Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

Techno Security's Guide to Securing SCADA - A Comprehensive Handbook On Protecting The Critical Infrastructure

Techno Security's Guide to Securing SCADA - A Comprehensive Handbook On Protecting The Critical Infrastructure

of: Jack Wiles, Ted Claypoole, Phil Drake

Elsevier Trade Monographs, 2008

ISBN: 9780080569994 , 352 Pages

Format: PDF, ePUB, Read online

Copy protection: DRM

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Apple iPod touch, iPhone und Android Smartphones Read Online for: Windows PC,Mac OSX,Linux

Price: 55,95 EUR



More of the content

Techno Security's Guide to Securing SCADA - A Comprehensive Handbook On Protecting The Critical Infrastructure


 

Front Cover

1

Techno Security's Guide to Securing SCADA

4

Copyright Page

5

Lead Author

6

Contributors

8

Foreword Contributor

15

Contents

16

Foreword

24

Chapter 1: Physical Security: SCADA and the Critical Infrastructure’s Biggest Vulnerability

26

Introduction

27

Key Control

28

Check All Locks for Proper Operation

29

A Little More about Locks and Lock Picking

30

The Elephant Burial Ground

37

Dumpster Diving Still Works

43

Employee Badges

45

Shredder Technology Has Changed

47

Keep an Eye on Corporate or Agency Phonebooks

48

Tailgating

49

Building Operations-Cleaning Crew Awareness

50

Spot-Checking Those Drop Ceilings

53

Checking for Key Stroke Readers

53

Checking Those Phone Closets

56

Removing a Few Door Signs

57

Review Video Security Logs

57

Motion-Sensing Lights

58

Let’s Go to Lunch

59

Fun in Manholes

62

Internal Auditors Are Your Friends

65

Always Be Slightly Suspicious

65

Getting Every Employee Involved

66

Summary

67

Solutions Fast Track

67

Frequently Asked Questions (and Special Interviews)

70

Chapter 2: Supervisory Control and Data Acquisition

86

Introduction

87

Just What Is SCADA?

87

SCADA Systems and Components

90

Remote Terminal Units (RTUs)

90

Programmable Logic Controllers (PLC)

90

Discrete Control

90

Continuous Control

90

Human Machine Interface (HMI)

91

Distributed Control Systems (DCS)

91

Hybrid Controllers

92

Event Loggers

92

Common SCADA Architectures

93

SCADA Communications Protocols

95

How Serious Are the Security Issues of SCADA?

96

Determining the Risks in Your SCADA System

100

Risk Mitigation for SCADA

101

Firewall Considerations for SCADA

103

Negative and Positive Security Models in Firewalls

104

Multi-Network Connectivity

104

Reactive and Proactive Solutions

105

Firewall Inspection Methods

107

Static Packet Filter

107

The Stateful Packet Filter

108

The Circuit-Level Gateway

109

Application-Level Gateway (Proxy)

110

Intrusion Prevention Gateway

112

Deep Packet Inspection

113

Unified Threat Management (UTM)

114

Summary

115

Solutions Fast Track

115

Frequently Asked Questions

118

Chapter 3: SCADA Security Assessment Methodology

120

Introduction

121

Why Do Assessments on SCADA Systems?

121

Assessments Are the Right Thing to Do

122

Assessments Are Required

122

Information Protection Requirements

122

National Institute of Standards and Technology (NIST) Guidance

123

North American Electric Reliability Council (NERC) Critical Infrastructure Protection (CIP) Standards

124

Water Infrastructure Security Enhancement (WISE)

124

The Critical Infrastructure Information Act of 2002

124

An Approach to SCADA Information Security Assessments

125

Pre-Project Activities

127

Vetting the Assessment Request

127

Gaining Buy-In from Management and Technical Personnel

127

Management Buy-In

128

Technical Staff Buy-In

128

Researching the Organization

129

Researching Regulatory and Policy Requirements

130

Determining if this Is a Baseline Assessment or a Repeat Assessment

131

Making a Go/No-Go Decision

131

Pre-Assessment Activities

131

Determining the Organizational Mission

132

Identifying Critical Information

132

Example: Information Criticality

133

Business Description

133

Mission Statement

133

Critical Information for OOPS

134

Identifying Impacts

134

Example Continued: OOPS Impact

135

The Information Criticality Matrix

135

Using the Impact Definitions

136

Organizational Criticality

136

Example Continued: OOPS OICM

137

Identifying Critical Systems/Networks

138

OOPS Example Continued

138

Defining Security Objectives

141

Determining Logical and Physical Boundaries

142

Physical Boundaries

142

Logical Boundaries

142

Determining the Rules of Engagement, Customer Concerns, and Customer Constraints

142

The Rules of Engagement

143

Levels of Invasiveness

143

Testing Machine Addressing

143

Time Frames for Scanning and Interviews

144

Notification Procedures

144

Scanning Tools and Exclusions

144

Customer Concerns

144

Customer Constraints

145

Legal Authorization

145

Writing the Assessment Plan

145

Components of the Assessment Plan

145

On-Site Assessment Activities

147

Conducting the Organizational Assessment

147

Documentation Review

148

Interviews

148

System Demonstrations

149

Observation

149

Conducting the Technical Assessment

149

Enumeration Activities

150

Vulnerability Identification Activities

150

Tools

152

Communication

152

Post Assessment Activities

152

Conducting Analysis

152

Final Report Creation

153

Resources

154

Summary

155

Solutions Fast Track

156

Frequently Asked Questions

159

Chapter 4: Developing an Effective Security Awareness Program

162

Introduction

163

Why an Information Security Awareness Program Is Important

165

We Fail to Recruit Our Employees into the Company’s Security Program

166

We Need to Take the Issue Seriously

167

How to Design an Effective Information Security Awareness Program

168

Seven Times, Seven Different Ways

171

Show Me the Money!

173

Two Important Keys to Implementing an Effective Program

175

To Print or Not to Print

177

Online Training Programs

179

Your In-House Web Site

179

How to Implement an Information Security Awareness Program

180

What We Have Here Is a Failure to Communicate

182

Communicate, Communicate, Communicate!

182

Other Touch Points

182

Manager’s Quick Reference Guide

183

Let’s Talk about Alliances

184

Audit

184

Legal

184

Privacy

184

Compliance

185

Training and Communications

185

Personnel

185

Information Security Consultants

186

How Do You Keep Your Program a Successful Component of Your Company’s Mindset?

187

How to Measure Your Program

188

Summary

192

Solutions Fast Track

192

Chapter 5: Working with Law Enforcement on SCADA Incidents

196

Introduction

197

SCADA System Overview

197

Secure Network Management

200

Securing Wide Area Network Perimeter

200

Controlling Access

201

Performing Network Backup and Recovery

201

Transmitting Legacy Non-Routable Protocol Securely

201

Dial-Up Access to the Remote Terminal Units (RTU)

203

Vendor Support: Dial-Up Modem/VPN Access

203

IT Controlled Communication Gear

203

Corporate VPNs

204

Database Links

204

Poorly Configured Firewalls

205

Business Partner Links

205

Managing Security Events

206

Conduct Routine Assessments

207

Examples of Common Attack Techniques

207

Man-In-The-Middle Attacks (MITM)

207

Key-Logger Software

208

Summary

209

Solutions Fast Track

210

Frequently Asked Questions

212

Chapter 6: Locked but Not Secure: An Overview of Conventional and High Security Locks

214

Introduction

216

Conventional Pin Tumbler Locks

217

The Origins of the Modern Pin Tumbler Lock

219

Review: The Essentials of Pin Tumbler Lock Design

221

Security Enhancements for Conventional Locks

222

Anti-Bumping Pins

222

Security Pins

223

Keyways and Related Designs

224

Bitting Design

224

Design of the Key

225

Standards for Conventional and High Security Locks

226

Transforming a Conventional Cylinder to High Security

227

Deficiencies in the UL 437 Standard

229

Failure to Specify Real World Testing

229

Pick and Impressioning Resistance

230

Complex Forms of Picking

231

Forced Entry Resistance

231

Issues Not Addressed by UL 437

231

Bump Keys

232

Decoding Attacks

233

Key Control

233

Mechanical Bypass of Locking Mechanisms

234

BHMA/ANSI Standards: 156.50 and 156.30

235

BHMA/ANSI 156.50

235

High Security Locks and the BHMA/ANSI Standard

235

The Concept of Security

236

BHMA/ANSI 156.30 High Security Standard

237

Key Control

238

Destructive Testing

238

Surreptitious Entry Resistance

239

Deficiencies in the 156.30 Standard

239

Security Vulnerabilities of Conventional Locks: Why High Security Locks Are Supposed to Offer More Protection Against Methods of Entry

