Cover image for Securing SCADA systems
Title:
Securing SCADA systems
Personal Author:
Publication Information:
Indianapolis, IN : Wiley Publishing, 2006
ISBN:
9780764597879

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010114548 TS156.8 K78 2006 Open Access Book Book
Searching...
Searching...
30000010114547 TS156.8 K78 2006 Open Access Book Book
Searching...
Searching...
30000010114550 TS156.8 K78 2006 Open Access Book Book
Searching...
Searching...
30000010114549 TS156.8 K78 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) systems Krutz discusses the harsh reality that natural gas pipelines, nuclear plants, water systems, oil refineries, and other industrial facilities are vulnerable to a terrorist or disgruntled employee causing lethal accidents and millions of dollars of damage-and what can be done to prevent this from happening Examines SCADA system threats and vulnerabilities, the emergence of protocol standards, and how security controls can be applied to ensure the safety and security of our national infrastructure assets


Author Notes

Ronald L. Krutz, PhD, P.E., CISSP, ISSEP, is Senior Information Security Researcher for Lockheed Martin Information Technologies


Table of Contents

About the Authorp. vii
Acknowledgmentsp. xvii
Introductionp. xix
Chapter 1 What Is a SCADA System?p. 1
History of Critical Infrastructure Directives SCADA System Evolution, Definitions, and Basic Architecturep. 3
SCADA Evolutionp. 5
SCADA Definitionp. 6
SCADA System Architecturep. 7
SCADA Applicationsp. 10
SCADA System Security Issues Overviewp. 16
SCADA and IT Convergencep. 16
Conventional IT Security and Relevant SCADA Issuesp. 17
Redundancy as a Component of SCADA Securityp. 20
SCADA System Desirable Propertiesp. 20
Summaryp. 22
Chapter 2 SCADA Systems in the Critical Infrastructurep. 23
Employment of SCADA Systemsp. 23
Petroleum Refiningp. 23
The Basic Refining Processp. 24
Possible Attack Consequencesp. 26
Nuclear Power Generationp. 26
The Boiling Water Reactorp. 27
The Pressurized Water Reactorp. 28
Possible Attack Consequencesp. 29
Conventional Electric Power Generationp. 30
Petroleum Wellhead Pump Controlp. 32
Water Purification Systemp. 34
Crane Controlp. 36
SCADA in the Corporationp. 37
Chemical Plantp. 38
Benzene Productionp. 38
Embedded Systemsp. 40
Why We Should Worry about These Operationsp. 40
Summaryp. 41
Chapter 3 The Evolution of SCADA Protocolsp. 43
Evolution of SCADA Protocolsp. 43
Background Technologies of the SCADA Protocolsp. 44
Overview of the OSI Modelp. 44
Overview of the TCP/IP Modelp. 48
SCADA Protocolsp. 50
The MODBUS Modelp. 50
The DNP3 Protocolp. 52
UCA 2.0 and IEC61850 Standardsp. 53
Controller Area Networkp. 54
Control and Information Protocolp. 55
DeviceNetp. 56
ControlNetp. 57
EtherNet/IPp. 57
FFBp. 59
Profibusp. 61
The Security Implications of the SCADA Protocolsp. 63
Firewallsp. 63
Packet-Filtering Firewallsp. 63
Stateful Inspection Firewallsp. 65
Proxy Firewallsp. 65
Demilitarized Zonep. 65
Single Firewall DMZp. 66
Dual Firewall DMZp. 66
General Firewall Rules for Different Servicesp. 66
Virtual Private Networksp. 69
Summaryp. 71
Chapter 4 SCADA Vulnerabilities and Attacksp. 73
The Myth of SCADA Invulnerabilityp. 73
SCADA Risk Componentsp. 76
Managing Riskp. 78
Risk Management Componentsp. 79
Assessing the Riskp. 79
Mitigating the Riskp. 80
SCADA Threats and Attack Routesp. 81
Threatsp. 81
SCADA Attack Routesp. 82
Typical Attacker Privilege Goalsp. 83
SCADA Honeynet Projectp. 85
Honeypotsp. 85
Honeynet Projectp. 86
SCADA Honeynetp. 86
Summaryp. 87
Chapter 5 SCADA Security Methods and Techniquesp. 89
SCADA Security Mechanismsp. 89
Improving Cybersecurity of SCADA Networksp. 90
Implementing Security Improvementsp. 96
SCADA Intrusion Detection Systemsp. 97
Types of Intrusion Detection Systemsp. 98
Network-Based and Host-Based IDSp. 98
Signature-Based and Anomaly-Based IDSp. 99
Active-Response IDSp. 99
Passive-Response IDSp. 100
Processing of IDS Datap. 100
Vulnerability Scanning and Analysisp. 100
SCADA Audit Logsp. 102
Security Awarenessp. 106
Summaryp. 108
Chapter 6 SCADA Security Standards and Reference Documentsp. 109
ISO/IEC 17799:2005 and BS 7799-2:2002p. 110
ISO/IEC 1779:2005p. 111
BS 7799-2:2002p. 112
ISA-TR99.00.01-2004, Security Technologies for Manufacturing and Control Systemsp. 113
ISA-TR99.00.02-2004, Integrating Electronic Security into the Manufacturing and Control Systems Environmentp. 114
GAO-04-140T, Critical Infrastructure Protection, Challenges in Securing Control Systemsp. 115
NIST, System Protection Profile for Industrial Control Systems (SPP ICS)p. 117
Federal Information Processing Standards Publication (FIPS Pub) 199, Standards for Security Categorization of Federal Information and Information Systems, February 2004p. 117
Additional Useful NIST Special Publicationsp. 119
NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systemsp. 119
NIST Special Publication 800-53, Recommended Security Controls for Federal Information Systemsp. 120
NIST Special Publication 800-53A, Guide for Assessing the Security Controls in Federal Information Systemsp. 121
Summaryp. 122
Chapter 7 SCADA Security Management Implementation Issues and Guidelinesp. 123
Management Impressions of SCADA Securityp. 123
SCADA Culturep. 124
Unique Characteristics and Requirements of SCADA Systemsp. 125
Limitations of Current Technologiesp. 126
Guidance for Management in SCADA Security Investmentp. 127
Information-System Security Engineeringp. 127
Discover Information Protection Needsp. 128
Define System Security Requirementsp. 128
Design System Security Architecturep. 128
Develop Detailed Security Designp. 129
Implement System Securityp. 129
Common Criteria Protection Profilesp. 130
Defense-in-Depthp. 130
Peoplep. 131
Technologyp. 131
Operationsp. 132
Defense-in-Depth Strategyp. 132
The NIST SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systemsp. 134
NIST Special Publication 800-26, Security Self-Assessment Guide for Information Technology Systemsp. 136
Summaryp. 137
Chapter 8 Where We Stand Todayp. 139
The Status Todayp. 139
Human Issuesp. 140
Weakness of Standard Security Approachesp. 142
The Oil and Gas Industryp. 142
API Standard 1164p. 143
AGA Report Number 12p. 144
Interdependenciesp. 144
Rail System Securityp. 145
Port Securityp. 146
Legislationp. 148
Threats to Seaportsp. 148
Countermeasuresp. 149
Conventional Countermeasuresp. 149
Advanced Countermeasuresp. 150
Security Controls That Can Be Put in Place Nowp. 151
Summaryp. 152
Appendix A Acronyms and Abbreviationsp. 153
Appendix B System Protection Profile - Industrial Control Systemsp. 157
Appendix C Bibliographyp. 195
Indexp. 201