols, applications, security vulnerabilities, and threats. It defines sensors, actuators, relays, PLCs, HMIs, RTUs. It describes the typical SCADA architecture with a master system collecting data from remote units via communication networks. Examples of common industrial protocols like Modbus are provided. Applications of SCADA for monitoring, control, alarm handling and data logging are outlined. Security risks from malware, insiders, hackers and terrorists exploiting vulnerabilities in old operating systems and web interfaces are summarized. The 2015 Ukraine grid cyberattack is reviewed as a case study.
This document discusses trends in threats to SCADA (Supervisory Control and Data Acquisition) systems. It notes that as SCADA systems increasingly use commercial off-the-shelf software and connect to the internet, they have become more vulnerable to cyber threats. The document outlines how SCADA systems work and components like RTUs, PLCs, and HMIs. It also discusses issues like the mistaken belief that SCADA systems are secure due to physical security or isolation from the internet. The conclusion suggests that as capabilities and opportunities for threats increase, the future operational environment will be more vulnerable if an actor emerges with the intent to cause harm.
The document provides an overview of control systems security from the perspective of the U.S. Department of Homeland Security. It discusses critical infrastructure sectors, risk drivers like modernization and globalization, vulnerability lifecycles, findings from control system assessments, and several cyber incidents involving control systems that impacted industrial operations. The department works to improve control system security through assessments, training, partnerships with industry, and developing guidance on topics like cyber forensics and firewall deployment.
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...Classic Controls, Inc.
For a number of years, some industries have used UPSs as a matter of course in applications requiring
uninterrupted process control. These include power-generation facilities, both fossil and nuclear, and petrochemical
plants and refineries.
Recently, other types of industrial companies (pulp and paper mills, steel mills, pharmaceutical manufacturing and
cogeneration facilities) have created a need for UPSs by incorporating DCSs into their plants to control their
processes. Additional control equipment, such as supervisory control and data acquisition (SCADA) systems,
energy management systems (EMSs), boiler-control and microprocessor-based instrumentation, give power
protection an even more important role in industry.
This document provides an introduction to the Table Definition Language (TDL) and Exchange Data Language (EDL) for use by Advanced Metering Infrastructure (AMI) systems deployed using ANSI C12.19 tables and ANSI C12.22 networks. It defines key terms related to AMI, time-based pricing, load control, performance metrics, auditing, and legal units of measure. The presentation also outlines the TDL and EDL documents and import/export process, and discusses benefits of registering ANSI C12.19 data models using TDL and EDL.
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADAcsandit
Supervisory control and data acquisition (SCADA) systems have their own constrains and specifications. These systems control many of our critical industrial infrastructures, yet they are hardly secured. The biggest problem in securing these systems is the lack of cryptography support especially that most SCADA systems work in real-time which is not compatible with most cryptography algorithms. Additionally, a SCADA network may include a huge amount of embedded devices with little computational powers which adds to the cost of any security improvement. In this paper we present a new approach that would secure SCADA communications by coding information without the need of the complex cryptography algorithms. The reconfigurable information transmitter agent (RITA) protocol that we present does not need the already installed devices to be modified nor replaced, it only needs to add costless electrical chips to these devices. This approach can also be used to secure any type of communication that respects the protocol's constraints.
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...Muhammad FAHAD
Dragos, Inc. was notified by the Slovak anti-virus firm ESET of an ICS tailored malware on June 8th, 2017. The Dragos team was able to use this notification to find samples of the malware, identify new functionality and impact scenarios, and confirm that this was the malware employed in the December 17th, 2016 cyber-attack on the Kiev, Ukraine transmission substation which resulted in electric grid operations impact. This report serves as an industry report to inform the electric sector and security community of the potential implications of this malware and the appropriate details to have a nuanced discussion
The document discusses security risks associated with connecting smart meters and other devices to electricity networks. It notes that electricity networks are highly regulated due to safety concerns, but adding internet-connected devices introduces new cybersecurity risks. Specifically, the document outlines how wireless protocols used by smart meters could allow malware and denial of service attacks to spread and potentially interfere with network operations. It argues more testing is needed to ensure the security of smart meter networks before widespread deployment.
