SlideShare uma empresa Scribd logo
1 de 25
Threats to Industrial Control
         Networks
    Defensive Network Security
     Consultants (DNSC), LLC
         17 October 2012
Contact Information

    Angel E. Avila
    CISSP, CISA, CEPT, C|EH, CompTIA Sec+
    E-mail: angel.e.avila@dnsc-cyber.com
    http://www.dnsc-cyber.com
    PH: 915-247-8978




2
DNSC Background

    • Computer Security Professionals (8 years)
       – Specializing in Penetration Testing, Vulnerability
         Assessments, Compliance and Auditing

    • Experience working on Government (DoD) and
      Private Industry systems
    • Certifications:
       –   Certified Information Systems Security Professional (CISSP),
       –   Certified Information Systems Auditor (CISA),
       –   Certified Ethical Hacker (C|EH),
       –   Certified Ethical Penetration Tester (CEPT),
       –   Certified Information Systems Manager (CISM),
       –   Certified Penetration Tester (CPT),
       –   CompTIA Security +
3
Objective

    • The intent of this brief is to raise awareness among
      the energy community of some of the current threats
      that are targeting Industrial Control (IC) networks
      including the Smart Grid and the importance of
      developing secure critical infrastructure.




4
Why should we care?

    • “An aggressor nation or extremist group could use
      these kinds of cyber tools to gain control of critical
      switches,” Mr. Panetta said. “They could derail
      passenger trains, or even more dangerous, derail
      passenger trains loaded with lethal chemicals. They
      could contaminate the water supply in major cities,
      or shut down the power grid across large parts of
      the country.” [1]
    • Successful attacks against critical infrastructure
      assets can potentially lead to loss of life, and life as
      we know it.
      1. Bumiller, Elisabeth; Shanker, Thomas. “Panetta Warns of Dire Threat of Cyberattack on U.S." New York
      Times on the Web 11 Oct. 2012. 15 Oct. 2012 <http://www.nytimes.com/2012/10/12/world/panetta-warns-of-
      dire-threat-of-cyberattack.html?_r=0s>
5
IC Network Overview




    Figure adapted from: Eric D. Knapp, Industrial Network Security: Securing Critical Infrastructure Networks for
6   Smart Grid, SCADA, and Other Industrial Control Systems, Syngress, 2011.
Common Mistakes

    • Overconfidence: Systems 100% secure
    • Refusal to recognize threats: It can’t happen
      to me
    • Air Gap myth: Systems not connected to IT
      network/Internet
    • Executive override
        – “Intentional” security holes for legitimate business
          purposes. ‘Set it and forget it
    •   Default accounts & passwords
    •   Lack of authentication
    •   Inbound/outbound traffic
    •   Compliance != Secure
7
Adversary
    • Cyber Threat Expertise
      – Novice: An adversary with no training, only using
        open-source (freely available) tools
      – Intermediate: An adversary with some training,
        some level of funding, uses tools either purchased
        or traded on-line
      – Expert: An adversary with a mature skill set and
        uses custom, open source, and purchased tools
         • Foreign sponsored
         • Hacktivist



8
Threats to IC Networks
    • Advance Persistent Threat (APT)
      – Adversary with sophisticated levels of expertise
        and significant resources which allow it to create
        opportunities to achieve its objectives by using
        multiple attack vectors (e.g., cyber, physical, and
        deception)
         • Maintain a foothold in order to conduct directed
           malicious objectives against the target
         • EX: Stuxnet-Worm targeting Iranian nuclear reactor
           machinery
      – Driven by either government agencies or terrorist
        organizations
    • APT’s pursues its objectives repeatedly over
      an extended period of time while countering
      victim’s mitigating attempts
9             As defined in NIST Special Publication 800-39, Managing Information Security Risk
Threats to IC Networks (cont.)
     • Cyber Threats
       – Identified as malicious efforts directed in gaining
         access to, exfiltration, data manipulation, and
         denial of service towards information systems (IS)
       – Directed attacks against confidentiality, integrity,
         and availability (CIA)
       – Cyber threats can come from anyone

     • Supply Chain Threat
       – Referred to embedded code being inserted into
         devices
       – Do you know who is developing your devices?


