21.03.2013 Views

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 4. INDUSTRY FEEDBACK SESSIONS 43<br />

1. the trend of convergence between the Internet <strong>and</strong> automation systems;<br />

2. the susceptibility of these Internet-connected systems to potential access,<br />

misuse, <strong>and</strong> attack.<br />

Segregating automation systems from the Internet is important because<br />

compromise can lead directly to physical effects. This is not the case for<br />

corporate information systems, which control (only) information rather than<br />

real-life physical processes.<br />

<strong>Industrial</strong> automation <strong>and</strong> control systems is historically a separate disci-<br />

pline from computer science <strong>and</strong> information technology - meaning, unfortu-<br />

nately, that these systems developed largely without security consideration.<br />

As a result, control systems asset owners have not paid attention to the dy-<br />

namic external threat environment.<br />

This is particularly troublesome when one considers that in many in-<br />

stances, industrial automation equipment controls the most critical (revenue-<br />

generating) assets <strong>and</strong> process possessed by an organization. Educating <strong>and</strong><br />

convincing asset owners to appropriately fund, create <strong>and</strong> enforce security<br />

policy, procedure, <strong>and</strong> capability for these systems is a major challenge in the<br />

industry today.<br />

Though the implications of the aforementioned trends have been empiri-<br />

cally alleged for some time, Leverett’s research un-intrusively documents these<br />

trends over time (with some limitations), <strong>and</strong> presents the findings visually,<br />

allowing him to voice concern over unsegregated automation systems with<br />

unprecedented clarity. Immediate applications of his research may include:<br />

• National computer emergency readiness teams (CERTs) using the data<br />

to contact affected <strong>and</strong>/or vulnerable asset owners to warn <strong>and</strong> suggest<br />

mitigation<br />

• National protection agencies using the data <strong>and</strong> visualization tool to<br />

conduct table-top exercises in which they gauge <strong>and</strong> respond to certain<br />

risks<br />

• Auditors using the tool to check whether automation systems have been<br />

or are currently directly connected to the Internet<br />

In addition to these immediate uses, Leverett’s research can provide impe-<br />

tus for further investigation into the depth of the segregation problem (such as<br />

modems to control systems reachable from the public telephone system, <strong>and</strong><br />

control system equipment accessible on networks from commercial wireless car-<br />

riers). Such future research may further illuminate the need for appropriate<br />

segregation of industrial automation systems from publicly-reachable network<br />

space.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!