Electricity networks are highly regulated due to safety concerns. Previously, errors in control systems did not require immediate fixes unless they posed an operational threat. However, smart meters add wireless connections, potentially allowing cyber threats from the internet to impact infrastructure. Many smart meters and their wireless protocols have vulnerabilities. Extensive security testing is needed given that attacks have had serious consequences for other critical infrastructure networks.
The document discusses SCADA (Supervisory Control and Data Acquisition) systems which are used to remotely monitor and control critical infrastructure like power plants, oil and gas pipelines, and water treatment facilities. It outlines some security issues with SCADA including that these systems have been of interest to terrorists and nation-states due to their ability to disrupt important systems, and that insiders and simple attacks could also potentially target vulnerable SCADA networks.
An Expert System For Power Plants Paper Presentationguestac67362
1. The document introduces an expert system for fault diagnosis and operator support in power plants that incorporates rules for real-time state estimation of generators and distribution substations.
2. When a conflict arises between the estimated and measured states, heuristic rules are activated to infer and report the fault scenario.
3. The system goes beyond imitating expert knowledge by being able to infer faults concerning components like power electronic circuits using abnormal measurements.
Wide area protection-and_emergency_control (1)Alaa Eladl
This document discusses wide-area protection and emergency control in power systems. It describes how major disturbances can stress power systems beyond their planned operating limits due to unpredictable events. It explores using advanced wide-area monitoring and control systems based on communication and synchronization technologies to automatically detect and respond to disturbances across large regions in order to minimize their impacts. Such systems have potential to provide faster, more coordinated responses than traditional local protection schemes or human operators. The document outlines different types of power system disturbances and remedial measures needed to maintain stability.
Guideline for the certification of wind turbine service technicians 2015 julyMichael Mattocks
The document discusses guidelines for certifying wind turbine service technicians, including safety rules and cyber security concerns. It outlines the roles of organizations like RenewableUK, the Health & Safety Executive, and certification bodies in developing and enforcing standards for wind turbine safety. Technicians must be aware of statutory regulations and the importance of cyber security for wind farm control systems, as unauthorized access could disrupt controls and endanger safety.
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...Michael Mattocks
The document discusses guidelines for certifying wind turbine service technicians, including safety rules and cybersecurity concerns. It outlines the roles of organizations like RenewableUK, the Health & Safety Executive, and WindHSE.org in developing wind turbine safety standards. The Wind Turbine Safety Rules version 3 include guidelines around high voltage boundaries and transformers. The document also warns that industrial control systems like those used in wind turbines are vulnerable to cyber attacks, referencing malware like Stuxnet that have targeted these systems in the past. Technicians must be aware of cybersecurity protocols to safely operate and maintain wind farm equipment.
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Ahmed Al Enizi
The document discusses the critical importance of infrastructure systems like power plants, water treatment facilities, and transportation. It notes that these systems now face growing cybersecurity risks like Stuxnet and other attacks that could endanger lives and cause billions in damages. The document provides examples of past attacks on infrastructure systems dating back to the 1990s that impacted facilities like power plants and water treatment. It emphasizes that infrastructure systems are becoming more exposed to threats as they become more networked and integrated.
SCADAPresentation.pptx information about scadadarshanbs18
This document provides an overview of SCADA systems, including their evolution, components, and security issues. It describes how SCADA was introduced to automate power grid monitoring and control as grids became more complex. The key components of SCADA systems are described including the master terminal unit, remote terminal units, intelligent electronic devices, and human-machine interfaces. Communication protocols and topologies used in SCADA are also outlined. The document discusses smart grid applications of SCADA and highlights security vulnerabilities that have arisen from SCADA's increased connectivity. It provides recommendations for improving SCADA security.
Similar to Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N (20)
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfjackson110191
These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
Implementations of Fused Deposition Modeling in real worldEmerging Tech
The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries:
1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes.
2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions.
3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines.
4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors.
5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering.
6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands.
7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems.
8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering.
9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively.
Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.
Measuring the Impact of Network Latency at TwitterScyllaDB
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 :
- Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants.
- REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionBert Blevins
Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.