10
Threats to IC Networks (cont.)
     • Outsider Threat
       – No credentials, no physical access to the target
         network
       – Ex: Hacktavists, Foreign State, Terrorists
         Organizations, Script Kiddies

     • Nearsider Threat
       – No credentials, but has access to the target
         network
       – Ex: Cleaning crew, delivery personnel

     • Insider Threat
       – Having user and/or root-level credentials to the
         target network
11
       – Ex: Disgruntle Employee (users/administrators)
IC Network Overview
Outsider/Cyber
   Threats


                                                                                                                     Insider/Nearsider
                                                                                                                          Threats




Insider/Nearsider
     Threats




                      Advanced
                      Persistent
                       Threat




                 Figure adapted from: Eric D. Knapp, Industrial Network Security: Securing Critical Infrastructure Networks for
 12              Smart Grid, SCADA, and Other Industrial Control Systems, Syngress, 2011.
Attack Vectors

     • Web
       – SQL Injection
       – Broken authentication and session management
          • https://www.owasp.org/index.php/Top_10_2010-Main
     • Wireless
       – Use of weak wireless algorithms WEP and WPA
     • Bad Security Practices
       – HBGary and Anonymous incident
          • http://arstechnica.com/tech-
            policy/2011/02/anonymous-speaks-the-inside-story-of-
            the-hbgary-hack/
     • Social Networking
       – Facebook
13
Attack Vectors (cont.)
     • SCADA Protocols
       – Lack of authentication
       – Lack of encryption

     • SCADA Systems
       – Sinapsi eSolar Light Photovotaic System Monitor
       – Bypass authentication using hard-coded
         credentials and vulnerable to SQL injection
          • Also affects other Solar panel control systems
          • ICS-ALERT-12-284-01

     • Control systems
       – A search engine, Shodan, that used to identify
         internet facing Control systems
14        • ICS-ALERT-11-343-01
Attack Vectors (cont.)

     • How can I traverse through the Smart Grid?
       – Advanced Meter Infrastructure (AMI) Smart
         Meters shutdown meters through Optical port
          • D. Weber, “Looking into the Eye of the Meter”. BlackHat
            2012.

       – Over 40+ million ZigBee electric meters are
         deployed with concentration in Texas, California,
         Texas, Michigan, and Virginia.
          • Zigbee Alliance: Heile, Bob,
            https://docs.zigbee.org/zigbee-docs/dcn/10-6056.pdf



15
Attack Vectors (cont.)
                                    • AMI provides the ability to
                                      remotely control devices in the
                                      HAN
                                       - Turn off lights, Raise Tstat,
                                       etc...
                                    • Detailed energy use collected
                                      over regular time intervals.
                                       - Consumers can view energy
                                       usage real time
                                    • ZigBee is being used in HANs
                                      within the Smart Grid
                                       • Sniffing traffic
                                       • Replay attacks
                                       • Denial-of-Service


     Smart Grid using ZigBee Home
16       Area Network (HAN)
Conclusion

     • Real-world threats are constantly trying to
       exploit various IC installations
     • Reliability vs. Security
     • Awareness and being proactive helps reduce
       the risk of your network being exploited




17
Questions

     • ??




18
Contact Information
     • Angel E. Avila CISSP, CISA, C|EH, CEPT, CompTIA Security +
       angel.e.avila@dnsc-cyber.com

     • Richard G. Coy CISSP, CISA, C|EH, CPT, CEPT
       richard.g.coy@dnsc-cyber.com

     • Francisco J. Leyva CISSP, CISA, C|EH, CISM, CEPT
       francisco.j.leyva@dnsc-cyber.com

     • Humberto Mendoza CISSP, CISA, C|EH, CISM, CEPT
       humberto.mendoza@dnsc-cyber.com

