16
COMPUTER SECURITY ASPECTS IN INDUSTRIAL INSTRUMENTATION AND MEASUREMENTS Vishnu S7 CS Roll no 30 1

Computer security aspects in

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Computer security aspects in

1

COMPUTER SECURITY ASPECTS IN

INDUSTRIAL INSTRUMENTATION AND MEASUREMENTS

Vishnu S7 CSRoll no 30

Page 2: Computer security aspects in

2

INTRODUCTION• Industrial Control Systems (ICS), formerly

isolated proprietary systems.• Now they are giving place to highly-connected

systems.• Implemented using widespread operating

systems and network protocols in public networks.

• It also opens the door to security threats.

Page 3: Computer security aspects in

3

• This seminar presents the main concepts of security in conventional computing systems,

• Discusses their mapping on dependability aspects of ICS,

• And exposes some considerations about security aspects of a standard-based control board typically used in industrial applications.

Page 4: Computer security aspects in

4

BASIC CONCEPTS

• Security properties:o Confidentialityo Integrityo Availability

• Security Threatso Threat to confidentialityo Threat to integrityo Threat to availabilityo Security principles

Page 5: Computer security aspects in

5

• Security principles– Minimum privilege– Complete mediation– Secure default– Mechanism economy– Minimum sharing

Page 6: Computer security aspects in

6

(Cont…)– Open project– Adequate protection– Ease of use– Efficiency– Weakest link

Page 7: Computer security aspects in

7

• Security VulnerabilitiesExamples:o an error in the implementation of a file sharing

service that allows unauthorized users to access files remotely from a computer.

o a user account without password, or with a factory default password, allowing unauthorized users to access the system.

o empty disk quotas, allowing a user to fill the entire disk and thus to prevent other users to use the system.

Page 8: Computer security aspects in

8

• Attacks– Interruption– Interception– Modification– Fabrication

• Security infrastructure– Authentication– Access control– Auditing

Page 9: Computer security aspects in

9

SECURITY ASPECTS IN INDUSTRIAL CONTROL SYSTEMS

In industrial processes, many kinds of ICS are used as, for example,

• Supervisory Control and Data Acquisition (SCADA) systems,

• Distributed Control Systems (DCS),• Programmable Logic Controllers (PLC)

Page 10: Computer security aspects in

10

The following incidents on ICS are possible:• Corrupted information may be sent to the

system operators.• Delay of information flow through the ICS

network.• Instruction, command, and code corruption,

or similar integrity problems.• Unwanted and not managed change in ICS

software configuration, settings, and operational parameters.

Page 11: Computer security aspects in

11

• ICS software infected with malware, opening doors for several kinds of active or passive security problems.

• Malicious actions may have an impact on the system output.

• Attacks may even have dramatic consequences on the system safety.

Page 12: Computer security aspects in

12

Many approaches are conceivable to overcome the aforementioned incidents:

• A network architecture which includes firewalls

• Separate authentication mechanisms and credentials for users in the corporate and ICS networks, as dictated by the minimum privilege and the adequate protection principles.

Page 13: Computer security aspects in

13

• Using a network topology with multiple layers.• Restricting physical access to the ICS network

and related devices.• Protecting individual ICS components from

exploitation.• In case of adverse security conditions the

system should be able to maintain the correct functionality or to drive itself back to a secure condition.

• A consideration is here mandatory: incidents are often inevitable.

Page 14: Computer security aspects in

14

• wireless networks are becoming a reality in distributed measurement and control systems.

• physical access to a wireless network is much easier. Due to this, wireless networks are more vulnerable to confidentiality risks, Integrity risks, Availability risks.

Page 15: Computer security aspects in

15

CONCLUSION

• As industrial instrumentation and measurement systems evolve, they aggregate more sophisticate software, both applications and operating systems.

• Security threats traditionally present only in corporate/personal computing now represent a real menace for such systems.

• In this seminar, a parallel between conventional computer security concepts and industrial systems’ dependability have been presented.

Page 16: Computer security aspects in

16

THANKYOU