12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

INFORMATION TECHNOLOGY VS. INDUSTRIAL CONTROL SYSTEMS: WHY TRADITIONAL INFOSEC201Human-machineinterfaceSets parametersRemote diagnosticsand maintenanceManipulatedvariablesControllerControlledvariablesActua<strong>to</strong>rSensorsProcess inputsControlledprocessProcess outputsFIGURE 11.1A generic diagram of an ICS control loop.the system. Additionally, he also has a remote diagnostics and maintenance system that he uses fortroubleshooting abnormal behavior.INFORMATION TECHNOLOGY VS. INDUSTRIAL CONTROLSYSTEMS: WHY TRADITIONAL INFOSEC PRACTICESMAY NOT APPLYOn the surface, an industrial control system may appear <strong>to</strong> be just another type of informationtechnology system—one that happens <strong>to</strong> contain additional specialty software <strong>to</strong> controla certain piece of industrial equipment. However, a report by the National Institute ofStandards and Technology (NIST) points out some clear differences 9 :• Performance. ICS systems typically have hard requirements for delay (how long it takes forinformation <strong>to</strong> be received) and jitter (the time or phase difference between the data signaland the ideal clock), but less stringent requirements on bandwidth (how much informationis sent through the network). A typical IT system, on the other hand, typically has muchsofter requirements for delay and jitter and often calls for assurances relating <strong>to</strong> highbandwidth.• Availability. ICS systems, particularly the power grid, are required <strong>to</strong> continuously delivera service. Typical IT practices such as rebooting computers (which would, in turn, cause atemporary outage) often become unacceptable in an ICS setting.• Risk management requirements. As stated in the “<strong>Introduction</strong>” section, the McCumberinformation security model states that the primary goals of IT security are <strong>to</strong> ensureavailability, integrity, and confidentiality of data. A later extension <strong>to</strong> this model addsauthentication and nonrepudiation as well. Though these are important aspects <strong>to</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!