21.03.2013 Views

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 1<br />

Introduction<br />

Security of industrial control systems (ICS) against online attacks has received consider-<br />

able attention in the last decade. This attention <strong>and</strong> effort can be commonly interpreted<br />

as securing a variety of systems against on-line sabotage: utilities like electricity, wa-<br />

ter, <strong>and</strong> oil <strong>and</strong> gas. The term ICS may also refer to networks like those for maintaining<br />

transport <strong>and</strong> communication; <strong>and</strong> industrial plants such as refineries <strong>and</strong> pharmaceutical<br />

facilities. Some of the devices used in control systems don’t come with default authenti-<br />

cation enabled, so ‘re-perimeterisation’ is the first step towards reducing their exposure.<br />

The North American Electric Reliability Corporation (NERC), the electricity regulator in<br />

the United States, Canada, <strong>and</strong> part of Mexico, has identified a set of st<strong>and</strong>ards for criti-<br />

cal infrastructure protection called NERC-CIP, which m<strong>and</strong>ate a strict electronic security<br />

perimeter (as well as other organisational <strong>and</strong> technical security measures).<br />

In this chapter we describe the high level goals of this project, <strong>and</strong> provide a history of<br />

industrial system security <strong>and</strong> a brief overview of industrial security incidents. We also<br />

describe the regulatory framework in the USA that our work aligns with, although the<br />

techniques <strong>and</strong> project have relevance outside that regulatory framework as well.<br />

1.1 Goals<br />

The primary aim of this project is to debunk a popular folk myth of industrial control<br />

systems (hereafter ICS); namely, that they are never connected to the internet.<br />

This is a very pervasive story within the ICS community, but is not always backed up<br />

by evidence. Individual counter-examples spring up often enough to warrant further<br />

investigation, <strong>and</strong> we set out to provide a larger body of such counter-examples than<br />

previously acknowledged. It is intended that other researchers will add to the set of<br />

counter-examples, <strong>and</strong> that this may become an open source data set for academic research<br />

of ICS.<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!