21.03.2013 Views

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 3. EXPLORING THE DATASET 33<br />

Operating <strong>System</strong> Tag Count<br />

Adtran NetVanta 15<br />

Cisco, Nortel, SonicWall, Tasman Aironet, BayStack Switch, Soho, 1200 2<br />

Enterasys Vertical Horizon Switch 1<br />

F5 BigIP LB 4.1.x 3<br />

F5 BigIP LB 4.1.x (sometimes FreeBSD) 21<br />

Foundry, SonicWall BigIron, TZ 202<br />

FreeBSD 4.4 2<br />

HPUX 10.20 3<br />

Linux older 2.4 1<br />

Linux recent 2.4 23<br />

Linux recent 2.4 (2) 1<br />

NetApp Data OnTap 6.x 3<br />

NetBSD 1.6 7<br />

NetCache 5.3.1 14<br />

NetScreen Firewall 1<br />

Nortel Contivity 256<br />

OS/390 1<br />

Printer controller (?) 20<br />

Symbol Spectrum Access Point 32<br />

Tru64 5.0 3<br />

Windows 2000 166<br />

Windows 2003 14<br />

Windows NT 4.0 SP1+ 2<br />

Table 3.1: Operating <strong>System</strong> tag count<br />

cost <strong>and</strong> simple approach to reducing ICS exposures, <strong>and</strong> is also a solution that can be<br />

implemented in the device itself or at the perimeter using firewall rule sets.<br />

In fact, we encountered one device during the course of this study where the IP whitelisting<br />

page was viewable unauthenticated (see Figure 3.2). This is disconcerting for two reasons:<br />

1. Firstly, if it had been filled in properly we would not have been able to see this<br />

device at all.<br />

2. Secondly, we could have filled in the IP list ourselves unauthenticated, thus lock-<br />

ing control engineers out of their own web configuration screen by limiting it to<br />

a single IP address such as 192.0.2.0 (Which is a bogon IP Address reserved for<br />

documentation <strong>and</strong> examples in a similar manner to www.example.com).<br />

The ability to lock out field engineers from a device because they did not white-list their

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!