     • Daniel Chacon CISSP, CISSA, C|EH, CISM, CEPT
       daniel.chacon@dnsc-cyber.com



                                                          http://www.dnsc-cyber.com
19
Backup




20
Attack Vectors (cont.)
• ZigBee Overview
  – Low Power (Long Battery Life), low data rate wireless
    protocol
  – 250 Kbps throughput rate (low data rate)
  – Short Range (10 – 100 meters)
  – Supports star and mesh network topology
  – Easily add and remove nodes to the network

• Why Zigbee ?
  – WIFI transceivers are too expensive, more power to
    operate
  – Bluetooth as a Frequency Hopping Spread Spectrum
    requires more power to operate
  – Zigbee consumes less power than WIFI and Bluetooth
  – Zigbee designed specifically for monitoring and
    automation
  – Zigbee is good solution for smart meters in Advanced
    Meter Infrastructure(AMI)
Attack Vectors (cont.)
• ZigBee Exploitation using KillerBee[1]
           - zbid–list available ZigBee devices connected to PC
           - zbdump–"tcpdump-w" clone for capturing ZigBee traffic
           - zbconvert–convert capture file formats
           - zbreplay–Replay attack
           - zdsniff–over-the-air (OTA) crypto key sniffer
           - zbfind–GUI for locating ZigBee networks
           - zbgoodfind–search memory dump for crypto key
           - zbassocflood–association flood attack (DoS)
           - spoofing attacks when used with Software Defined Radio




   1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf
Attack Vectors (cont.)
• ZigBee Security
    – KillerBee[1] open source software is a tool suite used to
      test and exploit ZigBee networks
    – Hacker community has made many software modifications
      to the KillerBee[1] tool suite
    – KillerBee[1] tool suite is flashed on a RZUSB ($40.00)
      through Joint Test Action Group (JTAG) interface.
           • AVR JTAG ICE mkII ($300.00) used to flash RZUSB
                                                                                           AVR JTAG ICE
                                         RZUSB                                             Programmer




 1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf
Attack Vectors (cont.)
                               • Problem: Demand for power
                                 exceeds the supply
                               • AMI provides the ability to
                                 remotely control devices in the
                                 HAN
                                  - Turn off lights, Raise Tstat,
                                  etc...
                               • Detailed energy use collected
                                 over regular time intervals
                                  - Consumers can view energy
                                  usage real time
                               • Consumers can adjust power to
                                 reduce cost
                               • Utility companies can better
                                 manage supply and demand
Smart Grid using ZigBee Home
    Area Network (HAN)
Attack Vectors (cont.)
• ZigBee
   – Exploitation using KillerBee[1]
      - zbid–list available ZigBee devices connected to PC
      - zbdump–"tcpdump-w" clone for capturing ZigBee traffic
      - zbconvert–convert capture file formats
      - zbreplay–Replay attack
      - zdsniff–over-the-air (OTA) crypto key sniffer
      - zbfind–GUI for locating ZigBee networks
      - zbgoodfind–search memory dump for crypto key
      - zbassocflood–association flood attack (DoS)
      - spoofing attacks when used with Software Defined Radio




  1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf

Mais conteúdo relacionado

Mais procurados

Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
 
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...HITCON GIRLS
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineeringPeter Wood
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefShah Sheikh
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cCharles Li
 
Modern Lessons in Security Monitoring
Modern Lessons in Security MonitoringModern Lessons in Security Monitoring
Modern Lessons in Security MonitoringAnton Goncharov
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...AVEVA
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityDr. Ahmed Al Zaidy
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamMohammed Adam
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouCameronTait3
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 

Mais procurados (20)

Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
NEtwork Security Admin Portal
NEtwork Security Admin PortalNEtwork Security Admin Portal
NEtwork Security Admin Portal
 
Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
Modern Lessons in Security Monitoring
Modern Lessons in Security MonitoringModern Lessons in Security Monitoring
Modern Lessons in Security Monitoring
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
Cyber secure
Cyber secure Cyber secure
Cyber secure
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With You
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 

