![Sergey Gordeyhcik-Industrial CyberSecurity Mission Centric Approach-工业互联网安全论坛_第1页](http://file4.renrendoc.com/view/4caca3354a3c6822f9aa5ad7b5679b19/4caca3354a3c6822f9aa5ad7b5679b191.gif)
![Sergey Gordeyhcik-Industrial CyberSecurity Mission Centric Approach-工业互联网安全论坛_第2页](http://file4.renrendoc.com/view/4caca3354a3c6822f9aa5ad7b5679b19/4caca3354a3c6822f9aa5ad7b5679b192.gif)
![Sergey Gordeyhcik-Industrial CyberSecurity Mission Centric Approach-工业互联网安全论坛_第3页](http://file4.renrendoc.com/view/4caca3354a3c6822f9aa5ad7b5679b19/4caca3354a3c6822f9aa5ad7b5679b193.gif)
![Sergey Gordeyhcik-Industrial CyberSecurity Mission Centric Approach-工业互联网安全论坛_第4页](http://file4.renrendoc.com/view/4caca3354a3c6822f9aa5ad7b5679b19/4caca3354a3c6822f9aa5ad7b5679b194.gif)
![Sergey Gordeyhcik-Industrial CyberSecurity Mission Centric Approach-工业互联网安全论坛_第5页](http://file4.renrendoc.com/view/4caca3354a3c6822f9aa5ad7b5679b19/4caca3354a3c6822f9aa5ad7b5679b195.gif)
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
employee
IndustrialCyberSecurity
MissionCentricApproach
SergeyGordeyhcik
SCADAStrangeLove
ResearchTeam
WWW.SCADA.SL
GroupofsecurityresearchersfocusedonICS/SCADA
AlexanderTimorin
DmitrySerebryannikov
SergeyDrozdov
AlexanderTlyapov
DmitrySklyarov
SergeyGordeychik
AlexanderZaitsev
EvgenyErmakov
SergeySidorov
AlexeyOsipov
GlebGritsai
SergeyScherbel
AndreyMedov
IlyaKarpov
TimurYunusov
ArtemChaykin
IvanPoliyanchuk
ValentinShilnenkov
DenisBaranov
KirillNesterov
VladimirKochetkov
DmitryEfanov
RomanIlin
VyacheslavEgoshin
DmitryNagibin
RomanPolushin
SergeyBobrov
YuriGoltsevYuriyDyachenko
tosaveHumanityfromindustrialdisasterandtokeepPurityOfEssence
CYBERSECURITY?
INDUSTRIALCYBERSECURITY
Functional
Safetyand
Reliability
Industrial
Safety
Information
Security
Thesecretsofcybersecurity,ValentinGpanovich,EfimRozenberg,SergeyGordeychik.RailwayStrategies,Issue130
/schofieldpublishingltd/docs/railway_strategies_issue_130_june_2
THREATS?
THREATS?
/story/four-cyber-attacks-on-uk-railways-in-a-year-10498558
/technology/2016/jan/07/ukrainian-blackout-hackers-attacked-media-company
INTERCONNECTEDWORLD
32C3,Hamburg,TheGreatTrainCyberRobbery
220,558ONLINE,17,042INENTERPRISES
/analysis/publications/75343/industrial-cybersecurity-threat-landscape/
ICSONLINE:CHINA
ICSONLINE:CHINA
/blog/2016/03/census-scanning-from-siemens-s7-plc-cpustatus/
GREATERCHINA
~10,000OF“SMART”POWERGRIDOBJECTS
•GREENENERGY
•SMARTGRID
•DIGITALSUBSTATIONS121,000KMOFRAILWAYS
•19,000KMOFHIGH-SPEEDLINES
•HIGHLYAUTOMATED
•NATIONALHIGH-SPEEDRAILGRID(4+4)
DIGITALSUBSTATIONTAKEOVER
CTF-STYLEWHITEHATINDUSTRIALCHALLENGE
/press/news/41213/
DIGITALSUBSTATIONTAKEOVER:GOALS
•FINDVULNERABILITIESINIEC-61850SUBSTATIONS
•CREATEEXPLOIT
•TRIGGERCYBER-PHISICALATTACK
RelayProtection
/press/news/41213/
VULNERABILITIESINRELAYPROTECTION
REMOTECODEEXECUTION?
•togetfirmware?
•togetdebugsymbols?
•todebug?
•..PowerPC
•no“operationsystem”
CONFIRMATIONCODE“311299”
Toaccessthisinformation,theconfirmationcode“311299”needstobeprovidedwhenprompted."
...Siemensdoesnotpublishofficialdocumentationonthesestatistics.ItisstronglyrecommendedtoworktogetherwithSiemensSIPROTECcustomercareorcommissioningexpertstoretrieveandinterpretthestatisticsandtestinformation..."
DEVICEMEMORY
/2015/12/now-declared-capabilities.html
CODEREUSE
Linux
VxWorks6.x
61850Stack
MisfortuneCookie
SSHserver
Kudos@repdet@k_v_Nesterov@samincube
RAILWAYCOMPUTERBASEDINTERLOCKING
RAILWAYGSM-RISSUES
VULNERABILITIESOF(U)SIM
•Remotedatarecovery(Kc,TIMSI)
–Chaneldecryption(includingA5/3)
–«Clone»theSIMandmobilestation
•SIM“malware”
•BlockSIMviaPIN/PUKbrute
•ExtendedOTAfeatures(FOTA)
KarstenNohl,https://srlabs.de/rooting-sim-cards/
AlexanderZaitsev,SergeyGordeychik,AlexeyOsipov,PacSec,Tokyo,Japan,2014
LOCALVENDORS
INDUSTRIALCYBERSECURITY
Functional
Safetyand
Reliability
Industrial
Safety
Information
Security
Thesecretsofcybersecurity,ValentinGpanovich,EfimRozenberg,SergeyGordeychik.RailwayStrategies,Issue130
/schofieldpublishingltd/docs/railway_strategies_issue_130_june_2
MISSIONCENTRICAPPROACH
Industrialsafety:directlyaffectphysicalsafety.
Economical:decreaserailroadtrafficcapacityorotherquantitativeeconomicalcharacteristics(traindelays,localpoweroutage)
Reliabilityandfunctionalsafetyimpact:ICScrashes,outofservice,etc.
COMPUTERBASEDINTERLOCKING
1
2
FORMALREQUIREMENTS
CBI:THREATMODEL
1.Safety(CyberPhysicalThreats)
•setalessrestrictivesignallight
•operateaswitchwithatrainpassingoverit
•setconflictingroutes…
2.Economics(freightefficiency)
•CBICPUcrash
•Blockingofcontrol
•Falseindication…
3.Reliabilityandfunctionalsafety
•CBICPUreboot
•Networkcrash…
Signallingcybersecurity:theneedforamission-centricapproach
ValentinGapanovich,EfimRozenbergandSergeyGordeychik
/index.php/signalling/signalling-cyber-security-the-need-for-a-mission-centric-approach.html
FULLPICTURE
LETDOITTOGETHER!
•GOVERNMENT
REGULATORYAUTHORITIES
LAWENFORCEMENTS
CERTS
•RESEARCHERS
•ICSVENDORS
•SECURITYVENDORS
•OPERATORSOFCRITICALINFRASTRUCTURE
#SCADASOS
Q:WTFSACADSOS?
A:SCADASOS-(un)Secure
OpenSmartGridsisopen
initiativetoriseawarenesson
insecuritiesofSmartGrid,
PhotovoltaicPowerStations
andWindFarms.
Q:Howtoparticipate
A:FindInternet-connectedPV
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025至2030年喷墨纸项目投资价值分析报告
- 2025年氟化钡晶体项目可行性研究报告
- 2025至2030年铜抛光开缸剂项目投资价值分析报告
- 2025至2030年吸塑电器箱项目投资价值分析报告
- 二零二五年度高品质沙料采购及仓储服务协议3篇
- 二零二五年度厂房抵押合同样本:企业资产抵押贷款协议8篇
- 高考地理一轮复习热点突破:气候类型判读、气候特征描述(原卷版+解析版)
- 珠宝定制质量保障与免责协议
- 分居协议书撰写技巧与范文
- 酒店管理咨询服务投资合同书
- 2023风电机组预应力混凝土塔筒与基础结构设计标准
- 游戏账号买卖合同
- 小学语文阅读教学落实学生核心素养方法的研究-结题报告
- 一年级的成长历程
- 2024年南京铁道职业技术学院高职单招(英语/数学/语文)笔试历年参考题库含答案解析
- 正月十五元宵节介绍课件
- 病毒性肺炎疾病演示课件
- 中考英语语法填空专项练习附答案(已排版-可直接打印)
- 口腔医学中的人工智能应用培训课件
- 自然辩证法概论(新)课件
- 基层医疗机构基本情况调查报告
评论
0/150
提交评论