12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

202 11. CYBER WARFARE AGAINST INDUSTRYindustrial control system, the NIST adds human safety and fault <strong>to</strong>lerance. These areimportant as the operation of ICS systems must prevent loss of life and avoidendangerment of public health or confidence. As a result, there is an important linkbetween security and safety in the ICS world.• Architecture. As we saw in the exploitation part of the book, many IT systems, particularlythose dealing with intellectual property were set up <strong>to</strong> use a centralized “reposi<strong>to</strong>ry.”Right or wrong, many IT professionals use this centralization <strong>to</strong> simplify requirements—they would just put more effort in<strong>to</strong> the protection of the reposi<strong>to</strong>ry. In an industrialcontrol system, centralized servers are still very important. However, periphery systemsgain in significance: first, they often directly control industrial equipment (i.e., electricalsubstations are responsible for providing power directly <strong>to</strong> consumers), and second,outages in certain peripheral systems may lead <strong>to</strong> cascading failures.• Physical interaction. Outages in typical IT systems may not have consequences outside thevirtual world. However, outages in industrial control system often affect physicalequipment—leading <strong>to</strong> real-world consequences.• Time-critical response. In an IT system, often access control can be performed without regard<strong>to</strong> data flow. The NIST report points out that the question whether <strong>to</strong> compute anindustrial control system with au<strong>to</strong>mated or software responses that require humaninteraction potentially become critical. For example, requiring an opera<strong>to</strong>r <strong>to</strong> enter apassword at a certain juncture may delay an emergency operation that could result in lossof life or expensive damage <strong>to</strong> equipment.• System operations. As industrial control systems are part of a larger, often complicated,structure of controlling equipment, their management would require an individual skilledas a control engineer who better understands the impact of implementing security featureson the control of operations—in addition <strong>to</strong> mastering IT security.• Resource constraints. Many legacy industrial control operating systems currently in use,particularly those used for power grids, may be devices that are extremely underpoweredand resource-constrained by modern standards. These constraints may simply precludecommon (and easy) IT solutions that would otherwise increase security. Further, licenseagreements in place for these often proprietary solutions may legally prevent the use of athird-party security solution.• Communication pro<strong>to</strong>cols. As with industrial control operating systems, many ICScommunication pro<strong>to</strong>cols may also be proprietary—again precluding a common/easy ITsolution designed for more common network pro<strong>to</strong>cols such as IP. Further, in manystructures, such as a power grid, a mix of different network pro<strong>to</strong>cols may be used asopposed <strong>to</strong> a single pro<strong>to</strong>col such as IP. 10• Change management. In IT systems, upgrades and patches <strong>to</strong> system software can oftenhappen swiftly and with relatively little difficulty once the vulnerability is found.Industrial control systems introduce several levels of complexity <strong>to</strong> the issue of patching/upgrading software. Due <strong>to</strong> the high-priority issues of avoiding loss of life or damage <strong>to</strong>equipment, software updates and patches go through a more rigorous certification processby vendors before being released. The end user (i.e., a local power company) will then alsoperform validation tests as an outage would be scheduled well in advance of the update.Further compounding difficulty here is the fact that some legacy ICS equipment will use

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!