A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information...

27
1 A Comprehensive Approach to Critical Information Infrastructure Assurance Professor Saifur Rahman Director Euro-Atlantic Symposium on Critical Information Infrastructure Assurance 23 23 - - 24 March 2006 24 March 2006 Riva San Vitale, Riva San Vitale, Switzerland Switzerland Advanced Research Institute Virginia Polytechnic Inst & State University, U.S.A. www.ari.vt.edu

Transcript of A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information...

Page 1: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

1

A Comprehensive Approach to Critical InformationInfrastructure Assurance

Professor Saifur Rahman Director

Euro-Atlantic Symposium on Critical Information Infrastructure Assurance

2323--24 March 200624 March 2006Riva San Vitale, Riva San Vitale, SwitzerlandSwitzerland

Advanced Research InstituteVirginia Polytechnic Inst & State University, U.S.A.

www.ari.vt.edu

Page 2: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

2

Outline

• Critical infrastructures and their interdependencies

• Importance of information and electricity infrastructures

• Cyber and physical vulnerabilities and cascading failures

• Historical and new approaches to CIIA

Page 3: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

3

What are Critical Infrastructures?

An infrastructure or asset the destruction of which would have a debilitating impact on the national security and

the economic and social welfare of a nation

TELECOMELECTRICITY

NATURAL GASWATER

TRANSPORTATION

Page 4: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

4

Infrastructure Interdependencies

Page 5: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

5

Two Important Sectors: Critical Information and Electricity Infrastructures

Oil and gasBanking and finance

TransportationWater and sewer

TelecommunicationsEmergency responders

Critical government services

Without these two enabling infrastructures, other infrastructures cannot function

InformationElectricity

Page 6: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

6

Electricity and Information Infrastructure for Transportation Sector

Transportation sector• Electricity to power all equipment• Real time information gathered and sent by the information

infrastructure

Traffic flow detection

Traffic lights

Traffic light control center

Traffic camera

Page 7: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

7

Credit card

Electricity and Information Infrastructure for Banking and Financial Sector

Banking and financial sector• Needs electricity to process all transactions• All information is maintained and collected in a network

ATM Online transaction

Page 8: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

8

Dependency of Electric Power Delivery on Information Infrastructure

Source: IEEE Power & Energy Magazine, Sep/Oct 2004

CII is necessary for the reliable and secure supply of electricity

Page 9: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

9

Arial view of the US at nightSource: NASA

Dependency of Critical Information Services on Electric Power

Concentration of ISPs in the USSource: The GeoURL ICBM Address Server

Page 10: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

10

Types of Vulnerabilities

Cyber Physical - natural

Page 11: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

11

Cyber Vulnerabilities

Page 12: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

12

Physical Vulnerabilities

Natural Hazards: hurricanes, snowstorms, earthquakes, floods

System Failures: intentional events, equipment failures, human errors

Earthquake Kobe 1995 Japan

Major Floods2002 Europe

Hurricane Katrina2005 USA

Page 13: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

13

Oil & gas outages

Water outages

Traffic signal outages

Telecom outages

Business interruptions

Delays in Emergency services

Vulnerabilities and Cascading Failures

Physical/Cyber

Attacks

Direct effects

Indirect effects

Electricity outages

IToutages

Page 14: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

14

Critical Information Infrastructure

Its role in containing Vulnerabilities and minimizing Cascading Failures

Page 15: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

15

Why assuring CII is important

CII is a means to monitor and control the system status and reduce vulnerabilities of other critical infrastructures

Electric power systems, natural gas and water supply networks, refineries, etc. are monitored and controlled over an information network called Supervisory Control and Data Acquisition (SCADA)

Early warning signals can be generated over this network so that

other CI’s can be protected

Page 16: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

16

Information InfrastructureAssurance: An Evolving Discipline

Critical – Nation’s safety and prosperity

Pervasive – Wherever IT-enabled services exist.

Evolving – Grows hand-in-hand with technology

Cross-disciplinary –Computer Science, Electrical Engineering, Business, Law, Math, Social Science, etc.

Challenging – Attackers, Failures and Targets

Complex Interdependencies

Page 17: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

17

Approaches to Critical Information Infrastructure Assurance

• Assurance aspects in CII design, evolution, operation and maintenance

• Business, management, and organizational issues

• Law, policy, and privacy issues

Page 18: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

18

Assurance aspects in CII design, evolution, operation and maintenance

There is a broad spectrum of security research across several academic disciplines and research groups. For example:

• Cryptology and cryptography

• Network security

• Internet security

• Intrusion detection

• Electronic commerce

• Secure software agents

• Multicast security

• Security for wireless systems

Page 19: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

19

Business, management, and organizational issues

Information security is a business and national security issue as well as a matter of management practice

Security threats, i.e. fraud, abuse and errors from inside the organization, are potentially dangerous and likely to occur

Need to educate employees about • Latest developments in information security trends, i.e. viruses, spam,

threats

• When and how to approach law enforcement agencies

Page 20: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

20

Law, policy, and privacy issues

Need the cooperation among government, private sectors and academic organizations

Need the development of a broad strategy to promote national or regional awareness/partnership for critical infrastructure security• Primary foci are, for example, owners and operators of critical

infrastructures and other influential stakeholders in the economy

Samples of government policies in the US• Security Breach state laws

www.crowell.com/pdf/SecurityBreachTable.pdf

• Critical Infrastructure Information Act (2002) www.fas.org/sgp/crs/RL31762.pdf

Page 21: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

21

An Example of Infrastructure AssuranceSCADA Systems

SCADA – Supervisory Control and Data AcquisitionMost power system controls are based on SCADA systems.

Other applications are: (A) oil & gas operations, (B) water & waste water management systems.

Power Gas Water

Page 22: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

22

Components of a typical SCADA SystemAn old technology with a critical importance

SCADA components1. Master Station (MS)2. Remote Terminal Units (RTU)3. Communication links between MS and RTU, e.g.

LANWANVSATTCP/IPWireless

Source: www.ucos.com

Page 23: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

23

Traditional SCADA systems on Independent Networks

Each infrastructure has its unique & separate SCADA systems• Electricity SCADA systems cannot piggyback on that of gas or water• Gas network SCADA systems cannot run on other networks• Similarly, electricity or gas SCADA systems cannot be shared with

that of water supply systems

Source: www.keymile.com

Page 24: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

24

Internet-based SCADA systems

If a common backbonecan be used among various infrastructures, there will be only small additional costs to build an individual SCADA system.

Source: IEEE Power & Energy Magazine, March/April 2005

Page 25: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

25

Internet-based SCADA systems: Pros and Cons

Advantages of using Internet-based SCADA:

• Wide-area connectivity and pervasive

• Routability

• Redundancy and hot standby

• Integration of IT with automation and monitoring networks

• Standardization

• Can login from anywhere in the world

Disadvantages:

• Security concerns

• Reliability concerns

Page 26: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

26

Research and Development in CIIA

How to secure CII so that it can facilitate the protection and reduce vulnerability of other critical infrastructures

Page 27: A Comprehensive Approach to Critical Information ... Comprehensive Approach to Critical Information Infrastructure Assurance ... Approaches to Critical Information Infrastructure Assurance

27

Thanks for Listening

Name: Prof. Saifur RahmanAffiliation: Virginia Tech, USAPhone: (703) 528-5500Email: [email protected] site: www.ari.vt.edu

Questions or Comments?