16.08.2013 Views

Cyber Security of SCADA Systems test bed - Senior Design - Iowa ...

Cyber Security of SCADA Systems test bed - Senior Design - Iowa ...

Cyber Security of SCADA Systems test bed - Senior Design - Iowa ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 3: Sample Nessus Vulnerability List<br />

It is difficult to predict what s<strong>of</strong>tware will be used to implement the attacks, as the appropriate s<strong>of</strong>tware<br />

will vary depending on the type <strong>of</strong> vulnerability. Most, if not all tools will be free and open source,<br />

though we will not exclude commercial s<strong>of</strong>tware if it will prove useful. An excellent compilation <strong>of</strong><br />

common security tools is the Linux distribution called Backtrack 4, which is available for free from its<br />

website.<br />

Testing approach considerations<br />

Virtualization Testing<br />

How and where will <strong>test</strong>ing be performed?<br />

Testing will be performed in the <strong>SCADA</strong> lab. We will need to verify the virtual server is<br />

running and communications are working.<br />

Exactly what will be <strong>test</strong>ed?<br />

Communications between virtual RTUs and virtual relays<br />

Communications between virtual RTUs and physical command center<br />

How will <strong>test</strong>ing accuracy be determined?<br />

We will check the RTU operations screen and if it shows that both virtual relay and<br />

command center are connected than it is working correctly<br />

What information will be recorded on the forms that will be used to record <strong>test</strong> results?<br />

We will record what virtual RTUs and virtual relays are not working and record any<br />

errors associated with them.<br />

SDMAY11-11 13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!