Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric...
-
Upload
harry-hawkins -
Category
Documents
-
view
215 -
download
2
Transcript of Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric...
![Page 1: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/1.jpg)
Copyright © SEL 2002
Critical Infrastructure Interdependencies and Emerging
Threats to Electric Power
Dr. Edmund O. Schweitzer, III
Schweitzer Engineering Laboratories
Portions of this work were funded by grant #60NANB1D0116 from theNational Institute of Standards and Technology, U.S. Dept. of Commerce.
![Page 2: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/2.jpg)
Cyber Attacks Against Electric Utilities
Several Attacks on Utility Financial Systems Environmentalists Caught Hacking Utility IT
System Recreational Hackers Took Over Utility
Server to Play Games Insider Threat Against Texas Power Grid Insider Caught Hacking British Nuclear
Power Station Controls Cal-ISO Hacked via China Telecom
![Page 3: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/3.jpg)
Infrastructure Interdependency Studies
NSA “Eligible Receiver”Power, banking, finance, transportation, and defense all interrelated and at risk
DOE “Black Ice”Simulated 2002 Olympic attack shows telecomm, water, gas, and transport failures
Sandia National Lab SimulationsCascading small events worse than massive event
![Page 4: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/4.jpg)
More Attacks to Come
30 to 40 Attack Scripts Posted on Internet Every Month (ITL Bulletin, NIST)
13 Countries With Nationally Sponsored Information Warfare Efforts (G. Tenet, CIA)
Increasing Electronic Attacks in North America (IA Newsletter, DOD)
Utilities Suffer More Attacks Than Manufacturing (Riptech, Inc.)
![Page 5: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/5.jpg)
SEL Passwords First in Digital Protective Relays Best in Digital Protective Relays P(90,6) = 906 = 531,440,000,000 Password
Combinations
SEL GE-UR Siemens7SA511
Alstom LFZR
ABB 2000R
Siemens 7SJ600
(#char, length) P(90,6) P(10,10) P(10,6) P(26,4) P(14,4) P(2,3)
Combinations 531 B 1 B 1 M 456 K 38 K 8
Access Levels 2,3,4 2 1 2 2 1
Password Defaults
OTTERTAIL
null 000000 AAAA 0000 -+-
![Page 6: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/6.jpg)
SEL History of Security
First Microprocessor Relays: 1984
Password Protection From “Day One” Access: 3x wrong alarm
2access: every attempt alarm
Monitor Your Alarm Contacts!
Last 3 Years: Campaign for Awareness
![Page 7: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/7.jpg)
“Concerns About Intrusions Into Remotely Accessible Substation Controllers and SCADA Systems”
“Safeguarding IEDs, Substations, and SCADA Systems Against Electronic Intrusions”
“Tools for Protecting Electric Power Systems From Electronic Intrusions”
SEL Campaign For AwarenessConference Papers on www.selinc.com
![Page 8: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/8.jpg)
“Using Passwords to Secure Relays, Controllers, and SCADA Systems From Unauthorized Access”
“Setting and Using Secure Dial-Back Modems With SEL Relays and Communications Processors”
“Low Cost Authentication Devices for Secure Modem and Network Connections”
SEL Campaign For AwarenessApplication Guides on www.selinc.com
![Page 9: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/9.jpg)
Safeguarding IEDs, Substations, SCADA, and Information Systems Against Cyber Attacks and Electronic Intrusions SEL University Seminar
Industrial Applications of Information Security to Protect the Electric Power Infrastructure National Institute of Standards and Technology
Critical Infrastructure Protection Grant
SEL Campaign For AwarenessSeminars and Research Projects
![Page 10: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/10.jpg)
NIST Critical InfrastructureProtection Grant
SEL – Research Lead, Primary Contractor
WSU and UI – Subcontractors
Five Grant Objectives
1. Harden substations
2. Apply Internet protocol security
3. Assess security and survivability