Semelhante a 2012 Reenergize the Americas 3B: Angel Avila

2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom PresentationEric Gallant
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael FirstenbergTI Safe
 
Webinar 2.1 - Network protection and devices.pptx
Webinar 2.1 - Network protection and devices.pptxWebinar 2.1 - Network protection and devices.pptx
Webinar 2.1 - Network protection and devices.pptxRoyMurillo4
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Cisco Canada
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar PresentationCertrec
 
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryKevin Murphy
 
Cyber Security
Cyber SecurityCyber Security
Cyber Securityfrcarlson
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018aztechcouncil
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkNathan Wallace, PhD, PE
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsJohn Gilligan
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)HITCON GIRLS
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysMarcel Winandy
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...TI Safe
 

Semelhante a 2012 Reenergize the Americas 3B: Angel Avila (20)

2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
Webinar 2.1 - Network protection and devices.pptx
Webinar 2.1 - Network protection and devices.pptxWebinar 2.1 - Network protection and devices.pptx
Webinar 2.1 - Network protection and devices.pptx
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industry
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
 

Mais de Reenergize

2012 Reenergize the Americas 4B: Duncan Wood
2012 Reenergize the Americas 4B: Duncan Wood2012 Reenergize the Americas 4B: Duncan Wood
2012 Reenergize the Americas 4B: Duncan WoodReenergize
 
2012 Reenergize the Americas 2B: Miguel Velez-Reyes
2012 Reenergize the Americas 2B: Miguel Velez-Reyes2012 Reenergize the Americas 2B: Miguel Velez-Reyes
2012 Reenergize the Americas 2B: Miguel Velez-ReyesReenergize
 
2012 Reenergize the Americas 3A: Richard Turner
2012 Reenergize the Americas 3A: Richard Turner2012 Reenergize the Americas 3A: Richard Turner
2012 Reenergize the Americas 3A: Richard TurnerReenergize
 
2012 Reenergize the Americas 4A: Benjamin Torres-Barron
2012 Reenergize the Americas 4A: Benjamin Torres-Barron2012 Reenergize the Americas 4A: Benjamin Torres-Barron
2012 Reenergize the Americas 4A: Benjamin Torres-BarronReenergize
 
2012 Reenergize the Americas 2A: Jesse Thompson
2012 Reenergize the Americas 2A: Jesse Thompson2012 Reenergize the Americas 2A: Jesse Thompson
2012 Reenergize the Americas 2A: Jesse ThompsonReenergize
 
2012 Reenergize the Americas 1A: Dennis Thomas
2012 Reenergize the Americas 1A: Dennis Thomas2012 Reenergize the Americas 1A: Dennis Thomas
2012 Reenergize the Americas 1A: Dennis ThomasReenergize
 
2012 ReEnergize the Americas 6B: Cathy Swain
2012 ReEnergize the Americas 6B: Cathy Swain2012 ReEnergize the Americas 6B: Cathy Swain
2012 ReEnergize the Americas 6B: Cathy SwainReenergize
 
2012 Reenergize the Americas 3A: Harry Shulte
2012 Reenergize the Americas 3A: Harry Shulte2012 Reenergize the Americas 3A: Harry Shulte
2012 Reenergize the Americas 3A: Harry ShulteReenergize
 
2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene RodriguezReenergize
 
2012 ReEnergize the Americas 2B: Nathanial Robinson
2012 ReEnergize the Americas 2B: Nathanial Robinson2012 ReEnergize the Americas 2B: Nathanial Robinson
2012 ReEnergize the Americas 2B: Nathanial RobinsonReenergize
 
2012 Reenergize the Americas 4A: Esaúl Ramírez
2012 Reenergize the Americas 4A: Esaúl Ramírez2012 Reenergize the Americas 4A: Esaúl Ramírez
2012 Reenergize the Americas 4A: Esaúl RamírezReenergize
 
2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph MartinezReenergize
 
2012 Reenergize the Americas 1A: Reinhard Peter
2012 Reenergize the Americas 1A: Reinhard Peter2012 Reenergize the Americas 1A: Reinhard Peter
2012 Reenergize the Americas 1A: Reinhard PeterReenergize
 
2012 Reenergize the Americas 5A: Luis Perez
2012 Reenergize the Americas 5A: Luis Perez2012 Reenergize the Americas 5A: Luis Perez
2012 Reenergize the Americas 5A: Luis PerezReenergize
 
2012 Reenergize the Americas 4A: Alejando Peraza Garcia
2012 Reenergize the Americas 4A: Alejando Peraza Garcia2012 Reenergize the Americas 4A: Alejando Peraza Garcia
2012 Reenergize the Americas 4A: Alejando Peraza GarciaReenergize
 
2012 Reenergize the Americas 1B: John Peichel
2012 Reenergize the Americas  1B: John Peichel2012 Reenergize the Americas  1B: John Peichel
2012 Reenergize the Americas 1B: John PeichelReenergize
 
2012 Reenergize the Americas 4B: Jim Peach
2012 Reenergize the Americas 4B: Jim Peach2012 Reenergize the Americas 4B: Jim Peach
2012 Reenergize the Americas 4B: Jim PeachReenergize
 
2012 Reenergize the Americas 5B: Allan Oliver
2012 Reenergize the Americas 5B: Allan Oliver2012 Reenergize the Americas 5B: Allan Oliver
2012 Reenergize the Americas 5B: Allan OliverReenergize
 
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
2012 Reenergize the Americas 2B: Juan A. Mujica-KohleReenergize
 
2012 Reenergize the Americas 2A: David Mendoza
2012 Reenergize the Americas 2A: David Mendoza2012 Reenergize the Americas 2A: David Mendoza
2012 Reenergize the Americas 2A: David MendozaReenergize
 

Mais de Reenergize (20)

2012 Reenergize the Americas 4B: Duncan Wood
2012 Reenergize the Americas 4B: Duncan Wood2012 Reenergize the Americas 4B: Duncan Wood
2012 Reenergize the Americas 4B: Duncan Wood
 
2012 Reenergize the Americas 2B: Miguel Velez-Reyes
2012 Reenergize the Americas 2B: Miguel Velez-Reyes2012 Reenergize the Americas 2B: Miguel Velez-Reyes
2012 Reenergize the Americas 2B: Miguel Velez-Reyes
 
2012 Reenergize the Americas 3A: Richard Turner
2012 Reenergize the Americas 3A: Richard Turner2012 Reenergize the Americas 3A: Richard Turner
2012 Reenergize the Americas 3A: Richard Turner
 
2012 Reenergize the Americas 4A: Benjamin Torres-Barron
2012 Reenergize the Americas 4A: Benjamin Torres-Barron2012 Reenergize the Americas 4A: Benjamin Torres-Barron
2012 Reenergize the Americas 4A: Benjamin Torres-Barron
 
2012 Reenergize the Americas 2A: Jesse Thompson
2012 Reenergize the Americas 2A: Jesse Thompson2012 Reenergize the Americas 2A: Jesse Thompson
2012 Reenergize the Americas 2A: Jesse Thompson
 
2012 Reenergize the Americas 1A: Dennis Thomas
2012 Reenergize the Americas 1A: Dennis Thomas2012 Reenergize the Americas 1A: Dennis Thomas
2012 Reenergize the Americas 1A: Dennis Thomas
 
2012 ReEnergize the Americas 6B: Cathy Swain
2012 ReEnergize the Americas 6B: Cathy Swain2012 ReEnergize the Americas 6B: Cathy Swain
2012 ReEnergize the Americas 6B: Cathy Swain
 
2012 Reenergize the Americas 3A: Harry Shulte
2012 Reenergize the Americas 3A: Harry Shulte2012 Reenergize the Americas 3A: Harry Shulte
2012 Reenergize the Americas 3A: Harry Shulte
 
2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez
 
2012 ReEnergize the Americas 2B: Nathanial Robinson
2012 ReEnergize the Americas 2B: Nathanial Robinson2012 ReEnergize the Americas 2B: Nathanial Robinson
2012 ReEnergize the Americas 2B: Nathanial Robinson
 
2012 Reenergize the Americas 4A: Esaúl Ramírez
2012 Reenergize the Americas 4A: Esaúl Ramírez2012 Reenergize the Americas 4A: Esaúl Ramírez
2012 Reenergize the Americas 4A: Esaúl Ramírez
 
2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez2012 Reenergize the Americas 3B: Ralph Martinez
2012 Reenergize the Americas 3B: Ralph Martinez
 
2012 Reenergize the Americas 1A: Reinhard Peter
2012 Reenergize the Americas 1A: Reinhard Peter2012 Reenergize the Americas 1A: Reinhard Peter
2012 Reenergize the Americas 1A: Reinhard Peter
 
2012 Reenergize the Americas 5A: Luis Perez
2012 Reenergize the Americas 5A: Luis Perez2012 Reenergize the Americas 5A: Luis Perez
2012 Reenergize the Americas 5A: Luis Perez
 
2012 Reenergize the Americas 4A: Alejando Peraza Garcia
2012 Reenergize the Americas 4A: Alejando Peraza Garcia2012 Reenergize the Americas 4A: Alejando Peraza Garcia
2012 Reenergize the Americas 4A: Alejando Peraza Garcia
 
2012 Reenergize the Americas 1B: John Peichel
2012 Reenergize the Americas  1B: John Peichel2012 Reenergize the Americas  1B: John Peichel
2012 Reenergize the Americas 1B: John Peichel
 
2012 Reenergize the Americas 4B: Jim Peach
2012 Reenergize the Americas 4B: Jim Peach2012 Reenergize the Americas 4B: Jim Peach
2012 Reenergize the Americas 4B: Jim Peach
 
2012 Reenergize the Americas 5B: Allan Oliver
2012 Reenergize the Americas 5B: Allan Oliver2012 Reenergize the Americas 5B: Allan Oliver
2012 Reenergize the Americas 5B: Allan Oliver
 
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
2012 Reenergize the Americas 2B: Juan A. Mujica-Kohle
 
2012 Reenergize the Americas 2A: David Mendoza
2012 Reenergize the Americas 2A: David Mendoza2012 Reenergize the Americas 2A: David Mendoza
2012 Reenergize the Americas 2A: David Mendoza
 

Último

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Último (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

2012 Reenergize the Americas 3B: Angel Avila

  • 1. Threats to Industrial Control Networks Defensive Network Security Consultants (DNSC), LLC 17 October 2012
  • 2. Contact Information Angel E. Avila CISSP, CISA, CEPT, C|EH, CompTIA Sec+ E-mail: angel.e.avila@dnsc-cyber.com http://www.dnsc-cyber.com PH: 915-247-8978 2
  • 3. DNSC Background • Computer Security Professionals (8 years) – Specializing in Penetration Testing, Vulnerability Assessments, Compliance and Auditing • Experience working on Government (DoD) and Private Industry systems • Certifications: – Certified Information Systems Security Professional (CISSP), – Certified Information Systems Auditor (CISA), – Certified Ethical Hacker (C|EH), – Certified Ethical Penetration Tester (CEPT), – Certified Information Systems Manager (CISM), – Certified Penetration Tester (CPT), – CompTIA Security + 3
  • 4. Objective • The intent of this brief is to raise awareness among the energy community of some of the current threats that are targeting Industrial Control (IC) networks including the Smart Grid and the importance of developing secure critical infrastructure. 4
  • 5. Why should we care? • “An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches,” Mr. Panetta said. “They could derail passenger trains, or even more dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country.” [1] • Successful attacks against critical infrastructure assets can potentially lead to loss of life, and life as we know it. 1. Bumiller, Elisabeth; Shanker, Thomas. “Panetta Warns of Dire Threat of Cyberattack on U.S." New York Times on the Web 11 Oct. 2012. 15 Oct. 2012 <http://www.nytimes.com/2012/10/12/world/panetta-warns-of- dire-threat-of-cyberattack.html?_r=0s> 5
  • 6. IC Network Overview Figure adapted from: Eric D. Knapp, Industrial Network Security: Securing Critical Infrastructure Networks for 6 Smart Grid, SCADA, and Other Industrial Control Systems, Syngress, 2011.
  • 7. Common Mistakes • Overconfidence: Systems 100% secure • Refusal to recognize threats: It can’t happen to me • Air Gap myth: Systems not connected to IT network/Internet • Executive override – “Intentional” security holes for legitimate business purposes. ‘Set it and forget it • Default accounts & passwords • Lack of authentication • Inbound/outbound traffic • Compliance != Secure 7
  • 8. Adversary • Cyber Threat Expertise – Novice: An adversary with no training, only using open-source (freely available) tools – Intermediate: An adversary with some training, some level of funding, uses tools either purchased or traded on-line – Expert: An adversary with a mature skill set and uses custom, open source, and purchased tools • Foreign sponsored • Hacktivist 8
  • 9. Threats to IC Networks • Advance Persistent Threat (APT) – Adversary with sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception) • Maintain a foothold in order to conduct directed malicious objectives against the target • EX: Stuxnet-Worm targeting Iranian nuclear reactor machinery – Driven by either government agencies or terrorist organizations • APT’s pursues its objectives repeatedly over an extended period of time while countering victim’s mitigating attempts 9 As defined in NIST Special Publication 800-39, Managing Information Security Risk
  • 10. Threats to IC Networks (cont.) • Cyber Threats – Identified as malicious efforts directed in gaining access to, exfiltration, data manipulation, and denial of service towards information systems (IS) – Directed attacks against confidentiality, integrity, and availability (CIA) – Cyber threats can come from anyone • Supply Chain Threat – Referred to embedded code being inserted into devices – Do you know who is developing your devices? 10
  • 11. Threats to IC Networks (cont.) • Outsider Threat – No credentials, no physical access to the target network – Ex: Hacktavists, Foreign State, Terrorists Organizations, Script Kiddies • Nearsider Threat – No credentials, but has access to the target network – Ex: Cleaning crew, delivery personnel • Insider Threat – Having user and/or root-level credentials to the target network 11 – Ex: Disgruntle Employee (users/administrators)
  • 12. IC Network Overview Outsider/Cyber Threats Insider/Nearsider Threats Insider/Nearsider Threats Advanced Persistent Threat Figure adapted from: Eric D. Knapp, Industrial Network Security: Securing Critical Infrastructure Networks for 12 Smart Grid, SCADA, and Other Industrial Control Systems, Syngress, 2011.
  • 13. Attack Vectors • Web – SQL Injection – Broken authentication and session management • https://www.owasp.org/index.php/Top_10_2010-Main • Wireless – Use of weak wireless algorithms WEP and WPA • Bad Security Practices – HBGary and Anonymous incident • http://arstechnica.com/tech- policy/2011/02/anonymous-speaks-the-inside-story-of- the-hbgary-hack/ • Social Networking – Facebook 13
  • 14. Attack Vectors (cont.) • SCADA Protocols – Lack of authentication – Lack of encryption • SCADA Systems – Sinapsi eSolar Light Photovotaic System Monitor – Bypass authentication using hard-coded credentials and vulnerable to SQL injection • Also affects other Solar panel control systems • ICS-ALERT-12-284-01 • Control systems – A search engine, Shodan, that used to identify internet facing Control systems 14 • ICS-ALERT-11-343-01
  • 15. Attack Vectors (cont.) • How can I traverse through the Smart Grid? – Advanced Meter Infrastructure (AMI) Smart Meters shutdown meters through Optical port • D. Weber, “Looking into the Eye of the Meter”. BlackHat 2012. – Over 40+ million ZigBee electric meters are deployed with concentration in Texas, California, Texas, Michigan, and Virginia. • Zigbee Alliance: Heile, Bob, https://docs.zigbee.org/zigbee-docs/dcn/10-6056.pdf 15
  • 16. Attack Vectors (cont.) • AMI provides the ability to remotely control devices in the HAN - Turn off lights, Raise Tstat, etc... • Detailed energy use collected over regular time intervals. - Consumers can view energy usage real time • ZigBee is being used in HANs within the Smart Grid • Sniffing traffic • Replay attacks • Denial-of-Service Smart Grid using ZigBee Home 16 Area Network (HAN)
  • 17. Conclusion • Real-world threats are constantly trying to exploit various IC installations • Reliability vs. Security • Awareness and being proactive helps reduce the risk of your network being exploited 17
  • 18. Questions • ?? 18
  • 19. Contact Information • Angel E. Avila CISSP, CISA, C|EH, CEPT, CompTIA Security + angel.e.avila@dnsc-cyber.com • Richard G. Coy CISSP, CISA, C|EH, CPT, CEPT richard.g.coy@dnsc-cyber.com • Francisco J. Leyva CISSP, CISA, C|EH, CISM, CEPT francisco.j.leyva@dnsc-cyber.com • Humberto Mendoza CISSP, CISA, C|EH, CISM, CEPT humberto.mendoza@dnsc-cyber.com • Daniel Chacon CISSP, CISSA, C|EH, CISM, CEPT daniel.chacon@dnsc-cyber.com http://www.dnsc-cyber.com 19
  • 21. Attack Vectors (cont.) • ZigBee Overview – Low Power (Long Battery Life), low data rate wireless protocol – 250 Kbps throughput rate (low data rate) – Short Range (10 – 100 meters) – Supports star and mesh network topology – Easily add and remove nodes to the network • Why Zigbee ? – WIFI transceivers are too expensive, more power to operate – Bluetooth as a Frequency Hopping Spread Spectrum requires more power to operate – Zigbee consumes less power than WIFI and Bluetooth – Zigbee designed specifically for monitoring and automation – Zigbee is good solution for smart meters in Advanced Meter Infrastructure(AMI)
  • 22. Attack Vectors (cont.) • ZigBee Exploitation using KillerBee[1] - zbid–list available ZigBee devices connected to PC - zbdump–"tcpdump-w" clone for capturing ZigBee traffic - zbconvert–convert capture file formats - zbreplay–Replay attack - zdsniff–over-the-air (OTA) crypto key sniffer - zbfind–GUI for locating ZigBee networks - zbgoodfind–search memory dump for crypto key - zbassocflood–association flood attack (DoS) - spoofing attacks when used with Software Defined Radio 1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf
  • 23. Attack Vectors (cont.) • ZigBee Security – KillerBee[1] open source software is a tool suite used to test and exploit ZigBee networks – Hacker community has made many software modifications to the KillerBee[1] tool suite – KillerBee[1] tool suite is flashed on a RZUSB ($40.00) through Joint Test Action Group (JTAG) interface. • AVR JTAG ICE mkII ($300.00) used to flash RZUSB AVR JTAG ICE RZUSB Programmer 1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf
  • 24. Attack Vectors (cont.) • Problem: Demand for power exceeds the supply • AMI provides the ability to remotely control devices in the HAN - Turn off lights, Raise Tstat, etc... • Detailed energy use collected over regular time intervals - Consumers can view energy usage real time • Consumers can adjust power to reduce cost • Utility companies can better manage supply and demand Smart Grid using ZigBee Home Area Network (HAN)
  • 25. Attack Vectors (cont.) • ZigBee – Exploitation using KillerBee[1] - zbid–list available ZigBee devices connected to PC - zbdump–"tcpdump-w" clone for capturing ZigBee traffic - zbconvert–convert capture file formats - zbreplay–Replay attack - zdsniff–over-the-air (OTA) crypto key sniffer - zbfind–GUI for locating ZigBee networks - zbgoodfind–search memory dump for crypto key - zbassocflood–association flood attack (DoS) - spoofing attacks when used with Software Defined Radio 1. KillerBee : Wright, Joshua, http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf