Industrial Control Systems Security and Supervisory Control and Data Acquisition (SCADA (original) (raw)
Related papers
Securing industrial control system environments: the missing piece
Journal of Cyber Security Technology, 2018
Cyber-attacks on Industrial Control Systems (ICS) are no longer matters of anticipation. Industrial infrastructures are continually being targeted by malicious cyber actors with very little resistance on their paths. From network breaches to data theft, denial of service attacks to privilege escalation; command and control functions have in some way been exerted on targeted industrial systems. Safety, security, resilience, reliability and performance require private industrial control system user organizations and the public sector to device strategies and steps towards dealing decisively to these emerging and increasing ICS cyber security concerns. There are already couple security solutions proposed by governments, private organizations, academia, and industries for achieving this goal. This discourse reviews the ICS security risk landscape, current security strategies and solutions with a view to discovering the gaps or weaknesses in the effective mitigation of cyber-attacks, and the enhancement of cyber security. Notable fissures in existing ICS security solutions include: greater emphasis on technology security while discounting other critical bits like people and processes, which is clearly incongruent with emerging security threats and attack trends, the unilateral dimension strategy towards security which focuses more on SCADA systems, and the emergence of more sector-specific solutions as against generic security solutions. Better solutions include approaches that follow similar evolutionary patterns as the problem trend. These include cyber security measures that would embrace constant evolution in response to changes in the threat, vulnerabilities, attacks, and impact domains. Solutions that recognise and capture; people, process, and technology security enhancement into a single system entity with holistic provisioning that can meet all three-entity vulnerabilities for a more secured ICS environment.
Exploring security controls for ICS/SCADA environments
2020
Industrial Control Systems (ICS) are beginning to merge with IT solutions, in order to promote inter-connectivity. Although this brings countless benefits from a control perspective, ICS have been lacking in security mechanisms to ward off potential cyber threats, when compared to common information systems [29], [64]. Given the critical nature of these systems, and the recent occurrences of disastrous cyber-attacks, security is a topic that should be encouraged. In light of this problem, in this dissertation we present an assessment of possible security applications and controls that can be deployed in these critical environments and the implementation of an extensible security solution that responds to certain attacks focused on industrial systems, capable of being deployed in any industrial network that allows its connection. With the help of an extensible and portable framework for ICS testing, and other industrial testing environments, it was possible to analyze different threat scenarios, implement security mechanisms to detect them and evaluate the results in order to provide an idea on how to employ these mechanisms as best as possible in a real industrial control environment, without compromising it's process.
A Survey of Industrial Control Systems Security
2011
Industrial Control Systems (ICS) that monitor and operate critical industrial infrastructure worldwide are subject to an increasing frequency of cyber attacks. Evolution of the ICS environment to include standard operating system (OS) platforms and connectivity to corporate LANs and the world-wide-web occurred in ICS environments that were insulated from the outside world by a closed, trusted network. The result is legacy systems and component devices exposed to modern external threats with weak or non-existent security mechanisms in place. The risk to ICS is gradually being addressed, but not nearly fast enough to protect from easily devised cyber attacks.
Improving Security in SCADA Systems
Supervisory control and data acquisition (SCADA) systems and distributed control systems (DCS) were innovated to reduce labor costs, and to permit system-wide monitoring and remote control from a headquarter. Control systems are widely implemented in critical infrastructures such as electric grid, natural gas and petroleum, water, and wastewater industries. In this paper the structure and architecture of SCADA systems will be discussed. Since control systems can be vulnerable to different types of cyber attacks which could have destroying results and consequences, we have suggested methods and solutions for increasing security and preventing vulnerability of these systems.
An Analysis of Critical Cybersecurity Controls for Industrial Control Systems
European Conference on Cyber Warfare and Security
Industrial Control Systems (ICS) comprise software, hardware, network systems, and people that manage and operate industrial processes. Supervisory Control and Data Acquisition Systems (SCADA) and Distributed Control Systems (DCS) are two of the most prevalent ICS. An ICS facilitates the effective and efficient management and operation of industrial sectors, including critical infrastructure sectors like utilities, manufacturing, and water treatment facilities. An ICS collects and integrates data from various field controllers deployed in industrial contexts, enabling operators to make data-driven decisions in managing industrial operations. Historically, ICS were isolated from the internet, functioning as part of air-gapped networks. However, the efficiency improvements brought about by the emergence of Information Technology necessitated a shift towards a more connected industrial environment. The convergence of Information and Operational Technology (IT/OT) has made ICS vulnerabl...
A Methodology to Enhance Industrial Control System Security
Procedia Computer Science, 2018
The frequency and sophistication of cyber-threats towards Industrial Control Systems (ICS) continues to increase. This reality, coupled with the increased interconnectivity of ICS and enterprise networks and the utilisation of standard system platforms and operating systems, has raised the potential risk to both the security and safety of critical infrastructure. There is a growing awareness that the safety and security of ICS cannot be dealt with in isolation, it should be considered jointly. This paper proposes a methodology that harmonises safety and security within ICS environments. The findings also indicate that efforts to harmonise safety and security extends beyond deconflicting and implementing effective technical countermeasures-nontechnical factors and the organisational context play an equally important part.
An assessment of the application of IT security mechanisms to industrial control systems
International Journal of Internet Technology and Secured Transactions, 2017
Industrial control systems (ICS) are increasingly becoming the target of cyber attacks. In order to counter this threat, organisations are turning to traditional IT security mechanisms to protect their operations. However, ICS includes a range of technologies which are often unfamiliar to contemporary IT security professionals or the tools they deploy. This paper explores the applicability of these tools within an ICS and critically analyses contemporary ICS architectures. The contribution of this paper is a clear identification of the areas of ICS to which IT security mechanisms can be applied and the challenges that are faced in the others. The paper continues to explore what mechanisms may be considered in these non-traditional areas of technology.
Security for industrial automation and control systems
The security of industrial automation and control systems becomes increasingly critical as different networks are connected and systems are integrated in a collaborative manufacturing environment. For industrial automation and control systems the potential impact of an attack may be more serious than for computer systems in general. Users of industrial automation and control systems need to pay correspondingly increased attention to these issues. Security measures aim at protecting the confidentiality, integrity, and availability of a computer system from being compromised through deliberate or accidental attacks. Similar to process and safety improvements, security improvement needs to be a continuous activity. This white paper provides background and a general overview of different elements of information system security, with specific emphasis on how it applies to industrial automation and process control. Different security measures that should be considered when an automation system is connected to external networks of different kinds are discussed, including connections to general purpose IS and corporate networks, remote connections, and wireless connections.
NIST Guide to Supervisory and Data Acquisition SCADA and Industrial Control Systems Security 2007
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL's research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations.