SlideShare a Scribd company logo
1 of 44
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Embedded systems,
a hidden security threat?
Jaap van Ekris, Delta Pi
J.vanEkris@Delta-Pi.nl
2
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Jaap van Ekris
3
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Agenda
• What are embedded systems?
• What makes them different?
• How can they disturb my business?
• What to do about it?
4
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
In the beginning…
• Mechanical control
• Electromechanical Relays
• PLC Controllers
5
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Drivers for introduction
• More flexible technology
• More complex functionality
• Remote management reduces labour cost
6
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Embedded systems…
• “Traditional” industrial
automation
• Deep integration with
controlled hardware
– Production lines
– Robots
7
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Moving into the cockpit…
• Control by operator
moves to “fly by wire”
• Strong move to
virtualization of all
controls:
– Control rooms
– Airplanes
– Ships
8
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Into the consumer space…
• Point Of Sales and
checkout Systems:
– Cash registers
– ATM’s
– OV Chipkaart
• connected for
additional services
9
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Deep into our lives
• Management systems
to improves safety and
security:
– Offices
– Hospitals
– Tunnels
– Public spaces
• Tightly connected with
energy management
and HR
10
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Definition (sort of)
• Control a physical
object
• Used to control
equipment in a
process
• Usually a PLC or small
barebone
11
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Distinguishing properties
• Part of a 24x7 solution
• Controlling long-lived
expensive equipment
• Difficult to update or
replace
• Large number of
sensors and actuators
12
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Distinguishing properties
• Geographic distribution
• Easily accessible for
hackers
• Proprietary protocols
• Usually not designed
for defense-in-depth
13
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
A frequent target
• Protection is
inadequate
• Security is not on the
management agenda
• Hackers do know their
way around
14
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Deeper impact
• Physical damage is
possible
• Physical process
often is fragile
• Locally updating
hardware takes ages
15
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
A recent example
• Widely used in US, UK,
France, China and
Canada
• Typical replacement
technology, retrofitted
into existing roads
• Encryption and
authentication
removed upon
customer request
16
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
A question of time…
17
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Can we fix this?
• Huge number of traffic
lights
• Replacement takes
days per crossing, with
traffic interruptions
• When will the disease
be worse than the
cure?
18
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
The mindset hasn’t kept up…
• IT is introduced as a
technical replacement,
a silent killer
• Designed with a
mechanical 1960’s
mindset, not a 2010’s
security mindset
19
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Small errors, large consequences…
• Petrobas 36
• Software omission
missed overpressure
event
• Losses
– 11 people died
– Spillage: 1500 ton crude
– Oil Rig: $350 million
– Production loss (84.000 barrels of
oil a day)
20
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Safety systems…
• Most embedded systems
have safety
consequences
• Are required to check
their integrity frequently
• Are not allowed to have
configuration changes
• Exhibit fail-to-safe
behaviour
21
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Politicians have become aware…
• Smart metering rollout
starts in 2015
• There are serious
scenario’s
• “Kill Switch” has to be
removed
22
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Industry should be aware
IEC 61508-1:2010
23
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Traditional measures
• Build a big firewall
• Disregard the human
element:
– a technician brings
along infected
equipment
– Operators using
personal USB sticks or
laptops
24
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
What about the owner?
• Deliver maximum
performance on a
shoestring budget
• Extremely aware of
operational risks
threatening services
• Risk management often
is a core competence
25
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Balancing risk as a way of life
Availability of
the service
Safety of
the installation
vs.
26
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Quantitative risk analysis
• “Unplanned
unavailability” is the
term
• For every intrinsic failure
a chance and impact are
determined
• The biggest availability
killers are dealt with
27
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
RAMS and CIA
• Reliability
• Availability
• Maintainability
• Safety +
--------------------------------
Deaths and Dollars
• Confidentiality
• Availability
• Integrity
+
--------------------------------
Make you look bad?
28
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
RAMS versus Security
RAMS
• Intrinsic failure of a
system
• Calculates missed
business revenue
• Has a SLA with
penalties/bonus
• Is responsibility of a
business manager
Security
• Extrinsic attack on a
system
• Talks about threats
• Has a SLA with best
effort
• Is a problem of the IT
department
29
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Is a security risk a safety risk?
• Security does affect
“Deaths and Dollars”
• Can we express
security in a
quantitative way?
30
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
An example
• National infrastructure
• Effect of long failure is devastating for the national
economy
• Five control-rooms, operated 24x7
• One unsegmented network, allows for redundancy
• Filled with fail-to-safe components based on
Windows® controllers
• Repairmen are very frequent visitors
31
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
A scenario
• A repairman or operator introduces virus or worm
by day
• The virus will spread to the entire network easily
within hours
• Overnight 70% of the infrastructure will perform an
emergency shutdown due to a fail-to-safe reaction
• Unaffected (Unix) stations will have to follow due to
physical interactions of emergency shutdowns
32
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
A quantitative view
• Chance of occurrence (guestimate)
– Once every 100 years
• Impact (scenario analysis)
– Safe but unavailable
– Life expectancy all equipment shortened by a year
– Recovery
• Recovery of essential backbone: week 6
• Recovery of secondary lines: week 14
• Complete recovery: week 26
• Chance of regression: high
• Estimated loss: €1010 (catastrophic)
33
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Sensitivity analysis
• What are values ranges
and effects?
Example:
– Chance is quite
dominant
– Recovery time is driven
by geographical spread
of repairmen
34
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Segmenting a network
• Prevent or limit the
spread of a worm/virus
• Would concentrate the
recovery effort
• Reduces recovery time
significantly
35
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
A reference Architecture (CIM)
• Levels 0 and 1 are
challenging
• Level 2 is achievable
and wise
• Level 3 would be
foolish not to do
Business
planning
& logistics
(level 4)
Operations &
planning
(level 3)
Process Supervisory
Control (level 2)
Process Control (level 1)
Field (level 0)
36
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
The quantitative impact
• Chance of occurrence (guestimate)
– Once every 1000 years
• Impact (scenario analysis)
– Safe but unavailable
– Life expectancy some equipment shortened by a year
– Recovery
• Recovery of essential backbone: day 3
• Recovery of secondary lines: day 7
• Complete recovery: day 15
• Chance of regression: medium/low
• Estimated loss: €107 (survivable)
37
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Some RAMS-questions…
• Increase of “unplanned unavailability” due to
– False positives on the firewall disrupting the process
– Failure of the hardware
• Increase of maintenance effort
– More updates needed
– Some might even lead to planned maintenance
• Limitation of flexibility in crisis situations
38
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Can we answer quantitative questions?
• IT Hardware reliability is
a “soft number”
• Not many statistical
data about false
positives
• Proprietary protocol
performance is
uncharted territory
39
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Competing in the same field
Fixing security
problems
Fixing operational
problems
VS.
40
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Competing in the same field
• Security usually becomes a High Impact Low
Probabily (HILP) event
• Opens the debate about the impact of security on
company performance: “what risk is the biggest
threat to out performance”
• Does release budget for fixing problems
41
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Work to be done…
• Systematically describing attack vectors in
scenario’s, relating to FTA, is achievable
• Quantifying attack vectors is difficult
• Quantifying positive and negative consequences of
measures is a challenge
42
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Conclusion
• Embedded systems are everywhere
• They are:
– An easy attack vector
– One of our biggest assets
• We have to learn from each other
– As security experts we have to learn talk about lost
dollars and lives
– As embedded system owners we have to see security as
a real threat inside their domain
43
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Questions?
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved

More Related Content

What's hot

DefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenDefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenMarina Krotofil
 
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...Marina Krotofil
 
Mission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMarina Krotofil
 
CS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsevCS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsevMarina Krotofil
 
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyAccenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyHoneywell
 
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...Living Online
 
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S..."Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...Marina Krotofil
 
S4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsS4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsMarina Krotofil
 
American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009infracritical
 
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Mike Boudreaux
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation Living Online
 
35958867 safety-instrumented-systems
35958867 safety-instrumented-systems35958867 safety-instrumented-systems
35958867 safety-instrumented-systemsMowaten Masry
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systemsEinar Landre
 
Key Considerations for Scoping Reinstrumentation Projects
Key Considerations for Scoping Reinstrumentation ProjectsKey Considerations for Scoping Reinstrumentation Projects
Key Considerations for Scoping Reinstrumentation ProjectsYokogawa1
 
Safety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsSafety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsEinar Landre
 

What's hot (20)

DefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenDefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_Larsen
 
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
 
Mission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control Systems
 
presentation_sas2016_V3
presentation_sas2016_V3presentation_sas2016_V3
presentation_sas2016_V3
 
Safety system
Safety systemSafety system
Safety system
 
S4x16_Europe_Krotofil
S4x16_Europe_KrotofilS4x16_Europe_Krotofil
S4x16_Europe_Krotofil
 
Sil presentation
Sil presentationSil presentation
Sil presentation
 
CS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsevCS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsev
 
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyAccenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
 
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
 
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S..."Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
S4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsS4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsics
 
American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009
 
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation
 
35958867 safety-instrumented-systems
35958867 safety-instrumented-systems35958867 safety-instrumented-systems
35958867 safety-instrumented-systems
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systems
 
Key Considerations for Scoping Reinstrumentation Projects
Key Considerations for Scoping Reinstrumentation ProjectsKey Considerations for Scoping Reinstrumentation Projects
Key Considerations for Scoping Reinstrumentation Projects
 
Safety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsSafety and security in mission critical IoT systems
Safety and security in mission critical IoT systems
 

Viewers also liked

2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...Jaap van Ekris
 
2016 11-15 - nvrb - software betrouwbaarheid
2016 11-15 - nvrb - software betrouwbaarheid2016 11-15 - nvrb - software betrouwbaarheid
2016 11-15 - nvrb - software betrouwbaarheidJaap van Ekris
 
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
2011-04-29 - Risk management conference - Technische IT risico's in de praktijkJaap van Ekris
 
2016 02-15 - IASTED Innsbruck 2016 - the role and decompesition of delivery ...
2016 02-15 -  IASTED Innsbruck 2016 - the role and decompesition of delivery ...2016 02-15 -  IASTED Innsbruck 2016 - the role and decompesition of delivery ...
2016 02-15 - IASTED Innsbruck 2016 - the role and decompesition of delivery ...Jaap van Ekris
 
What the hack happened to digi notar (28-10-2011)
What the hack happened to digi notar (28-10-2011)What the hack happened to digi notar (28-10-2011)
What the hack happened to digi notar (28-10-2011)Jaap van Ekris
 
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…Jaap van Ekris
 
2016-05-30 risk driven design
2016-05-30 risk driven design2016-05-30 risk driven design
2016-05-30 risk driven designJaap van Ekris
 
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)Jaap van Ekris
 
Making and breaking security in embedded devices
Making and breaking security in embedded devicesMaking and breaking security in embedded devices
Making and breaking security in embedded devicesYashin Mehaboobe
 
Securing embedded systems (for share)
Securing embedded systems (for share)Securing embedded systems (for share)
Securing embedded systems (for share)AndrewRJamieson
 
Embedded based home security system
Embedded based home security systemEmbedded based home security system
Embedded based home security systemNIT srinagar
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Thingsteam-WIBU
 
Security in embedded systems
Security in embedded systemsSecurity in embedded systems
Security in embedded systemsRaghav S
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security Malachi Jones
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DevicePriyanka Aash
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System SecurityAdel Barkam
 
ppt on embedded system
ppt on embedded systemppt on embedded system
ppt on embedded systemmanish katara
 

Viewers also liked (19)

2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
 
2016 11-15 - nvrb - software betrouwbaarheid
2016 11-15 - nvrb - software betrouwbaarheid2016 11-15 - nvrb - software betrouwbaarheid
2016 11-15 - nvrb - software betrouwbaarheid
 
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
 
2016 02-15 - IASTED Innsbruck 2016 - the role and decompesition of delivery ...
2016 02-15 -  IASTED Innsbruck 2016 - the role and decompesition of delivery ...2016 02-15 -  IASTED Innsbruck 2016 - the role and decompesition of delivery ...
2016 02-15 - IASTED Innsbruck 2016 - the role and decompesition of delivery ...
 
What the hack happened to digi notar (28-10-2011)
What the hack happened to digi notar (28-10-2011)What the hack happened to digi notar (28-10-2011)
What the hack happened to digi notar (28-10-2011)
 
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
 
2016-05-30 risk driven design
2016-05-30 risk driven design2016-05-30 risk driven design
2016-05-30 risk driven design
 
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
 
Making and breaking security in embedded devices
Making and breaking security in embedded devicesMaking and breaking security in embedded devices
Making and breaking security in embedded devices
 
Securing embedded systems (for share)
Securing embedded systems (for share)Securing embedded systems (for share)
Securing embedded systems (for share)
 
Embedded based home security system
Embedded based home security systemEmbedded based home security system
Embedded based home security system
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
 
Security in embedded systems
Security in embedded systemsSecurity in embedded systems
Security in embedded systems
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
Security in Embedded systems
Security in Embedded systems Security in Embedded systems
Security in Embedded systems
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
ppt on embedded system
ppt on embedded systemppt on embedded system
ppt on embedded system
 
Polytronics
PolytronicsPolytronics
Polytronics
 

Similar to Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotterdam)

Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Dawn Yankeelov
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Nikandrov Maxim
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor FiorimTI Safe
 
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Schneider Electric
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel LinaresTI Safe
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Honeywell
 
18CS44-MODULE3-PPT.pptx
18CS44-MODULE3-PPT.pptx18CS44-MODULE3-PPT.pptx
18CS44-MODULE3-PPT.pptxSudeep35
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2Nguyen Binh
 
amrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapalibuildersreviews
 
MIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets SecurityMIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets SecurityCharles Guillemet
 
DDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT DevicesDDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT DevicesSeungjoo Kim
 
2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom PresentationEric Gallant
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsShah Sheikh
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
Break trough effectivness for the maintenance
Break trough effectivness for the maintenanceBreak trough effectivness for the maintenance
Break trough effectivness for the maintenanceZo Rasatavohary
 

Similar to Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotterdam) (20)

Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
 
Intro720T5.pptx
Intro720T5.pptxIntro720T5.pptx
Intro720T5.pptx
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
18CS44-MODULE3-PPT.pptx
18CS44-MODULE3-PPT.pptx18CS44-MODULE3-PPT.pptx
18CS44-MODULE3-PPT.pptx
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
amrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdf
 
MIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets SecurityMIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets Security
 
LCD PROJECT.pptx
LCD PROJECT.pptxLCD PROJECT.pptx
LCD PROJECT.pptx
 
DDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT DevicesDDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT Devices
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
 
2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation
 
Project_updated
Project_updatedProject_updated
Project_updated
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Break trough effectivness for the maintenance
Break trough effectivness for the maintenanceBreak trough effectivness for the maintenance
Break trough effectivness for the maintenance
 
Ensuring your plant is secure
Ensuring your plant is secureEnsuring your plant is secure
Ensuring your plant is secure
 

More from Jaap van Ekris

2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giantsJaap van Ekris
 
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebbenJaap van Ekris
 
2018-11-08 risk and reslience festival
2018-11-08 risk and reslience festival2018-11-08 risk and reslience festival
2018-11-08 risk and reslience festivalJaap van Ekris
 
2015 10-08 Uitwijken, het hoe, waarom en de consequenties
2015 10-08 Uitwijken, het hoe, waarom en de consequenties2015 10-08 Uitwijken, het hoe, waarom en de consequenties
2015 10-08 Uitwijken, het hoe, waarom en de consequentiesJaap van Ekris
 
TOPAAS Versie 2.0, een praktische inleiding
TOPAAS Versie 2.0, een praktische inleidingTOPAAS Versie 2.0, een praktische inleiding
TOPAAS Versie 2.0, een praktische inleidingJaap van Ekris
 
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)Jaap van Ekris
 
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)Jaap van Ekris
 
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 72010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7Jaap van Ekris
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systemsJaap van Ekris
 
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemenJaap van Ekris
 
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...Jaap van Ekris
 
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...Jaap van Ekris
 
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patternsJaap van Ekris
 
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…Jaap van Ekris
 
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?Jaap van Ekris
 
2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...
2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...
2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...Jaap van Ekris
 
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...Jaap van Ekris
 

More from Jaap van Ekris (17)

2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
 
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
 
2018-11-08 risk and reslience festival
2018-11-08 risk and reslience festival2018-11-08 risk and reslience festival
2018-11-08 risk and reslience festival
 
2015 10-08 Uitwijken, het hoe, waarom en de consequenties
2015 10-08 Uitwijken, het hoe, waarom en de consequenties2015 10-08 Uitwijken, het hoe, waarom en de consequenties
2015 10-08 Uitwijken, het hoe, waarom en de consequenties
 
TOPAAS Versie 2.0, een praktische inleiding
TOPAAS Versie 2.0, een praktische inleidingTOPAAS Versie 2.0, een praktische inleiding
TOPAAS Versie 2.0, een praktische inleiding
 
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
 
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
 
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 72010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
 
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
 
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
 
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
 
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
 
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
 
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
 
2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...
2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...
2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...
 
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotterdam)

  • 1. © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Embedded systems, a hidden security threat? Jaap van Ekris, Delta Pi J.vanEkris@Delta-Pi.nl
  • 2. 2 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Jaap van Ekris
  • 3. 3 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Agenda • What are embedded systems? • What makes them different? • How can they disturb my business? • What to do about it?
  • 4. 4 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved In the beginning… • Mechanical control • Electromechanical Relays • PLC Controllers
  • 5. 5 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Drivers for introduction • More flexible technology • More complex functionality • Remote management reduces labour cost
  • 6. 6 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Embedded systems… • “Traditional” industrial automation • Deep integration with controlled hardware – Production lines – Robots
  • 7. 7 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Moving into the cockpit… • Control by operator moves to “fly by wire” • Strong move to virtualization of all controls: – Control rooms – Airplanes – Ships
  • 8. 8 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Into the consumer space… • Point Of Sales and checkout Systems: – Cash registers – ATM’s – OV Chipkaart • connected for additional services
  • 9. 9 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Deep into our lives • Management systems to improves safety and security: – Offices – Hospitals – Tunnels – Public spaces • Tightly connected with energy management and HR
  • 10. 10 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Definition (sort of) • Control a physical object • Used to control equipment in a process • Usually a PLC or small barebone
  • 11. 11 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Distinguishing properties • Part of a 24x7 solution • Controlling long-lived expensive equipment • Difficult to update or replace • Large number of sensors and actuators
  • 12. 12 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Distinguishing properties • Geographic distribution • Easily accessible for hackers • Proprietary protocols • Usually not designed for defense-in-depth
  • 13. 13 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved A frequent target • Protection is inadequate • Security is not on the management agenda • Hackers do know their way around
  • 14. 14 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Deeper impact • Physical damage is possible • Physical process often is fragile • Locally updating hardware takes ages
  • 15. 15 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved A recent example • Widely used in US, UK, France, China and Canada • Typical replacement technology, retrofitted into existing roads • Encryption and authentication removed upon customer request
  • 16. 16 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved A question of time…
  • 17. 17 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Can we fix this? • Huge number of traffic lights • Replacement takes days per crossing, with traffic interruptions • When will the disease be worse than the cure?
  • 18. 18 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved The mindset hasn’t kept up… • IT is introduced as a technical replacement, a silent killer • Designed with a mechanical 1960’s mindset, not a 2010’s security mindset
  • 19. 19 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Small errors, large consequences… • Petrobas 36 • Software omission missed overpressure event • Losses – 11 people died – Spillage: 1500 ton crude – Oil Rig: $350 million – Production loss (84.000 barrels of oil a day)
  • 20. 20 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Safety systems… • Most embedded systems have safety consequences • Are required to check their integrity frequently • Are not allowed to have configuration changes • Exhibit fail-to-safe behaviour
  • 21. 21 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Politicians have become aware… • Smart metering rollout starts in 2015 • There are serious scenario’s • “Kill Switch” has to be removed
  • 22. 22 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Industry should be aware IEC 61508-1:2010
  • 23. 23 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Traditional measures • Build a big firewall • Disregard the human element: – a technician brings along infected equipment – Operators using personal USB sticks or laptops
  • 24. 24 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved What about the owner? • Deliver maximum performance on a shoestring budget • Extremely aware of operational risks threatening services • Risk management often is a core competence
  • 25. 25 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Balancing risk as a way of life Availability of the service Safety of the installation vs.
  • 26. 26 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Quantitative risk analysis • “Unplanned unavailability” is the term • For every intrinsic failure a chance and impact are determined • The biggest availability killers are dealt with
  • 27. 27 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved RAMS and CIA • Reliability • Availability • Maintainability • Safety + -------------------------------- Deaths and Dollars • Confidentiality • Availability • Integrity + -------------------------------- Make you look bad?
  • 28. 28 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved RAMS versus Security RAMS • Intrinsic failure of a system • Calculates missed business revenue • Has a SLA with penalties/bonus • Is responsibility of a business manager Security • Extrinsic attack on a system • Talks about threats • Has a SLA with best effort • Is a problem of the IT department
  • 29. 29 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Is a security risk a safety risk? • Security does affect “Deaths and Dollars” • Can we express security in a quantitative way?
  • 30. 30 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved An example • National infrastructure • Effect of long failure is devastating for the national economy • Five control-rooms, operated 24x7 • One unsegmented network, allows for redundancy • Filled with fail-to-safe components based on Windows® controllers • Repairmen are very frequent visitors
  • 31. 31 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved A scenario • A repairman or operator introduces virus or worm by day • The virus will spread to the entire network easily within hours • Overnight 70% of the infrastructure will perform an emergency shutdown due to a fail-to-safe reaction • Unaffected (Unix) stations will have to follow due to physical interactions of emergency shutdowns
  • 32. 32 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved A quantitative view • Chance of occurrence (guestimate) – Once every 100 years • Impact (scenario analysis) – Safe but unavailable – Life expectancy all equipment shortened by a year – Recovery • Recovery of essential backbone: week 6 • Recovery of secondary lines: week 14 • Complete recovery: week 26 • Chance of regression: high • Estimated loss: €1010 (catastrophic)
  • 33. 33 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Sensitivity analysis • What are values ranges and effects? Example: – Chance is quite dominant – Recovery time is driven by geographical spread of repairmen
  • 34. 34 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Segmenting a network • Prevent or limit the spread of a worm/virus • Would concentrate the recovery effort • Reduces recovery time significantly
  • 35. 35 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved A reference Architecture (CIM) • Levels 0 and 1 are challenging • Level 2 is achievable and wise • Level 3 would be foolish not to do Business planning & logistics (level 4) Operations & planning (level 3) Process Supervisory Control (level 2) Process Control (level 1) Field (level 0)
  • 36. 36 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved The quantitative impact • Chance of occurrence (guestimate) – Once every 1000 years • Impact (scenario analysis) – Safe but unavailable – Life expectancy some equipment shortened by a year – Recovery • Recovery of essential backbone: day 3 • Recovery of secondary lines: day 7 • Complete recovery: day 15 • Chance of regression: medium/low • Estimated loss: €107 (survivable)
  • 37. 37 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Some RAMS-questions… • Increase of “unplanned unavailability” due to – False positives on the firewall disrupting the process – Failure of the hardware • Increase of maintenance effort – More updates needed – Some might even lead to planned maintenance • Limitation of flexibility in crisis situations
  • 38. 38 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Can we answer quantitative questions? • IT Hardware reliability is a “soft number” • Not many statistical data about false positives • Proprietary protocol performance is uncharted territory
  • 39. 39 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Competing in the same field Fixing security problems Fixing operational problems VS.
  • 40. 40 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Competing in the same field • Security usually becomes a High Impact Low Probabily (HILP) event • Opens the debate about the impact of security on company performance: “what risk is the biggest threat to out performance” • Does release budget for fixing problems
  • 41. 41 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Work to be done… • Systematically describing attack vectors in scenario’s, relating to FTA, is achievable • Quantifying attack vectors is difficult • Quantifying positive and negative consequences of measures is a challenge
  • 42. 42 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Conclusion • Embedded systems are everywhere • They are: – An easy attack vector – One of our biggest assets • We have to learn from each other – As security experts we have to learn talk about lost dollars and lives – As embedded system owners we have to see security as a real threat inside their domain
  • 43. 43 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Questions?
  • 44. © Copyright 1989 – 2014, (ISC)2 All Rights Reserved

Editor's Notes

  1. InfoPlus sign shown is part of GSM-R, the same network used for controlling trains
  2. Major challenge is “frequent checking”: what if all my systems are infected and then fail to safe?
  3. Once had a customer where 70% of all support calls were people using private laptops during nightshifts and couldn’t get the internet to work!
  4. Odd thing is: they talk about the same effects! Losing the power to do business!