23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Quality of Service 19-3<br />

19.2 relationship with Information Security Topics<br />

As remarked before, some of the topics related with QoS are the information security facts that any<br />

network professional must know, at least at an introductory level, related with the need of continuous<br />

availability and reliability of the <strong>industrial</strong> network and data.<br />

As special security problems in <strong>industrial</strong> networks, it is necessary to emphasize the following:<br />

• Physical security problems: The scope of these problems is the range of devices found in a network:<br />

PCs or client workstations, servers, routers, switches, or special dedicated equipment.<br />

Especially for the most sensible devices, if they are not correctly placed, they faced a possible<br />

destruction or an easy unauthorized access to the console of the device, with the consequent<br />

risk for the control of the device or for the data being there and, as a consequence, for the value<br />

of the network.<br />

• Software security problems: It is necessary to include here the operating <strong>systems</strong> of devices, any IP<br />

protocols implementation, and any <strong>industrial</strong> application installed in the devices. The most common<br />

problems are the security bugs due to bad coding (very common), the insecure configuration<br />

of the authentication and authorization files in the operating system, the insecure configuration<br />

of the permissions for the file <strong>systems</strong>, or a bad policy for the security copies of the data. Also,<br />

it must be taken into account the problems due to incorrect implementation of protocol stacks<br />

or the use of dangerous protocols or applications, as the case for Telnet, ftp, tftp, RIP, SMTP,<br />

and so on.<br />

• A significant emphasis must be put on the need of having a good antivirus system and special control<br />

for the attachments in any mail entered in the network, especially if our <strong>industrial</strong> network<br />

shares the media with the staff network.<br />

• It is also important to take time to analyze the security in the fundamental network devices, the<br />

switches and the routers. They are no more than hardware and software; but the consequences of<br />

security breaches in them can be extremely dangerous. For example, if one of the switches in our<br />

network suffers a denial of service attack, every device running our applications is disconnected<br />

and the final result is that we have no network. Sometimes also we can suffer a capture attack in<br />

one of our routers and, from the router, using a privilege escalation technique, our servers can be<br />

hacked and obliged not to do its usual job.<br />

From the technical point of view [5], we have many tools to face all these security problems, but, in<br />

a consistent way with the idea of quality expressed in the previous section, we need a security policy to<br />

organize all the implementations of security defenses.<br />

An information security policy can be defined as “a formal statement of the rules by which people,<br />

who are given access to an organization’s technology and information assets, must abide” [6].<br />

The main goal is to inform all the people in the organization about the obligatory requirements to<br />

observe, to protect the technological values and resources and all the organization’s information.<br />

The policy must make explicit the mechanisms for us to obey each norm and the methodology to follow<br />

for each of the particular cases. If it is complete enough, it can give the hints to select the technologies,<br />

including software and hardware to implement the policy.<br />

To build a good network security policy for a concrete organization, a number of key questions must<br />

be answered:<br />

• What exactly must be protected? First a complete inventory must be built, taking into account<br />

different security standards like ISO/IEC 27001 [7] or ISO/IEC 15408 [8]. Then, a selection (with<br />

assigned priorities) of the actives to protect must be built.<br />

• Who could attack our network? It is extremely important to analyze every internal and external<br />

people that work with us and decide in which trust. Also, it is a good idea to think about the<br />

possible motivations of virtual attackers.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!