/
EH2750 Computer application in Power Systems, Advanced EH2750 Computer application in Power Systems, Advanced

EH2750 Computer application in Power Systems, Advanced - PowerPoint Presentation

chaptoe
chaptoe . @chaptoe
Follow
344 views
Uploaded On 2020-06-30

EH2750 Computer application in Power Systems, Advanced - PPT Presentation

Course Guest Lecture I Cybersecurity amp Architectures Rune Gustavsson ICS 20111116 1 Rune Gustavsson Overview Setting the scene Important time dependencies Targeted Persistent Threats TPT ID: 789844

16rune 2011 technologies art 2011 16rune art technologies state stuxnet study case theft threats cyber role rune access gustavsson

Share:

Link:

Embed:

Download Presentation from below link

Download The PPT/PDF document "EH2750 Computer application in Power Sys..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

EH2750 Computer application in Power Systems, Advanced CourseGuest Lecture I – Cybersecurity & Architectures

Rune GustavssonICS

2011-11-16

1

Rune Gustavsson

Slide2

OverviewSetting the sceneImportant time dependenciesTargeted Persistent Threats (TPT)Report on Shadow Remote Access Tools (RATs)Role Based Access ControlCase Study - StuxnetDefense in DepthState-of-The Art TechnologiesThe role of Cyber Security at KTHDiscussion2011-11-16

Rune Gustavsson2

Slide3

Setting the Scene.2011-11-16Rune Gustavsson3

SystemSmart Grid

External attack Motive

Opportunity Method

Internal dysfunctions

Breakdowns

Faulty behaviour

Risks

Exploits of

vulnerabilities

Technical

Organizational

Societal

No well defined system boundaries in a connected world!

Slide4

Basic Time FramesBasic equation: P = Protection, D = Detection, R= Response

2011-11-16Rune Gustavsson

4

The

Exposure time

E should be as

small

as possible!

May be very long in cases of

TPAs

!

Slide5

Advanced Persistent Threats (APT)Recent advanced and targeted cyber attacks on infra stuctures (sabotage, business intelligence, thefts)Stuxnet – industrial sabotage of Siemens DCS in IranGhostnet – theft

of diplomatic informationAurora – theft of source code and IPR at GoogleNight Dragon –

industrial and commercial intelligence of large oil companiesPS3/PSN attack –

business sabotage on Sony Play Station NetworksAlso under attackRSA

IntellicorpComplements short term goals of Cyber crime

Money Laundry

BRUSSELS 15/09/2011

5

SEESGEN-ICT - FINAL REVIEW MEETING

Slide6

Revealed: Operation Shady RAT (I)White paper from McAfee August 2011http://www.mcaffe.com/Logs from a C&C server used by intruders since 2006Conclusions:Vast amounts of data (petabytes) has been lost to (unknown) usersRepresent a massive economic threat to individual companies and industries and even countries that face the prospect of decreased economic growth un a suddenly more competitive landscape ad the loss of jobs in industries that lose out to unscrupulous competitors in other part of the world

2011-11-16Rune Gustavsson

6

Slide7

Revealed: Operation Shady RAT (II).2011-11-16Rune Gustavsson7

Slide8

Revealed: Operation Shady RAT (III).2011-11-16Rune Gustavsson8

Note the logged duration times since2006!

Slide9

Role Based Access Control (RBAC)The strategy of role-based access control includes restriction to minimally required rights and functions for users, operators, devices, network and software components. Close consultation on the following aspects is required to achieve effective protection with this strategy without restricting normal activities:Access control for the respective plant and its area protection Intended use of individual devices and software componentsOrganization of the production and its areas of responsibility and thereby for the plant managerAdministration of the plant Responsibilities of the operator

2011-11-16Rune Gustavsson

9

Slide10

US Strategy for Trusted Identities in Cyber SpaceBackground to NSTIC Proposal for Trusted Identities in Cyberspace (April 2011)Identity theft is costly, inconvenient and all-too commonIn 2010, 8.1 million U.S. adults were the victims of identity theft or fraud, with total costs of $37 billion.The average out-of-pocket loss of identity theft in 2008 was $631 per incidentConsumers reported spending an average of 59 hours recovering from a “new account” instance of ID theft.

2011-11-16Rune Gustavsson10

Slide11

The Identity Ecosystem (NSTIC)Supports revocations of Identities and Credentials!2011-11-16Rune Gustavsson11

Slide12

Case Study Stuxnet (I).2011-11-16Rune Gustavsson12

Slide13

Case Study Stuxnet (II).2011-11-16Rune Gustavsson13

Slide14

Case Study Stuxnet (III).2011-11-16Rune Gustavsson14

Slide15

Case Study Stuxnet (IV).2011-11-16Rune Gustavsson15

Slide16

Case Study Stuxnet (V).2011-11-16Rune Gustavsson16

Slide17

Case Study Stuxnet (VI).2011-11-16Rune Gustavsson17

Slide18

Case Study Stuxnet (VII).2011-11-16Rune Gustavsson18

Slide19

Case Study Stuxnet (VIII).2011-11-16Rune Gustavsson19

Slide20

Case Study Stuxnet (IX).2011-11-16Rune Gustavsson20

Slide21

Case Study Stuxnet (XI).2011-11-16Rune Gustavsson21

Slide22

Defense in Depth.2011-11-16Rune Gustavsson22

Slide23

State-of-The-Art Technologies (I)DetectionWith thousands of workstations and servers under management, most enterprises have little to no way to effectively make sure they are free of malware and Advanced Persistent Threats (APTs). APTs are broadly defined as sophisticated, targeted attacks (as opposed to botnets, banking Trojans and other broad-based threats) that rely heavily on unknown (zero-day) vulnerabilities and delivery via social engineering. Multiple recent hacking events made public have highlighted the vulnerabilities of even the most renowned security companies, government contractors and Fortune 500 enterprises. This problem can affect any enterprise and a new approach to combat these threats must be implemented in order to deal with it effectively.

2011-11-16Rune Gustavsson

23

Slide24

State-of-The-Art Technologies (II)Using Signatures to detect attacks (malware) is hard (impossible)! 2011-11-16Rune Gustavsson24

Slide25

State-of-The-Art Technologies (III)Using the ECAT tool on-line monitoring of system memories to address APT threats (http://www.siliciumsecurity.com/)2011-11-16

Rune Gustavsson25

Slide26

State-of-The-Art Technologies (IV).2011-11-16Rune Gustavsson26

Slide27

State-of-The-Art Technologies (IV).2011-11-16Rune Gustavsson27

Defining zones and conduits by virtualizations

Slide28

State-of-The-Art Technologies (V).2011-11-16Rune Gustavsson28

Slide29

State-of-The-Art Technologies (VI).2011-11-16Rune Gustavsson29

Slide30

State-of-The-Art Technologies (VII).2011-11-16Rune Gustavsson30

Slide31

State-of-The-Art Technologies (VIII).2011-11-16Rune Gustavsson31

Slide32

State-of-The-Art Technologies (IX).2011-11-16Rune Gustavsson32

Slide33

State-of-The-Art Technologies (X).2011-11-16Rune Gustavsson33

Slide34

State-of-The-Art Technologies (XI).2011-11-16Rune Gustavsson34

Slide35

State-of-The-Art Technologies (XII).2011-11-16Rune Gustavsson35

Slide36

State-of-The-Art Technologies (XIII).2011-11-16Rune Gustavsson36

Slide37

The Role of Cyber Security at KTHOngoing EU sponsored Projects on Smart GridsGrid4EUTotal budget about 55 MEUROKick-OFF November 21st – 22nd November 2011Swedish partners: KTH, Vattenfall, and ABB KIC InnoEnergyINSTINCT2011-11-16

Rune Gustavsson37

Slide38

DiscussionThanks!2011-11-16Rune Gustavsson38