Mitigating the Impact of State Management in Cloud Stream Processing SystemsScyllaDB
Stream processing is a crucial component of modern data infrastructure, but constructing an efficient and scalable stream processing system can be challenging. Decoupling compute and storage architecture has emerged as an effective solution to these challenges, but it can introduce high latency issues, especially when dealing with complex continuous queries that necessitate managing extra-large internal states.
In this talk, we focus on addressing the high latency issues associated with S3 storage in stream processing systems that employ a decoupled compute and storage architecture. We delve into the root causes of latency in this context and explore various techniques to minimize the impact of S3 latency on stream processing performance. Our proposed approach is to implement a tiered storage mechanism that leverages a blend of high-performance and low-cost storage tiers to reduce data movement between the compute and storage layers while maintaining efficient processing.
Throughout the talk, we will present experimental results that demonstrate the effectiveness of our approach in mitigating the impact of S3 latency on stream processing. By the end of the talk, attendees will have gained insights into how to optimize their stream processing systems for reduced latency and improved cost-efficiency.
The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Invited Remote Lecture to SC21
The International Conference for High Performance Computing, Networking, Storage, and Analysis
St. Louis, Missouri
November 18, 2021
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
Best Programming Language for Civil EngineersAwais Yaseen
The integration of programming into civil engineering is transforming the industry. We can design complex infrastructure projects and analyse large datasets. Imagine revolutionizing the way we build our cities and infrastructure, all by the power of coding. Programming skills are no longer just a bonus—they’re a game changer in this era.
Technology is revolutionizing civil engineering by integrating advanced tools and techniques. Programming allows for the automation of repetitive tasks, enhancing the accuracy of designs, simulations, and analyses. With the advent of artificial intelligence and machine learning, engineers can now predict structural behaviors under various conditions, optimize material usage, and improve project planning.
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
2. • Systems in real-time data management , on
which our day to day activities depend :
– Water plants
– Gas
– Electric grids
– Refineries
– Nuclear plants
– Large manufacturing plants
– Traffic control Systems
3. Vitek boden took over the entire control system
in Australia and released the sewage water into
drinking water
Slammer worm disabled the safety monitoring
system of Ohio's Davis Besse nuclear plant for
nearly 5 hrs in Jan 2003
Gas pipelines in Russia was controlled by a
hacker for 24 hrs in 1999
4. SCADA systems are often physically distributed over large
areas, making hysical security a challenge. Simple
vandalism is a real/well known risk: -- “[…] vandals shot
out approximately 80 individual insulators on the BPA
Cougar-Thurston 115,000 volt transmission line causing it to
go out of service at that time. The vandalism occurred near
Cougar Dam, which is approximately 25 miles east of
Eugene. BPA crews replaced the damaged insulators at an
estimated cost of $6,000. Even though no electrical service to
EWEB and Lane Electric Cooperative customers was
disrupted by the vandalism.
Eugene Water and Electric had to purchase
additional power to serve its customers during the 13 hours
that it took to repair the damaged line.”
http://www.bpa.gov/corporate/BPAnews/archive/2002/
NewsRelease.cfm?ReleaseNo=297
5. • -- „A Washington man who admitted to tampering
with more than 20 high-voltage transmission towers in
four Western states said yesterday he was trying to
point out the power system's vulnerabilities. "I
intended to loosen the bolts and by doing so illustrate
the vulnerabilities of these towers," Poulin told the
judge.
• Poulin said in a telephone interview before his arrest
that he considered his actions necessary to point out
that he was able to damage the towers despite being
"62 years old, overweight, arthritic, diabetic, half-blind
and a cancer patient living on a minimum of 12
medication pills a day.“‟
• seattletimes.nwsource.com/html/localnews/20017963
73_transmission20m.html
6. “Starting around 14:14, FE [FirstEnergy] control room operators lost
the alarm function that provided audible and visual indications when a
significant piece of equipment changed from an acceptable to problematic
status. Analysis of the alarm problem performed by FE after the
blackout suggests that the alarm processor essentially “stalled” while
processing an alarm event. With the software unable to complete that
alarm event and move to the next one, the alarm processor buffer
filled and eventually overflowed. After 14:14, the FE control computer
displays did not receive any further alarms, nor were any alarms being
printed or posted on the EMS‟s alarm logging facilities.
“FE operators relied heavily on the alarm processor for situational
awareness, since they did not have any other large-scale visualization tool
such as a dynamic map board. The operators would have been only
partially handicapped without the alarm processor, had they known it had
failed. However, by not knowing that they were operating without an alarm
processor, the operators did not recognize system conditions were
changing and were not receptive to information received later from MISO
and neighboring systems. The operators were unaware that in this
situation they needed to manually, and more closely, monitor and
interpret the SCADA information they were receiving.”
ftp://www.nerc.com/pub/sys/all_updl/docs/blackout/
NERC_Final_Blackout_Report_07_13_04.pdf [emphasis added]
7. Traditionally network and security folks
have focused virtually all our attention on
the “enterprise” side of the network,
ignoring the parallel “hidden” half of the
network associated with process control
systems and embedded systems.
Process control systems and embedded
systems use different protocols, and no one
ever really mentioned them. They were out
of sight and out of mind, and managed by
hardware guys.
9. • Supervisory control and data acquisition is
defined as a common process control
application that collects data from sensors from
the remote locations and sends them to remote
central console for management and control.
• Mainly used large scale distributed
measurement and control system spread over
geographies
• Control of complex dynamic critical
infrastructure systems
12. Physical Control Measurements such as
RTU,MTU, PLC
Measure Voltage, Adjust Valve, flip switch
Normally based on Windows , Linux or Unix
Human Machine Interfaces
Transport mediums
Analog , serial, internet, wifi, radio etc
13. SCADA devices are often controlled from
central monitoring stations (MTUs, or “master
terminal units”).
Historically those were Unix-based systems,
but many contemporary MTUs are now
Microsoft Windows based.
“The end-of-life for Windows NT is having a
big impact on the industry.”
14. Because SCADA devices with embedded controllers tend to
have limited computational power,
Connected via low speed serial lines,
SCADA protocols tend to be quite simple, with little or no
protection against spoofing, replay attacks, or a variety of
denial of service attacks.
„In a demonstration at a recent security conference, [Jeff
Dagle, a PNNL EE] hacked into his testbed system and
tripped an electrical breaker. The breaker then signaled the
SCADA software that it had opened. But the SCADA
controller did not respond because it had not instructed the
breaker to open. It was a classic denial-of-service attack. "We
were demonstrating a weakness at the protocol level itself,"
said Dagle.‟
http://memagazine.org/backissues/dec02/features/scada
vs/scadavs.html
15. Industrial plants, and the instrumentation they include, tend
to be long life cycle projects – ten, fifteen or twenty year
project lives are by no means uncommon.
by the time the facility is finally decommissioned, there‟s no
provision for refreshing those devices the way you might
upgrade out of date PCs in some office.
„"Anti-virus software doesn't work on these SCADA
systems,“ said Robert Childs, information security analyst at
the Public Service Company of New Mexico, who spoke at
NetSec about the challenges in working with SCADA
vendors to get them to comply with the new rules. "Many of
these systems are based on old Intel 8088 processors, and
security options are limited to us.“‟
http://napps.nwfusion.com/news/2004/062104secwrap.ht
ml
16. Remote devices (RTUs and PLCs) also tend to
be hard to upgrade : --
The device may use an OS and application that
was burned to ROM, and which is not
rewritable (“upgrade” == replacing ROMs) –
The device may be physically sealed and not
upgradeable,
Or be located in a difficult location, or have no
removable media ---
The vendor may no longer be in business, or
may not be producing upgrades,
Or the vendor may not be allowing upgrades
17. In some cases the patches require approval from
external bodies such as FDA which might delay the
upgrades.
An example from the embedded system world:
“Health care IT professionals say medical device
makers prohibit them from changing the systems and
even from running anti-virus software in some cases.
These IT administrators say manufacturers often are
slow to supply software patch updates and routinely
claim the Food and Drug Administration (FDA)
requires approval of patch-base changes. However the
FDA says it has no such rules…”
http://www.nwfusion.com/news/2004/070504hospit
alpatch.html
18. Owing to need for positive access and
control, there is a trend toward simple,
known, and shared passwords.
