Smart grids is an added communication capabilities and intelligence to traditional grids,smart grids are enabled by Intelligent sensors and actuators, Extended data management system,Expanded two way communication between utility operation system facilities and customers,Network security ,National integration ,Self healing and adaptive –Improve distribution and transmission system operation,Allow customers freedom to purchase power based on dynamic pricing ,Improved quality of power-less wastage ,Integration of large variety of generation options.
We have seen the more complex and critical infrastructure the more vulnerable they are. From the Year of 1994 we have seen lots of incidents where SmartGrid were Hacked the latest and booming incident was Stuxnet Worm which targeted Nuclear Power System of Iran and Worldwide.There are different types of Attacks we will see. Security needed for Smart Grid.
This document discusses cyber security in smart grids. It begins with an introduction to smart grids and their reliance on information and communication technologies (ICT). It then discusses three security objectives for smart grids: data availability, confidentiality, and integrity. Several types of cyber attacks on smart grids are described, including denial-of-service attacks, random attacks, and false data injection attacks. The document concludes by evaluating techniques for detecting attacks, such as using chi-square tests and cosine similarity matching to compare expected and measured smart grid data.
This document discusses cyber security issues in smart grids. It begins with an introduction to smart grids and their reliance on information and communication technologies. It then discusses three key security objectives for smart grids: data availability, confidentiality, and integrity. Several types of cyber attacks on smart grids are described, including denial-of-service attacks, random attacks, and false data injection attacks. The document concludes by evaluating techniques for detecting attacks, such as using chi-square tests and cosine similarity matching to compare expected and measured smart grid data.
This presentation gives an introduction to security of smart grid and reviews the most important related guidelines like NISTIR 7628 and IEEE 2030. At the final section, it reviews the US cyber security program for the energy sector as a case study.
This document discusses cyber security concerns regarding smart grid technology integration. It outlines how increased data sharing and connectivity between new and legacy systems introduces new cyber vulnerabilities. It then summarizes existing cyber security standards from organizations like ISO, NERC, and IEC that can provide frameworks for addressing these vulnerabilities. Finally, it notes challenges integrating new technologies with legacy systems and the need for a strategic roadmap to help guide secure technology adoption.
This document discusses analytics for assessing cybersecurity risks in smart grids. It identifies several risk management practices for smart grids including the NIST supply chain risk management practice, Department of Energy risk management practice, and compliance with technical standards. It also maps the relationships between smart grid domains, actors, interfaces, and vulnerabilities based on NIST guidelines to identify high-risk areas and inform priority actions. Finally, it shows how risk identification and assessment can be conducted based on analyzing security objectives, impact levels, and relationships between smart grid components defined in NIST guidelines.
Cyber Security in Substation Automation (IEC 61850)
This document discusses cyber security risks in electrical substation automation systems that use IEC 61850 protocols. It outlines how unauthorized access and spoofing attacks can manipulate systems by sending false operational commands and positioning data. Specifically, it demonstrates how Man-in-the-Middle attacks can spoof Multicast MAC Secure (MMS) and Generic Object Oriented Substation Event (GOOSE) messages to send false commands. The document calls for improvements in cyber security practices, policies, personnel training, use of encryption and other protections to address these risks.
Smart grid projects and ciber security in brazil conference
Overview about smart grid projects in Brazil and how the security requiments have been considered in R&D projects. Results related to a smart metering security assessment project are presented.
This document summarizes a research paper that proposes a design for a secure, Wi-Fi integrated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM consists of a sophisticated meter with additional security features compared to traditional meters. It uses Wi-Fi communication, a microcontroller, and a centralized monitoring and control unit. Random number addressing cryptography (RAC) is chosen as the most secure encryption technique. The meter in each home connects via a wireless network to a server that calculates billing amounts and sends updates to be displayed on the home meter, reducing labor while increasing transparency. The design aims to provide secure communication at high speeds with an advanced metering system and unique database backend.
Are your industrial networks protected...Ethernet Security Firewalls
Security incidents rise at an alarming rate each year. As the complexity of the threats increases, so do the security measures required to protect industrial networks. Plant operations personnel need to understand security basics as plant processes integrate with outside networks. This paper reviews network security fundamentals, with an emphasis on firewalls specific to industry applications. The variety of firewalls is defined, explained, and compared.
This document discusses cyber security for substation automation systems. It notes that substation systems are now increasingly connected via Ethernet and IP-based protocols, introducing cyber security risks. The document outlines various potential threats including internal attackers, suppliers, hackers, criminals, and terrorists. It examines vulnerabilities in substation systems like slow processors, real-time operating systems, communications media, open protocols, lack of authentication, and centralized administration. The document proposes measures to enhance security such as access control, encryption, authentication, and intrusion detection. Overall, the document analyzes cyber security risks for substation automation and proposes strategies to protect, detect, and recover from potential intrusions or attacks.
The efficacy and challenges of scada and smart grid integration
To initiate a 2 way communication between the load center's and the substation so they can monitor the electricity distribution at real time • To detect faults at their onset so that a resultant blackouts can be prevented • To regulate the energy consumption of utilities based on energy availability
Third Party Security Testing for Advanced Metering Infrastructure Program
In July 2010, BC Hydro, the electric utility and grid operator of British Columbia began implementation of its AMI program, formally known as the Smart Meter & Infrastructure (SMI) program. The SMI program transformed BC Hydro from a traditional metering utility to a smart metering utility by implementing smart meters on the customer service points. It was the first step in the smart grid transformation.
The SMI program required the introduction of many new devices and applications into BC Hydro’s infrastructure. Some of these had never been deployed before anywhere in the world. Many were field deployed, outside of BC Hydro’s physical security perimeter.
The SMI Security Delivery Team was formed to deliver on these commitments and to take responsibility for the end to end security of the SMI program. The Team implemented a multi-pronged approach to securing SMI including security risk assessments, security penetration testing by the team, design reviews, whole project risk assessments and third party security penetration testing.
A standards based approach was required to ground the test plan both in best practice and in a common set of principles that BC Hydro and its vendors could accept. The Advanced Metering Infrastructure (AMI) Risk Assessment document prepared by the Advanced Metering Infrastructure Security (AMI-SEC) Task Force was used as a basis for the test plan. This document has since been passed to the National Institute of Standards and Technology (NIST) Cyber Security Working Group and was integrated into NIST IR 7628. NIST IR 7628 contains a comprehensive list of possible threats to AMI systems.
The program was highly successful. Test results informed BC Hydro’s deployment decisions and allowed the manufacturers to improve their products. Lessons were learned about how best to conduct third party security testing. A full lessons learned section is included in the presentation.
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...
This document discusses vulnerabilities in SCADA and smart meter systems used for electricity generation, transmission, and distribution. It provides an overview of how electricity is generated, transmitted through high-voltage lines, and distributed through lower voltage lines to consumers. The document then details the methodology used to assess SCADA systems, common vulnerabilities found, and examples of vulnerabilities in programmable logic controllers and smart meters. The goal is to raise awareness of security issues in these critical infrastructure systems.
Industrial Control System Cyber Security and the Employment of Industrial Fir...
This presentation provides an overview of industrial control systems and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the risks.
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
A business-level review of current security standards for the energy and utility school, a look around the corner at what's coming next from the standards bodies, and a discussion of the burdens this amount of change and uncertainty is is placing on executives and security professionals in the electric utilities.
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES
This document provides an overview of power generation and distribution in India. It discusses the various modes of power generation including thermal (~65%), hydro (~22%), and renewable (~10%) sources. Power is transmitted through central and state transmission utilities and distributed to end users through distribution agencies. The key end user segments are industries (38%), domestic (22%), agriculture (22%), and commercial (8%). The document also discusses India's goals for renewable energy capacity addition and integration through its 12th and 13th five year plans.
The document discusses the implementation of the Restructured Accelerated Power Development and Reforms Program (R-APDRP) in Rajasthan, India. Key points:
- R-APDRP aims to establish reliable baseline data and adopt IT in energy accounting to reduce losses before distribution strengthening projects.
- It has two parts - Part A focuses on IT applications for energy auditing and consumer services. Part B covers network renovation.
- The Discoms of Rajasthan have taken steps like forming implementation committees and appointing an IT consultant to timely execute the scheme and avail grants.
- Benefits of R-APDRP include increased consumer satisfaction, transparency, reduced out
Security challenges to power grid and smart grid infrastructures
The document discusses security challenges facing power grids and smart grids. It notes increasing blackouts in the US and cyber security incidents globally. The Indian power grid is vast in size and undergoing smart grid pilots. Security encompasses operational, physical and cyber security. Challenges include the tight coupling of IT and physical infrastructure, legacy systems, and continuous availability demands. Collaboration between industry, government and academia is needed to address challenges through standards, technologies and a process-based approach.
This document discusses smart grid technology. It defines smart grid as an electric grid that uses information and communication technology to gather data and act on information about supplier and consumer behavior. The key components of a smart grid are smart meters, phasor measurement, information transfer, and distributed generation. A smart grid offers benefits like reduced carbon footprint, improved distribution management, self-healing capabilities, and increased efficiency. Specific ideas presented for a smart grid include a power management app that provides household electricity usage insights and allows selling regenerative power back to the grid.
CPM Braxis Capgemini the unique Cisco Connected Grid authorized partner in Brazil to help utilities address their challenges on the Smart Grid infrastructure environment.
The document discusses cyber security threats to the US power grid. It notes that the power grid consists of over 300,000 km of transmission lines operated by 500 companies. Cyber attacks on critical infrastructure like the power grid are increasing in frequency and sophistication, which could have severe consequences. For example, a DDoS attack costing just $40 could overwhelm network links and cause a blackout. The document also provides examples of past cyber attacks on energy systems like Stuxnet and the 2015 attack on Ukraine's power grid that left 700,000 residents without electricity for 7 hours.
Smart Grid security expert & previous hacker Emil Gurevitch explains how hackers can get to your Smart Grid, and how utilities can detect and respond to Smart Metering Cyber-attacks.
This document discusses cyber security in smart grids. It begins with an introduction to smart grids and their reliance on information and communication technologies (ICT). It then discusses three security objectives for smart grids: data availability, confidentiality, and integrity. Several types of cyber attacks on smart grids are described, including denial-of-service attacks, random attacks, and false data injection attacks. The document concludes by evaluating techniques for detecting attacks, such as using chi-square tests and cosine similarity matching to compare expected and measured smart grid data.
This document discusses cyber security issues in smart grids. It begins with an introduction to smart grids and their reliance on information and communication technologies. It then discusses three key security objectives for smart grids: data availability, confidentiality, and integrity. Several types of cyber attacks on smart grids are described, including denial-of-service attacks, random attacks, and false data injection attacks. The document concludes by evaluating techniques for detecting attacks, such as using chi-square tests and cosine similarity matching to compare expected and measured smart grid data.
This presentation gives an introduction to security of smart grid and reviews the most important related guidelines like NISTIR 7628 and IEEE 2030. At the final section, it reviews the US cyber security program for the energy sector as a case study.
This document discusses cyber security concerns regarding smart grid technology integration. It outlines how increased data sharing and connectivity between new and legacy systems introduces new cyber vulnerabilities. It then summarizes existing cyber security standards from organizations like ISO, NERC, and IEC that can provide frameworks for addressing these vulnerabilities. Finally, it notes challenges integrating new technologies with legacy systems and the need for a strategic roadmap to help guide secure technology adoption.
This document discusses analytics for assessing cybersecurity risks in smart grids. It identifies several risk management practices for smart grids including the NIST supply chain risk management practice, Department of Energy risk management practice, and compliance with technical standards. It also maps the relationships between smart grid domains, actors, interfaces, and vulnerabilities based on NIST guidelines to identify high-risk areas and inform priority actions. Finally, it shows how risk identification and assessment can be conducted based on analyzing security objectives, impact levels, and relationships between smart grid components defined in NIST guidelines.
Cyber Security in Substation Automation (IEC 61850)Nikandrov Maxim
This document discusses cyber security risks in electrical substation automation systems that use IEC 61850 protocols. It outlines how unauthorized access and spoofing attacks can manipulate systems by sending false operational commands and positioning data. Specifically, it demonstrates how Man-in-the-Middle attacks can spoof Multicast MAC Secure (MMS) and Generic Object Oriented Substation Event (GOOSE) messages to send false commands. The document calls for improvements in cyber security practices, policies, personnel training, use of encryption and other protections to address these risks.
Overview about smart grid projects in Brazil and how the security requiments have been considered in R&D projects. Results related to a smart metering security assessment project are presented.
This document summarizes a research paper that proposes a design for a secure, Wi-Fi integrated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM consists of a sophisticated meter with additional security features compared to traditional meters. It uses Wi-Fi communication, a microcontroller, and a centralized monitoring and control unit. Random number addressing cryptography (RAC) is chosen as the most secure encryption technique. The meter in each home connects via a wireless network to a server that calculates billing amounts and sends updates to be displayed on the home meter, reducing labor while increasing transparency. The design aims to provide secure communication at high speeds with an advanced metering system and unique database backend.
Are your industrial networks protected...Ethernet Security Firewalls Schneider Electric
Security incidents rise at an alarming rate each year. As the complexity of the threats increases, so do the security measures required to protect industrial networks. Plant operations personnel need to understand security basics as plant processes integrate with outside networks. This paper reviews network security fundamentals, with an emphasis on firewalls specific to industry applications. The variety of firewalls is defined, explained, and compared.
This document discusses cyber security for substation automation systems. It notes that substation systems are now increasingly connected via Ethernet and IP-based protocols, introducing cyber security risks. The document outlines various potential threats including internal attackers, suppliers, hackers, criminals, and terrorists. It examines vulnerabilities in substation systems like slow processors, real-time operating systems, communications media, open protocols, lack of authentication, and centralized administration. The document proposes measures to enhance security such as access control, encryption, authentication, and intrusion detection. Overall, the document analyzes cyber security risks for substation automation and proposes strategies to protect, detect, and recover from potential intrusions or attacks.
The efficacy and challenges of scada and smart grid integrationFaizal Faizi
To initiate a 2 way communication between the load center's and the substation so they can monitor the electricity distribution at real time • To detect faults at their onset so that a resultant blackouts can be prevented • To regulate the energy consumption of utilities based on energy availability
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
In July 2010, BC Hydro, the electric utility and grid operator of British Columbia began implementation of its AMI program, formally known as the Smart Meter & Infrastructure (SMI) program. The SMI program transformed BC Hydro from a traditional metering utility to a smart metering utility by implementing smart meters on the customer service points. It was the first step in the smart grid transformation.
The SMI program required the introduction of many new devices and applications into BC Hydro’s infrastructure. Some of these had never been deployed before anywhere in the world. Many were field deployed, outside of BC Hydro’s physical security perimeter.
The SMI Security Delivery Team was formed to deliver on these commitments and to take responsibility for the end to end security of the SMI program. The Team implemented a multi-pronged approach to securing SMI including security risk assessments, security penetration testing by the team, design reviews, whole project risk assessments and third party security penetration testing.
A standards based approach was required to ground the test plan both in best practice and in a common set of principles that BC Hydro and its vendors could accept. The Advanced Metering Infrastructure (AMI) Risk Assessment document prepared by the Advanced Metering Infrastructure Security (AMI-SEC) Task Force was used as a basis for the test plan. This document has since been passed to the National Institute of Standards and Technology (NIST) Cyber Security Working Group and was integrated into NIST IR 7628. NIST IR 7628 contains a comprehensive list of possible threats to AMI systems.
The program was highly successful. Test results informed BC Hydro’s deployment decisions and allowed the manufacturers to improve their products. Lessons were learned about how best to conduct third party security testing. A full lessons learned section is included in the presentation.
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smar...Michael Smith
This document discusses vulnerabilities in SCADA and smart meter systems used for electricity generation, transmission, and distribution. It provides an overview of how electricity is generated, transmitted through high-voltage lines, and distributed through lower voltage lines to consumers. The document then details the methodology used to assess SCADA systems, common vulnerabilities found, and examples of vulnerabilities in programmable logic controllers and smart meters. The goal is to raise awareness of security issues in these critical infrastructure systems.
Industrial Control System Cyber Security and the Employment of Industrial Fir...Schneider Electric
This presentation provides an overview of industrial control systems and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the risks.
A business-level review of current security standards for the energy and utility school, a look around the corner at what's coming next from the standards bodies, and a discussion of the burdens this amount of change and uncertainty is is placing on executives and security professionals in the electric utilities.
SMART GRID DEVELOPMENT IN INDIA - by Mr. S.R. Sethi, Senior Advisor UPES UPES Dehradun
This document provides an overview of power generation and distribution in India. It discusses the various modes of power generation including thermal (~65%), hydro (~22%), and renewable (~10%) sources. Power is transmitted through central and state transmission utilities and distributed to end users through distribution agencies. The key end user segments are industries (38%), domestic (22%), agriculture (22%), and commercial (8%). The document also discusses India's goals for renewable energy capacity addition and integration through its 12th and 13th five year plans.
The document discusses the implementation of the Restructured Accelerated Power Development and Reforms Program (R-APDRP) in Rajasthan, India. Key points:
- R-APDRP aims to establish reliable baseline data and adopt IT in energy accounting to reduce losses before distribution strengthening projects.
- It has two parts - Part A focuses on IT applications for energy auditing and consumer services. Part B covers network renovation.
- The Discoms of Rajasthan have taken steps like forming implementation committees and appointing an IT consultant to timely execute the scheme and avail grants.
- Benefits of R-APDRP include increased consumer satisfaction, transparency, reduced out
Security challenges to power grid and smart grid infrastructuresP K Agarwal
The document discusses security challenges facing power grids and smart grids. It notes increasing blackouts in the US and cyber security incidents globally. The Indian power grid is vast in size and undergoing smart grid pilots. Security encompasses operational, physical and cyber security. Challenges include the tight coupling of IT and physical infrastructure, legacy systems, and continuous availability demands. Collaboration between industry, government and academia is needed to address challenges through standards, technologies and a process-based approach.
This document discusses smart grid technology. It defines smart grid as an electric grid that uses information and communication technology to gather data and act on information about supplier and consumer behavior. The key components of a smart grid are smart meters, phasor measurement, information transfer, and distributed generation. A smart grid offers benefits like reduced carbon footprint, improved distribution management, self-healing capabilities, and increased efficiency. Specific ideas presented for a smart grid include a power management app that provides household electricity usage insights and allows selling regenerative power back to the grid.
CPM Braxis Capgemini the unique Cisco Connected Grid authorized partner in Brazil to help utilities address their challenges on the Smart Grid infrastructure environment.
This document discusses new innovations from HP in software-defined networking (SDN). It introduces HP's Virtual Application Networks SDN controller, which provides an open and integrated hardware and software SDN solution. The controller supports OpenFlow and HP SDN applications through open APIs. It also notes that HP has expanded its OpenFlow-enabled switch portfolio to include 9 additional switch models, bringing the total to 25 OpenFlow switches and over 15 million OpenFlow ports.
The document summarizes a presentation on control system security assessments given at the 2008 Automation Summit. The presentation discusses vulnerabilities and threats to control systems, findings from security assessments, and a review of the Control Systems Security Program. It is presented by Marty Edwards from the Idaho National Laboratory and Todd Stauffer from Siemens.
The document discusses industrial communications solutions from GE Digital Energy, including wireless and fiber optic products. Specifically, it describes MDS industrial wireless systems for data acquisition, LAN extension, and backhaul. It also discusses Lentronics fiber optic multiplexers. The document provides information on applications, features, and positioning of these products for critical infrastructure industries like energy, transportation, and heavy industrial.
This seminar discusses cyber security for substation automation systems. It provides an overview of SCADA systems, their components and common vulnerabilities. Recent cases of cyber threats to power systems are described. A systematic approach to enhance cyber security is discussed, including standards to follow, types of threats, and key substation requirements. Common technologies for cyber security are covered, such as AAA protocols, SNMPv3, RADIUS, TACACS, SSH, firewalls, gateways and VPNs. The presentation concludes that cyber security tools help protect data and maintain reliability and safety in substation control systems.
Oncor's Advanced Metering System (AMS) involves installing up to 3.2 million smart meters across its service territory by 2012. The smart meters will automatically collect customer energy usage data at 15-minute intervals and transmit it through a wireless mesh network and backhaul system. This data is validated and used to provide timely energy consumption information to customers, retailers, and ERCOT to support energy conservation, pricing programs, outage detection, and other benefits.
Light sec for utilities and critical infrastructure white paperGeorge Wainblat
The document discusses LightSEC, a cyber security solution from ECI that provides comprehensive protection for utilities and critical infrastructure. It consists of a suite of security services that incorporate threat detection, prevention, and mitigation technologies. These services are delivered through a cloud-based platform called Mercury that uses network function virtualization for flexible deployment. LightSEC also includes a threat management platform called LightSEC-V that aggregates security data from across the solution to provide a consolidated view of risks.
GuardEra helps businesses gain a competitive advantage through effective IT risk management. It focuses on innovative security and compliance solutions while delivering high-performance infrastructure. GuardEra can assess organizations' IT needs, design secure networks, ensure compliance, and provide ongoing managed services and support. This comprehensive approach helps businesses reduce risks and costs while improving operations.
Robust Cyber Security for Power UtilitiesNir Cohen
The security of critical networks is at the center of attention of industry and government regulators alike. Check Point and RAD offer a joint end-to-end cyber security solution that protects any utility operational technology (OT) network by eliminating RTU and SCADA equipment vulnerabilities, as well as defends against cyber-attacks on the network’s control and data planes. This solution brief explains how the joint solution enables compliance with NERC-CIP directives, provides deep visibility and control of ICS/SCADA communications, and allows secure remote access into OT networks.
This document summarizes a research paper that proposes a design for a secure and sophisticated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM uses a microcontroller integrated with a smart meter to securely transmit power consumption data via a legacy Wi-Fi system. Random number addressing cryptography (RAC) is used for encryption due to its high speed, low power usage, and security. The IDSM system connects individual household meters to a centralized server that calculates billing amounts and sends updates back to the meters for display. The goal is to provide secure metering and billing that reduces human error and electricity theft while lowering costs.
This document discusses network monitoring, management, and enhancement using VPN. It introduces the iManager M2000 tool for monitoring networks and describes some key network management reports. These reports contain information on network performance indicators and can help identify issues. The document also discusses using tools and macros to optimize network performance and improve key performance indicators like call setup success rate. Enhancing network monitoring and management using VPN is proposed to further improve efficiency.
Axial Systems provides end-to-end network and security solutions including monitoring and analysis, networking, security, and low latency services. Their solutions include network monitoring, wireless monitoring, tapping and aggregation, load balancing, virtualization, switching, routing, firewalls, wireless networking, WAN optimization, intrusion detection, antivirus, encryption, and more. They aim to provide meaningful insight, management, protection, and optimized performance across customers' networks.
The Radiflow-NEC solution uses two-factor authentication and firewall rules enforced by Radiflow routers to securely limit industrial control system access during remote or on-site maintenance to specific devices and commands. NEC's physical security solutions combine with Radiflow's ruggedized routers to authenticate technicians' identities and continuously monitor their locations, only granting access to the devices and areas necessary to perform maintenance tasks. Any violations of the rules are instantly blocked and alerts are sent to the control center along with network traffic logs and video footage.
The document discusses wireless body area networks and wireless sensor networks. It describes the goals of the project which are to implement the Tate pairing and Weil pairing protocols, analyze their performance with respect to time and memory consumption, and implement the better performing one for security purposes. The document provides background on sensor network technology, including how sensors have evolved from large specialized systems to smaller low-power devices. It outlines some of the applications of wireless sensor networks.
ZigBee technology provides unique features for the deployment of RTLS systems in certain segments and markets. The added possibility of management of all kinds of sensors (temperature, humidity, presence and movement, dangerous gases, electricity consumption,...) and actuators (air conditioning, valves, opening and locking of doors and windows, alarms, control lights and appliances, ... ) enables to provide a complete solution under a single, robust technology
This document briefly describes what is ZigBee, their main characteristics and its implementation as an RTLS system. It includes a description of specific use cases for hotels, supermarkets, healthcare, police, security and vigilance, industry and miners.
In particular describes the n-Core® platform, under ZigBee technology, which supplies a complete development and production environment both for automation services as well for location (RTLS) services.
As always, any comment will be welcome. If you wish to learn more about the n-Core® platform please contact me or send me an email.
Top 10 Reasons Enterprises Prefer Juniper WirelessJuniper Networks
Juniper's WLAN solution meets the mobility needs of today's enterprises by delivering the highest levels of reliability, scalability, management and security. Click to learn more about Juniper Networks: http://juni.pr/CBlpSS
Multicore I/O Processors In Virtual Data Centersscarisbrick
This document discusses the application of multicore I/O processors in virtualized data centers. It outlines the need for an intelligent I/O coprocessor to assist x86 multicore CPUs in virtualized environments. Various approaches to I/O virtualization are presented, including software-based switching, I/O gateways, VEPA, and moving switching into the server. Intelligent I/O sharing alternatives are compared in terms of performance, power, management, security, flexibility, reliability, and cost. Charts show the performance limitations of software-based virtual switches compared to hardware approaches.
This document discusses securing the smart grid. It begins by outlining some concerns utilities have expressed about securing critical infrastructure. Next, it describes how the smart grid will require more data management and security due to increased data collection and integration of renewable energy sources. Finally, it provides an overview of how advanced metering infrastructure and early smart grid deployments are beginning to form best practices for utilities across the globe.
Similar to Smart Grid Security by Falgun Rathod (20)
Big data and cloud computing are increasing data risks as more data is concentrated in large amounts in single locations. Strict data privacy laws in countries like India and the US regulate data breaches. Many large companies have experienced major data breaches compromising millions of customer records. Common causes of breaches include lost or stolen devices, malware, and phishing. The costs of data breaches for businesses are significant and include costs for notification, monitoring, response, lawsuits, and lost customer trust. Cyber insurance can help cover third party liability and first party costs associated with data breaches, but has limitations compared to other insurance policies. Prudent Insurance Brokers is an expert that can help businesses assess cybersecurity risks, design customized cyber insurance plans
Summarising Snowden and Snowden as internal threatClubHack
A quick lookback at snowden's revelation and also lookign at snowden as an insider threat
*This presentation end abruptly because during the talk it ends as food for thought and kickstart of next session*
Fatcat Automatic Web SQL Injector by Sandeep KambleClubHack
What is FatCat Sql injector: This is an automatic SQL Injection tool called as FatCat.
Fatcat Purpose? : For testing your web application and exploit your application into more deeper.
FatCat Support:
1)Mysql 5.0
FatCat Features?
Union Based Sql Injection
Error Based Sql Injection
MOD Security Bypass (WAF)
The Difference Between the Reality and Feeling of Security by Thomas KurianClubHack
The paper shall focus on the following:
The paper shall focus on the following:
1) Introduction to the problem: Focus on “security awareness”, not “behavior”
2) Real life case study of why a US$100, 000 “security awareness” project failed
a. Identifying the human component in information security risks
b. Addressing the human component using “awareness” and “behavior”
strategies
4) Sample real-life case studies where quantifiable change has been observed
Original research and Publications
The talk is modeled on the methodology HIMIS (Human Impact Management for Information
Security) authored by Anup Narayanan and published under “Creative Commons,
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...ClubHack
NFC or the Near Field Communication allows cell phones to perform specified actions whenever they detect NFC tags or signals from other NFC enabled device. Most of the recent phones including Samsung Galaxy S3, Nokia Lumia 610, Blackberry Bold etc have NFC enabled with them. NFC even helps enterprise/payment gateways to ease up users actions, such as connecting to a wifi, setting a bookmark, making payments etc.
Gone are the days of sending Android malware links through URL or attachments. In this talk, we will be showing how an attacker could steal the private and sensitive information from one’s phone and even perform malicious actions on user’s phone, using NFC as an attack vector. NFC attack vectors come in two forms : Active(setting attacker’s phone as a proxy between victim’s smartphone and the payment terminal) and Passive(using NFC tags).For our demonstrations, we would be creating malicious NFC tags which when detected by any smartphone(NFC enabled) would steal sensitive informations from the phones (without the users knowledge) as well as trick user to install malicious applications to his phone. Thereafter, we would also be talking about how an attacker could get in close proximity of another NFC-enabled phone, get a remote shell on the victim’s phone and compromise the phone’s security. We would also be discussing how viral an NFC attack could go in future, if proper security measures are not enforced.
Legal Nuances to the Cloud by Ritambhara AgrawalClubHack
This presentation highlights the key legal risks and their implications in cloud computing. Cloud is inherently multi-jurisdictional, encompassing, remote hosting and processing of the data. This gives rise to multiple legal issues including security and privacy of the data, IP Rights, data portability, contractual limitations, risk mitigation and jurisdictional disputes.
As the cloud involves remote hosting and data accessibility by multiple parties, security and privacy remains the biggest concern for the companies. Businesses should look at issues ranging from physical location of the data centers, protection of the data against any adversity and intrusion, and access rights management.
The cloud servers are often located in different countries, which results in trans- border Data Flow. Each country has its own set of legal rules and regulations regarding data protection and privacy policies and the same can bring in complications in form of conflicting laws and jurisdictional disputes. Issues pertaining to IP rights, trade secrets and ownership of the data placed in the cloud require utmost attention. Termination and exit clauses are critical to the contract in the clouds. Interoperability of the data in the event of termination of services of a vendor is an important aspect to be considered in the contracts.
Infrastructure Security by Sivamurthy HiremathClubHack
With the development of technology, the interdependence of various infrastructures has increased, which also enhanced their vulnerabilities. The National Information Infrastructure security concerns the nation’s stability and economic security. So far, the research in Internet security primarily focused on securing the information rather than securing the infrastructure itself.
The pervasive and ubiquitous nature of the Internet coupled with growing concerns about cyber attacks we need immediate solutions for securing the Internet infrastructure. Given the prevailing threat situation, there is a compelling need to develop Hardware redesign architectures, Algorithms, and Protocols to realize a dependable Internet infrastructure. In order to achieve this goal, the first and foremost step is to develop a comprehensive understanding of the security threats and existing solutions. These attempts to fulfil this important step by providing classification of Security attacks are classified into four main categories: DNS hacking, Routing table poisoning, Packet mistreatment, and Denial-of-Service attacks. We are generally discussing on the existing Infrastructure solutions for each of these categories, and also outline a methodology for developing secured Nation.
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanClubHack
Today there is a flood of tools to help with the automation of active scanning and exploitation of web applications. Once you move beyond these two functions the flood reduces down to a trickle. Vulnerability hunting is a fine art that requires a knack for seeing hidden patterns and connections. Tests like hidden parameters guessing are seldom performed by even skilled testers because of the time and effort involved in preparing for and performing them. When was the last time you identified a piece of sensitive data hidden in plain sight because it was hex encoded in to a very inconsequential looking string?
Do you enumerate all possible avenues for stored XSS in an application? A lot of times checks are missed because there is no good tooling available to perform them effectively and efficiently. HAWAS is the tool you have been missing for a long time now. It is an open source tool that is designed for hybrid analysis. It performs automated passive analysis of a web application with no input from the user for some cases and with specific application specific input for some other cases. Based on the initial set of findings the user can perform further checks from within HAWAS. HAWAS will help you hugely increase your test coverage with very little additional effort.
Hacking and Securing iOS Applications by Satish BomissttyClubHack
iOS applications share common set of classes and highly depends on the operating system solutions for data communication, storage and encryption. Solely depending on the Apple implementation made them less complex but it affects security of the applications. Though iOS comes with a great set of security features like code signing, ASLR, DEP, sand boxing and Data Protection, all of them are subject to attack. Relying only on the iOS security could lead to demise the sensitive data stored within the application when the iOS is compromised. Application security can be improved by understanding the weaknesses in the current implementation and incorporating own code that work better.
The presentation illustrates several types of iOS application attacks like run time manipulation, custom code injection, SSL session hijacking and forensic data leakage. It gives an insight into the iOS Keychain & data protection API and explains the techniques to circumvent it. The presentation will provide guidelines and suggests best practices for secure iOS application development.
Critical Infrastructure Security by Subodh BelgiClubHack
Industrial Automation & Control Systems are an integral part of various manufacturing & process industries as well as national critical infrastructure. Concerns regarding cyber-security of control systems are related to both the legacy nature of some of the systems as well as the growing trend to connect industrial control systems to corporate networks. These concerns have led to a number of identified vulnerabilities and have introduced new categories of threats that have not been seen before in the industrial control systems domain. Many of the legacy systems may not have appropriate security capabilities that can defend against modern day threats, and the requirements for availability and performance can preclude using contemporary cyber-security solutions. To address cyber-security issues for industrial control systems, a clear understanding of the security challenges and specific defensive countermeasures is required. The session will highlight some of the latest cyber security risks faced by industrial automation and control systems along with essential security controls & countermeasures.
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaClubHack
The document discusses Content-Type attacks and how to protect against them. The author works as an information security consultant focusing on vulnerability assessment, penetration testing, and secure environment setup. Content-Type attacks involve exploiting vulnerabilities in client-side software like Adobe Reader or Microsoft Office to execute malicious code. Attackers embed malformed content that corrupts memory, allowing their shellcode to run. The document then covers the attack process, malicious document structure, a demo, PDF file format overview, analyzing PDFs with scripts, and protection techniques like keeping software updated, disabling scripts, enabling data execution prevention, and avoiding opening unknown file attachments.
This document discusses cross-site scripting (XSS) and introduces XSSShell, a tool that uses XSS vulnerabilities to execute commands on a victim's browser. It begins with an introduction to XSS and its risks, then outlines XSS types and demonstrates XSSShell by exploiting vulnerabilities in a demo application. The document aims to show how XSSShell works by establishing a server and injecting client-side JavaScript to create an administrative interface that can control infected browsers.
It gives me immense pleasure to tell you that from 06-02-10 to 06-02-12 our magazine has completed two successful and rejoicing years. We at ClubHack are super excited! I hope you people are enjoying the magazine and would continue doing so it in the coming future too. We enjoy making this for you all.It is said that “A lot can happen over a cup of coffee”. We experienced this amazing moment over a cup of coffee when we had the idea of starting a hacking magazine and it now it has come all this way… :). 2 years looks small when we look back.For this incredible success we at ClubHack would like to thank all our readers, volunteers and authors for giving us such unbelievable support. As we want to keep up the growth and progress therefore we request you all to keep throwing in articles, suggestions, support and your love!
Coming to this issue we have Network Security in Tool Gyan which will put light on how to set up a secured network, Who wants to be a Millionaire in Tool Gyan, check out yourself of what exactly its all about ;)TOR in Mom's guide for all those who thought 'It sounds very complicated to use, I’m not a hacker! I can’t use it!' by our Author- Federico from Italy.
From this month’s issue we plan to start a new section on secure coding. This section will essentially focus on good coding practices and snippets to mitigate various vulnerabilities. To begin with we have an article on PHP based RFI/LFI vulnerability. I hope you will like reading it. We also have some cool articles on XSS attacks, ROT decoding and Matriux section.
Do send us your feedback on abhijeet@chmag.in this will help us improve further.
This document discusses steganography, which is a method of hiding secret messages within other files or data streams. It provides definitions and examples of different types of steganography, including static steganography which hides messages in digital files, and dynamic steganography which hides messages in protocols like TCP/IP packets as they are transmitted over the internet. The document also discusses uses of steganography, such as watermarking to track copyrighted content, and concerns about potential terrorist use of steganography over the internet through covert channels. Detection of hidden messages, called steganalysis, and technology to help law enforcement monitor covert communications are also mentioned.
There was a time when mobile phones were of the size of a shoe and had no features other than calling and sms and at that time I used to play the game - Snake on my dads phone :p Now as the time has passed we have reached the age of smart phones which are capable of doing lot of stuff and world wide web of application causing serious concern where an attacker can use this platform to steal data. This issue of CHMag is dedicated Mobile/Telecom Hacking and Security.
The coverpage of this December issue was released at ClubHack 2011, India’s Pioneer International Hacking Conference held last week. Talking about ClubHack Conference, if you missed ClubHack here are the presentations available at - http://www.slideshare.net/clubhack and videos at http://www.clubhack.tv/event/2011/
We recently released CHMag's Collector's Edition Volume II. If you wish to buy the Collectors Editions (vol1 – from issue 1 to 10 & vol2- from issue 11 to 20), please write back to us: info@chmag.in. As of now its on demand printing.
Like the game - Snake, I have played lots of other games too which have reflected in the previous coverpages I have designed and yes I promise another awesome coverpage based on a game on the theme of android security which would be the theme for an upcoming issue, for which send in your articles to info@chmag.in
One Link provides direct access to a Facebook account without needing a username or password by bypassing all security points through a single link. The link contains parameters like a photo or user ID and a secret key that can be brute forced or socially engineered to gain full access to random Facebook accounts. Users should be aware of these direct links and the security risks they pose.
5. What‟s a “Smart Grid?”
Smart Grid is a developing Network of new
Technologies, equipment, and controls working
together to respond immediately to our 21st
Century demand for electricity.
Technology Used
Integrated Communication
Sensing
Smart Meters
Phasor Measurement Units
Advanced Components
Advanced Control
Decision Support System
Smart Power Generation
9. Another View – Smart Grid
Communications Network
Sensors Regulatory Policy
and and Rule- making
Grid Control Enhanced
Plug In Electric Flexibility & Control Congestion
Hybrid Vehicles Management
Guided By…
Distributed
And Renewable
Energy
Energy
SGCN Results… Efficiency
Demand
Response
Supported By…
Data, Analytics,
and Information
Smart Meters and
Communications Security
Open and
Ubiquitous
New Communication
Devices Voltage
and
Systems Stability
Generation Custom
Applications Enterprise
Integration
10. Evolution of Electrical Utility Risks
PAST PRESENT NEAR FUTURE
HARD-WIRED CONTROL SCADA / RF ENABLED SMART GRID / RF PERVASIVE
Most controls are “hard Intense financial Control inside-the-home of all
wired” AND require pressure to reduce appliances
manual intervention staffing; hence more Wide use of 802.x, ZigBee, X10
“remote” RF methodologies
Lesser public
availability of RF Computerization and RF Uncertain Software Provenance,
devices control common in all Packaged Code and Offshore
industries Development Zero-Day Attacks
Little capability for
damage to or financial Project implementation Increased organized crime/
benefit from RF attacks excellence not always terrorist focus
followed by outstanding
Cost-plus charging – “If security operations Potential for damage to, and
we need it, we‟ll do it! If “net” theft by, every customer
we can‟t do it, we‟ll buy SCADA hacking can
it!” cause Revenue/Risk Asymmetry for
„ “wholesale” damage each customer
Clear regulatory and to neighborhoods and Transition to IP and Windows
financial landscape equipment “Monoculture” for RF devices
Uncertain regulatory, Increased public and regulatory
audit, and liability Scrutiny
landscape
12. Overview of Cyber Security – Threats
Admin Operator
Perform
SQL
Admin
ARP Scan
EXEC
Opens Email
Send e-mail
with Malware
with malware
Acct Operator
Internet
4. 1. Hacker sends anan ARP (Address
Hacker performs e-mail with malware
Resolution Protocol) Scan Master
2.E-mail recipient opens the e-mail and the
DB
5. Once the Slaveinstalled quietlyfound, hacker
malware gets Database is
3. Using the information command
sends an SQL EXEC that malware Slave Database
gets, hacker is able to take control of the e-
6. Performs another ARP Scan RTU
mail recipient‟s PC!
7. Takes control of RTU
Example from 2006 SANS SCADA Security Summit, INL
13. Overview of Cyber Security – Threats
Cyber
Penetration
Attacker Communications
Controls the
Performs Network
(WAN)
Head End
Remote
AMCC
Attacker Disconnect
(Advanced Metering
Control Computer) Communications
Network
(WAN) Retailers
3rd Parties
AMI WAN AMI WAN AMI WAN
Data Management
Systems
(MDM/R)
U N IV ER S IT Y
Example from AMRA
Webinar, Nov ’06
“The Active Attacker”
14. Cyber Security Challenges
The challenge is complex and continuously
changing
Legacy systems need to be protected
Number and geographic location of end points
Relationship to physical security
Systems are 7x24 and critical
The human element / social engineering
15. Cyber Solutions - Defense in Depth
Perimeter Protection
Firewall, IPS, VPN, AV
Host IDS, Host AV
DMZ
Physical Security
Interior Security
Firewall, IDS, VPN, AV
Host IDS, Host AV
IEEE P1711 (Serial Connections)
NAC
Scanning IDS Intrusion Detection System
IPS Intrusion Prevention System
Monitoring
DMZ DeMilitarized Zone
Management VPN Virtual Private Network (encrypted)
Processes AV Anti-Virus (anti-malware)
NAC Network Admission Control
17. Physical Layer Security
Natural Disasters
Snow Storms
Hurricanes
Solar Flares
Geomagnetic Storms
Earthquakes
Flooding
Volcanoes
Recognize that Location of the Smart
Grid Components Can Be Affected by
the Surrounding Environment
18. Physical Layer Security (2)
Steal the Meters – Sell the Devices
RESPONSE: METER “LAST
GASP” ALERTS WHEN
DISCONNECTED
19. Physical Layer Security (3)
Tamper with the Meter
Cause Meter to Stop Reading - Disconnect
Cause Meter to Mis-Read (or Reverse)
Inject Malware
Modify Encryption
Modify Authentication Mechanism
• July 2009 – Black Hat Conference
• IOActive, Seattle InfoSec Firm
• Proof of Concept – 24 Hours Caused 15,000 of 22,000
Home Smart Meters Taken Over by Malware/Worm
20. Physical & Cyber
Opening the Meter
Accessing Exposed Ports and Connectors
Intercept Data Between Microcontroller and Radio
Infrared Port Attack/Hack
21. Cyber Layer Security
The Biggest Opportunity for Trouble
“The Last Mile” Issues
Remember – Added Complexity Causes Concerns
22. “Last Mile”
Broadband Power Line
Systems
Power Line Carrier
Systems
Public Switched
Telephone Network
(PSTN)
Cat5/6 Network
Connection
Radio Frequency
WiMax
ZigBee
6LoWPAN
802.11x
Cellular
(CDMA/EVDO,
GSM, LTE)
24. Cyber Attacks
Remember C I A
Confidentiality Attacks
Reading, “Sniffing” the data
Integrity Attacks
Changing the Data
Availability Attacks
Denial of Service – Prevent Use of Service
25. Confidentiality Attacks
Buffer Overflow
Inject Data that is too “Big” for the Meter/System
Predominantly Caused by Bad Software Development
Snooping / Sniffing
Reading / Capturing the Data between Meter and Collector and Vice Versa
Also Internal to Meter Between Microcontroller and Radio
A Reason for Encryption – “Cleartext is Bad”
Hacking the Encryption
Some Protocols Easy to Break
Causes – Weak Keys, Weak Protocols, Weak Initialization Vectors
Man-in-Middle Attack
“Bit Flipping” Attacks (Weak Integrity Functions)
Breaking Into Password Storage on Devices
“Race Condition” Exploits
A race condition is of interest to a hacker when the race condition
can be utilized to gain privileged system access.
26. Integrity Attacks
Key: Change the Data
Replay Attacks (Man-in-the-
Middle)
Why?
Change the Bill (Up or Down)
Modify Usage Data
Use Data for Fraud
Use as Alias
“Gee Officer, I wasn‟t home that night!”
27. Availability Attacks
Denial of Service (DoS) Attacks
Examples: Georgia Cyber War, Estonia Cyber War
Spoofing
Pretending You are Another Meter
Meter Authentication Weaknesses
Manipulate Meter to Collector
Or
Manipulate Collector to Meter
Name Resolution Attacks
Meter Name Cache Poisoning
Denial of Service Attacks Against DNS Servers
Reroute Meter Traffic to Another Meter or Collector or Network
Hold Ransom
Before Super Bowl?
Over a Community/Neighborhood?
Wartime Reserve
Chipset Backdoor “Pre-Attack” in Smart Meters
http://www.aclaratech.com/AclaraRF/PublishingI
mages/starsystem_th.jpg
29. Privacy Attacks (2)
Determine Lifestyles
Determine Best Time to Rob
Use Info to “Sell” Services (e.g., “I‟m here to fix your broken
refrigerator, Ma‟m!)
http://www.baystatetech.org/graphics/major-app.jpg
30. STORAGE ISSUES
A Paradigm Shift Microsoft Clip Art Online
www.smartgridnews.com
Today’s Environment The Future Smart Grid
Analog Meters or Simple Digital Meters “Smart” Digital Meters & “Smart”
Manually Read or Use “Drive By” Reading Sensors
Read Monthly (or Less Frequently) Automatic Reading
Read Every ~15 Minutes or More
Minimal Data Accumulation
Frequently
Simple Data Fields – KWH Used Since “Data Avalanche!” – Numerous Data
Last Reading Fields and Classes
www.smartgridnews.com
Circuit Breaker Relays – ENHayden
ENHayden - Used -- Used with
with Permission Permission
31. Storage Considerations
Costs for More Data Centers and Storage
Error Handling
Data Analytics and Business Intelligence Resources
Security of Data – Static and Dynamic…
Stored or in Transit
Privacy of Data – Consider EU Privacy Laws
Consumer Education Requirements
Auditing, Reporting, Regulatory Impacts
32. What To Do?
#1: DON‟T GIVE UP!
#2: DON‟T IGNORE THE THREATS!
#3: LEARN AND STUDY – DO THREAT MODELING
#4: INCLUDE SECURITY, IT, UTILITY OPERATIONS
IN PLANNING AND SOLUTION DEVELOPMENT
#5: WORK WITH SECURITY EXPERTS
& CONSULTANTS
#6: ASK HARD QUESTIONS
#7: BUILD DEFENSE-IN-DEPTH IN EVERY PHASE
OF
YOUR SMART GRID SOLUTION
#8: INCIDENT RESPONSE SET UP, PRACTICED
#9: STORAGE – PLAN, IDENTIFY CONTINGENCIES,
LOOK OUTSIDE THE BOX
#10: INCLUDE SECURITY EARLY, OFTEN