Remote - Spring 2015 - (Page 8)
Feature Article
Protecting Critical Infrastructure - Understanding the
Threat to SCADA Networks
Oded Gonda, VP of Network Security Products
Check Point
Cyber-attacks on critical infrastructures are on the increase and are
becoming a growing concern for organizations and governments across
the globe. Power generation facilities, metropolitan traffic control systems,
water treatment systems and factories have become targets of attackers, and
have been hit recently with an array
of network breaches, data thefts and
denial-of-service activities. Vulnerabilities in these systems can vary from
basic issues such as systems without passwords or with default-only
passwords, to configuration issues and
software bugs. But once an attacker
is able to run software that has access
to a controller, the likelihood of a successful attack is very high.
Critical Infrastructure
Under Attack
This isn't wild scaremongering.
In 2014 alone The Department of
Homeland Security announced it
would investigate the possibility that
the Havex Trojan had targeted industrial control systems compromising
over 1,000 energy companies across Europe and North America. In 2012,
German power utility 50 Hertz was hit by a cyber-attack that rendered its
internet communications systems offline, in the first confirmed digital assault against a European grid operator.
The well-known Stuxnet attack of 2010 saw an Iranian nuclear centrifuge facility attacked using nothing more than a targeted computer virus.
What's more attacks can be mounted by disgruntled individuals and are not
the sole domain of organised gangs. In 2001 an Australian man was sent
to prison after he was found guilty of hacking into a computerised waste
management system causing millions of liters of raw sewage to spill out
into local parks and rivers.
Attacks such as these on critical infrastructure severely impact service
uptime, data integrity, compliance and even public safety, and require that
organizations implement steps to deal with these security concerns.
This can only be done by understanding the difference between ICS/
SCADA and traditional IT environments, along reusing some of the
know-how and technologies developed over the past 20 years to protect
computer networks.
Understanding SCADA
Critical Infrastructure facilities (electricity, oil, gas, water and waste)
rely heavily on electrical, mechanical, hydraulic and other types of equipment. This equipment is controlled and monitored by dedicated computer
systems known as controllers and sensors. These systems are connected
to management systems, together forming networks that leverage SCADA
(Supervisory Control and Data Acquisition) and ICS (Industrial Control
System) solutions. Both ICS and SCADA enable efficient collection and
analysis of data and help automate control of equipment such as pumps,
valves and relays. The benefits that these systems provide have contributed to their wide adoption. Their ruggedness and stability enable critical
infrastructure-related facilities to use ICS and SCADA solutions for long
periods of time.
SCADA/ICS networks and devices were designed to provide manageability and control with maximum reliability. Often they do not feature
mechanisms to avoid unauthorized access or to cope with the evolving
8
www.RemoteMagazine.com
security threats originating from external or internal networks that have
become so common in the IT world.
While their implementation is often proprietary, SCADA controllers are
essentially small computers. They use standard computer elements such as
operating systems (often embedded Windows or Unix), software applications, accounts and logins, communication protocols, etc. Moreover, some
of the management environments use
standard computing environments such
as Windows and Unix workstations.
As a result, the challenges associated with vulnerabilities and exploits
apply to ICS and SCADA systems,
with the additional challenge of such
systems operating in environments that
can be physically difficult to reach or
that can never be brought offline.
SCADA Vulnerabilities
It is a common belief that ICS
and SCADA networks are physically
separated from corporate IT networks.
This might be accurate physically, in
the sense that some companies operate
distinct LANs or airgap their control and corporate networks from one another. In other cases, companies use the same LANs and WANs, but encrypt
their ICS and SCADA traffic across a shared infrastructure. More frequently
however, networks require some level of interconnectivity in order to obtain
operational input from and/or export data to external 3rd party systems.
SCADA network devices have specific characteristics, which can be very
different than regular IT systems:
*
They are often installed in locations that are difficult to access
physically (e.g. on towers, on an oil rig, on industrial machinery)
and are environmentally more challenged than regular IT systems
(e.g. outdoors, extreme temperatures, vibrations) or require special
input voltages and mounting options
*
They often use propriety operating systems that have not been
subjected to security hardening
*
Their software cannot be updated or patched frequently, due to access limitations, concerns over downtime or the need to re-certify
*
They use proprietary or special protocols
These differences in environment create problems such as lack of
authentication and encryption, and weak password storage that would allow
attackers to gain access to the systems. Whilst most SCADA/ISC networks
have some level of perimeter defence, including network segmentation and
firewall technologies so attackers are always looking for alternative ways
to get inside - for instance, through a gate that is left open, or by triggering
some operations from inside the organization that opens up a communication channel to the outside. Typical tactics include:
*
Using a remote access port used by vendor for maintenance
*
Hacking a legitimate channel between IT systems and ICS/SCADA
systems
*
Convincing an internal user to click on a URL link in an email from
a workstation that is connected both the ICS/SCADA network and
to the Internet
*
Infecting laptops and/or removable media while outside the ICS/
SCADA network, later infecting internal systems when they're
connected to the network for data collection, controller/sensor
software updates.
http://www.RemoteMagazine.com
Table of Contents for the Digital Edition of Remote - Spring 2015
Editor's Choice
The Impact of OPC UA and Information Modeling on Monitoring Solutions
Protecting Critical Infrastructure: Understanding the Threat to SCADA Networks
Small Power, Big Benefits – Fuel Cells for Remote and Off-Grid Applications
What to Expect in the Equipment Industry in 2015
Wireless Well Pad Retrofit
IT-OT Convergence: The Importance of Aligning Historically Disparate Technologies
Internet of Things North Americs Preview
SCADA
Networking
Security
Onsite Power
Industry News
Remote - Spring 2015
https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com