25
Data Tampering Threats and Counter Measures Sudheesh Narayanan © Copyright 2016. All Rights Reserved

Data Tampering Threats and Counter Measures

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Data Tampering Threats and Counter Measures

Data Tampering Threats and Counter Measures

Sudheesh Narayanan

© Copyright 2016. All Rights Reserved

Page 2: Data Tampering Threats and Counter Measures

Agenda

© Copyright 2016. All Rights Reserved

• General Connectivity Scheme for Data Acquisition for CEMS, EQMS and CAAQMS• Data Interpretations and Identifying Data Integrity Issues!• Understanding Data and Data Quality• Key Focus Areas of Inspection of CEMS, EQMS and CAAQMS

Page 3: Data Tampering Threats and Counter Measures

Analyzer Data Acquisition System

Regulator Platform

Online Data Transmission

Industry Specific Limit Configuration

SMS and Email AlertsFor Exceedance or Shutdown

Regulator Data Analysis

Local Software at Industry

Process Input or Samples

CalibrationSystem

Standard Gas

General Schema for Data Transmission and Point to watch for

IoT Module

PC

1

2

Analog (4-20mA) orDigital

3

4

Vendor Server

5

Page 4: Data Tampering Threats and Counter Measures

Typical Connectivity Solution

Mobile App

Connectivity Models

Page 5: Data Tampering Threats and Counter Measures

Overview of Direct Connectivity From Analyzer

© Copyright 2014. All Rights Reserved

Ambient Monitoring

Emission Monitoring Systems

Wireless Module

DAC Software

Internet

Cloud Server

Internet

GLens Mobile App

Dashboard displayed on TV

Central Software is Web Accessible

Effluent Monitoring Systems

Wireless Module

Overview of Direct Connectivity From Analyzer

Page 6: Data Tampering Threats and Counter Measures

How to Interpret the Online Data from CEMS, EQMS, AAQMS

© Copyright 2016. All Rights Reserved

• Availability of Data /Uptime Report• Delayed Data• Data Quality • Data Gaps• Exceedances • Diurnal Analysis• Matrix Report• Startup and Shutdown Sequence• Co-relation charts for Environmental Correlation• Randomness• Analyzer Drifts• Range Shifts• Calibration Issues• Comparison across Sectors

Page 7: Data Tampering Threats and Counter Measures

Data Tampering Mechanisms

© Copyright 2016. All Rights Reserved

• Setting Upper Clamp• Changing Linearization Coefficient• Changing Analyzer Range • Data Simulation from Vendor Server• File Based Data Transfer• Non-Continuous Data

Page 8: Data Tampering Threats and Counter Measures

3 Cement Plant PM

mg/

m3

1 Month Datam

g/m

3

Selected 1 Parameter and You see the issue!!

Page 9: Data Tampering Threats and Counter Measures

mg/

m3

mg/

m3

Understanding 15 Minute Average vs 1 Minute Average

Page 10: Data Tampering Threats and Counter Measures

Recalibration or Drift or Tampering?

Page 11: Data Tampering Threats and Counter Measures

How to identify Analyzer Drifts!! Calibration Issue

Page 12: Data Tampering Threats and Counter Measures

Upper Limit Threshold - 1

© Copyright 2016. All Rights Reserved

DATA PEAK AT 50 mg/m3. AFTER ALERT DATA PEAK AT 40 mg/m3

Page 13: Data Tampering Threats and Counter Measures

Upper Limit Threshold - 2

© Copyright 2016. All Rights Reserved

DATA PEAK JUST BELOW 50 mg/m3.

Page 14: Data Tampering Threats and Counter Measures

Upper Limit Threshold - 3

© Copyright 2016. All Rights Reserved

DATA PEAK AT 350 mg/m3.

Page 15: Data Tampering Threats and Counter Measures

Data Simulation

© Copyright 2016. All Rights Reserved

RANDOM DATA SIMULATION WITH DATA PEAK AT 30 mg/m3

Page 16: Data Tampering Threats and Counter Measures

Correlation between COD, BOD, TSS

Page 17: Data Tampering Threats and Counter Measures

BOD Greater than COD? Distillery..

Page 18: Data Tampering Threats and Counter Measures

Last 30 days for a Power Plant NOxm

g/m

3m

g/m

3

Till this point it was exceeding

Page 19: Data Tampering Threats and Counter Measures

Uptime

Page 20: Data Tampering Threats and Counter Measures

Uptime from Same Industry for different parameter

Page 21: Data Tampering Threats and Counter Measures

Averaging Effect on Data

Watch for Discontinuous Data Stream!!

Page 22: Data Tampering Threats and Counter Measures

Uptime Analysis for 3 Months!!

Page 23: Data Tampering Threats and Counter Measures
Page 24: Data Tampering Threats and Counter Measures

Key Focus Area for Regulators during Site Inspection

© Copyright 2016. All Rights Reserved

• Consent to Operate (CTO)• Location of the Installation• Technology Choices for different Process• Range of the Analyzer• Inspection of the Analyzer • Connectivity Scheme• Operation of the Analyser• Data Transmission• Comparison with Historical Trends• Calibration Information • Factors and Normalization• Key items to watch

• File Based Transfer• Delayed Data Transfer• Switching of Analyzers

Page 25: Data Tampering Threats and Counter Measures

© Copyright 2016 . All Rights Reserved

Thank You