240

Conventional Pin Tumbler Locks: Security Vulnerabilities and Their Compromise

241

Lock Control Procedures

242

Key Control and Key Security

243

Key Security

243

The Concept of Key Control As It Applies to Security

244

The Importance of Key Control and Key Security

244

Rights Amplification

245

Replication, Duplication, and Simulation of Keys and Key Blanks

246

Gathering Intelligence About a System from Its Keys

246

Covert Entry Techniques: Manipulation

Covert Entry Techniques: Manipulation

247

247

Bumping

248

Picking

248

Impressioning

248

Extrapolation of the TMK

248

Mechanical Bypass

248

High Security to High Insecurity: Real World Attacks

249

Summary

251

Solutions Fast Track

251

Frequently Asked Questions

253

Chapter 7: Bomb Threat Planning: Things Have Changed

256

Introduction

257

The Day Our World Changed

258

Insider Information: Where Do These Guys Get This Stuff?

259

The Terrorist Profile

261

Potential Terror Targets

262

Statement Targets

262

Infrastructure Targets

263

Commercial Targets

264

Transportation Targets

264

What Should I Be Looking For?

264

The Container

265

The Power Source

265

Switches

266

Initiators

266

Main Charge

267

Searching: What Am I Looking For and Where?

269

Recommendations for Target Hardening

270

Outside

270

Employee Identification

271

Cameras

271

Deliveries

271

Interior

271

Mail rooms

272

Evacuation Plans

274

Summary

276

Chapter 8: Biometric Authentication for SCADA Security

278

Introduction

279

Understanding Biometric Systems and How They Are Best Used for SCADA Security

280

Footprints to DNA Readings

280

Human Measurements Can Slow Machines

280

Biometric System Imperfections Are at Odds with Perception

281

What is Biometric Authentication?

281

Multiple Factor Authentication

282

What Parts of You Can Be Measured for Security Purposes?

282

Common Measurements for Current Biometric Authentication

282

How Does Biometric Comparison Work?

283

Where Are Biometrics Used in SCADA Systems?

285

Choosing the Best Form of Measurement for Your System

286

Biometric Measurements Trigger Recognition

286

Biometric Measurements Useful in SCADA Security Processes

287

Identify Your System Priorities Before Choosing a Biometric Application

289

Where are Biometric Authentication Regimes Vulnerable?

291

Tricking the Biometric Capture Device

291

Electronic Manipulation of the Authentication Process

293

Identity Theft with Biometric Files: Capturing Your Essence

294

Presumptions of Accuracy

295

How Can We Replace That Finger?

295

Measuring Minutia Can Be Safer Than Storing a Whole Biometric Photograph

296

Anticipating Legal and Policy Changes That Will Affect Biometrics

297

Summary

299

Solutions Fast Track

299

Frequently Asked Questions

301

Appendix: Personal, Workforce, and Family Preparedness

304

Introduction

305

Threats

305

Your Personal Preparedness Plan

308

The Escape Pack

310

Description of Kit Contents

311

Workforce Preparedness

312

Steps for Successful Workforce Preparedness

314

Get Out, Get Away, and Get in Touch

315

Family Preparedness Plan

317

Possible Meeting Points

319

Community Shelter

319

The Personal Evacuation Bag

320

Preparedness Pantry

321

Water

324

Cooking

325

Testing Your Home Preparedness Plan

326

Family Ready Kit

327

Family Ready Kit Contents

328

No Lights? No Problem!

329

Emergency Lighting

330

Handheld Lights

331

Headlamps

332

General Illumination Lamps

333

Spots and Floodlights

334

Emergency Power

334

UPS and Battery Backup

337

Portable 12-Volt Inverters

337

Alternative Power Sources

338

Staying in Touch

339

Dynamo Radios

341

FRS Radios

341

Ham Radio

341

The “POTS” Line

342

Summary

343

Index

344