Users like to avoid situations such as: “Do
you know the password to turn off the
nuclear reactor before it melts down? I
forgot mine today…”
http://www.digitalbond.com/dale_peterso
n/ISA%20July%20Event.ppt
19. Very poor authentication protocols
Legacy systems are used which have very well
known vulnerabilities (platform dependency)
Systems not patched regularly
Sometimes quite a few nodes are exposed to
external environment for debug points , that
are used for attacks
No standard or minimal standards of
encryption are used in the applications
20. There‟s also the sheer issue of managing
passwords for thousands of devices –
passwords will tend to be common across
devices as a practical matter
And of course those passwords aren‟t changed
very often (if at all), even when staff
transitions occur or years have gone by…
And always tend to have simple and easy to
remember passwords for authorization.
21. In many cases, SCADA traffic will be on just
one port such as 502/tcp (e.g., Modbus/TCP).
The use of a single port (or just a couple of
ports) makes it easy to track that traffic, or to
poke a hole in firewalls to allow that traffic to
pass,
Also makes it easy for the bad guys to scan for
connected devices, and it makes it impossible
to do port-based selective filtering.
22. • One false data one mess up the whole of the system
rather than one single unit Can bring down the whole
system.
• The disruption could be due to natural events, such as
hurricanes, earth quakes, and wild fires or due to man-
made malicious events, such as physical destructions
or electronic intrusions into infrastructure systems.
Identifying, understanding, and analyzing such
interdependencies among infrastructure systems pose
significant challenges [2-4].
• These challenges are greatly magnified by the
geographical expanse and complexity of individual
infrastructures and the nature of coupling among
them. The rest of the discussion focuses on electric
power infrastructure.
23. Much of what‟s being faced in the SCADA
world has already been hashed through and
fixed in the enterprise IT world. Those
solutions, where suitable, need to be “thrown
over the wall” to SCADA networks and
systems so SCADA folks don‟t “reinvent the
wheel.” We need to visit with our process
control brethren.
26. User
UI (Generally known as Man Machine Interface
- MMI)
Master Terminal Unit (MTU)
Interfaces remote units and collects data from them
Remote Terminal Unit
– Interfaces the remote sensors to the MTU
– Communication channel
– Such as internet (mostly clear text), BUS channels
27. Mostly based on request response protocol
Does not validate the if the person requesting
info is genuine or not
Just throws info when requested
No data encryption
So easily one could poison the BUS data or set
the system to reset.
Inject false data into the BUS and create a
havoc
28. Modify the data coming from the RTU
Denial of service
Exploit Protocol anomalies
Shut down RTU`s , MTU`s
29. The MODBUS protocol defines a simple Protocol Data Unit (PDU) independent
of the underlying communication layers. The mapping of MODBUS protocol on
specific buses or networks can introduce some additional fields on the
Application Data Unit (ADU).
The client that initiates a MODBUS transaction builds the MODBUS Application
Data Unit. The function code indicates to the server which kind of action to
perform.
33. • Describes the encapsulation of a MODBUS request or
response when it is carried on a MODBUS TCP/IP network.
• A dedicated header is used on TCP/IP to identify the MODBUS Application
Data Unit, called the MBAP header (MODBUS Application Protocol header).
34. These challenging problems call for inter-
disciplinary research collaboration between
physical as well as cyber systems researchers,
and call for laying strong foundation for inter-
disciplinary educational program on cyber-
enabled critical infrastructure systems focusing
on protection, security, resiliency, and
sustainability.
35. Defcon 15- T335 unraveling Scada protocols
http://www.scadasecurity.org/index.php/Main_
Page
http://www.modbus.org/docs/Modbus_Messagi
ng_Implementation_Guide_V1_0b.pdf
Sandia SCADA Program - High-Security SCADA
LDRD Final Report by Rolf Carlson
SCADA Security And terrorism - Internet Security
Systems
Scada Security – by Joe St Sauver (uoregon
University)
MODSCAN – DEFCON 2008
36. Video Links :
scadasecurity.org - Open SCADA Security Project