4. Prototype secure information infrastructure
5. Foster InfoSec awareness in utilities
![Page 11: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/11.jpg)
Electronic Access Vulnerabilities
Netw orkInterface
SubstationController
Remote SCADA
ATM / Fram e Relay
Local Control
IED
IED
IED
IED
IED
Netw orkInterface
Remote Access
Router
Modem
Router
Remote Access
5
4
Internet
1
3
2
Telecomm
Remote Access
Modem
![Page 12: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/12.jpg)
Securing Substation Communications
Netw orkInterface
SubstationController
Remote SCADA
ATM / Fram e RelayIED
IED
IED
IED
IED
Netw orkInterface
VPN Router
Modem
VPN Router
Remote Access
Internet
LockCrypto
Remote Access
Crypto
Crypto
Crypto
Crypto
Local Control
Crypto
Telecomm
Remote Access
Modem
Key
![Page 13: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/13.jpg)
Low Cost Authentication Devices
Proximity Reader and Badge Token Key Generators
Programmable Buttons Fingerprint Scanner
![Page 14: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/14.jpg)
Low Cost Secure Modem Devices
Modem Key / Lock
Matched Crypto-Modems
Programmable Password-Controlled Modem
![Page 15: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/15.jpg)
Protect Your SystemsStop Accidental / Deliberate Mis-Settings
Physical Access Controls
Access Warning Statements
Verify Settings (e.g., “Are You Sure?”)
Two-Tiered Controls (Show / Set)
Electronic Red Tags
![Page 16: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/16.jpg)
Electronic User Authentication
Password / PIN Access Controls Teach password / PIN security Advocate strong passwords Monitor compliance
Different Passwords / PINs for Differing Locales, Equipment, and Systems
Protect Your SystemsStop Unauthorized Access
![Page 17: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/17.jpg)
Change Password / PINs Immediately Upon Contractor installation and / or
maintenance
Suspected intrusions
Personnel turnover or conflict
Protect Your SystemsStop Unauthorized Access
![Page 18: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/18.jpg)
Protect Your SystemsDetect Intrusions
Monitor Events for Intrusion and Functionality
Monitor Alarm Contacts
Audit / Access Logs
Automate Alarm Responses Audio and visual indicators Auto-transmit warnings
![Page 19: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/19.jpg)
Protect Your Systems Stop Network Attacks
Multifactor Authentication / Access Control
Automated Lock-Outs
Proactive Log Analyses
Separation of Functionality
Data Packet Encryption
![Page 20: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/20.jpg)
Protect Your Systems Stop Network Attacks
Virus Scanners
Firewalls
Intrusion Detection Systems
Internet Protocol Security (IPSec)
Virtual Private Networks (HW or SW)
Public Key Certificates
![Page 21: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/21.jpg)
Open IssuesWill RTO’s Affect Reliability?
New Management Layer
More People Involved
Bigger System to Operate
New Single Point of Failure / Attack
![Page 22: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/22.jpg)
Population and Load Growing
Generation Not Near Loads
No New Line Construction in 15 Years
T&D Pushed to Critical System Limits
Open IssuesTransmission Shortage
![Page 23: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/23.jpg)
Industry Action Items
Recognize the Problems
Campaign for Awareness
Apply Information Security Principles
Test Fail-Over Systems and Emergency Services
Promote and Build New Transmission Lines
Design Redundant Controls and SCADA Systems
![Page 24: Copyright © SEL 2002 Critical Infrastructure Interdependencies and Emerging Threats to Electric Power Dr. Edmund O. Schweitzer, III Schweitzer Engineering.](https://reader035.fdocuments.in/reader035/viewer/2022070407/56649e425503460f94b3408f/html5/thumbnails/24.jpg)
Social Effects of Inaction Loss of Economic
Opportunity
Higher Energy Prices
Less Reliable Service
Jeopardize Critical Infrastructures
Hurts the Poor and Vulnerable the Most