Data Tampering Threats and Counter Measures
Transcript of Data Tampering Threats and Counter Measures
![Page 1: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/1.jpg)
Data Tampering Threats and Counter Measures
Sudheesh Narayanan
© Copyright 2016. All Rights Reserved
![Page 2: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/2.jpg)
Agenda
© Copyright 2016. All Rights Reserved
• General Connectivity Scheme for Data Acquisition for CEMS, EQMS and CAAQMS• Data Interpretations and Identifying Data Integrity Issues!• Understanding Data and Data Quality• Key Focus Areas of Inspection of CEMS, EQMS and CAAQMS
![Page 3: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/3.jpg)
Analyzer Data Acquisition System
Regulator Platform
Online Data Transmission
Industry Specific Limit Configuration
SMS and Email AlertsFor Exceedance or Shutdown
Regulator Data Analysis
Local Software at Industry
Process Input or Samples
CalibrationSystem
Standard Gas
General Schema for Data Transmission and Point to watch for
IoT Module
PC
1
2
Analog (4-20mA) orDigital
3
4
Vendor Server
5
![Page 4: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/4.jpg)
Typical Connectivity Solution
Mobile App
Connectivity Models
![Page 5: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/5.jpg)
Overview of Direct Connectivity From Analyzer
© Copyright 2014. All Rights Reserved
Ambient Monitoring
Emission Monitoring Systems
Wireless Module
DAC Software
Internet
Cloud Server
Internet
GLens Mobile App
Dashboard displayed on TV
Central Software is Web Accessible
Effluent Monitoring Systems
Wireless Module
Overview of Direct Connectivity From Analyzer
![Page 6: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/6.jpg)
How to Interpret the Online Data from CEMS, EQMS, AAQMS
© Copyright 2016. All Rights Reserved
• Availability of Data /Uptime Report• Delayed Data• Data Quality • Data Gaps• Exceedances • Diurnal Analysis• Matrix Report• Startup and Shutdown Sequence• Co-relation charts for Environmental Correlation• Randomness• Analyzer Drifts• Range Shifts• Calibration Issues• Comparison across Sectors
![Page 7: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/7.jpg)
Data Tampering Mechanisms
© Copyright 2016. All Rights Reserved
• Setting Upper Clamp• Changing Linearization Coefficient• Changing Analyzer Range • Data Simulation from Vendor Server• File Based Data Transfer• Non-Continuous Data
![Page 8: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/8.jpg)
3 Cement Plant PM
mg/
m3
1 Month Datam
g/m
3
Selected 1 Parameter and You see the issue!!
![Page 9: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/9.jpg)
mg/
m3
mg/
m3
Understanding 15 Minute Average vs 1 Minute Average
![Page 10: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/10.jpg)
Recalibration or Drift or Tampering?
![Page 11: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/11.jpg)
How to identify Analyzer Drifts!! Calibration Issue
![Page 12: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/12.jpg)
Upper Limit Threshold - 1
© Copyright 2016. All Rights Reserved
DATA PEAK AT 50 mg/m3. AFTER ALERT DATA PEAK AT 40 mg/m3
![Page 13: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/13.jpg)
Upper Limit Threshold - 2
© Copyright 2016. All Rights Reserved
DATA PEAK JUST BELOW 50 mg/m3.
![Page 14: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/14.jpg)
Upper Limit Threshold - 3
© Copyright 2016. All Rights Reserved
DATA PEAK AT 350 mg/m3.
![Page 15: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/15.jpg)
Data Simulation
© Copyright 2016. All Rights Reserved
RANDOM DATA SIMULATION WITH DATA PEAK AT 30 mg/m3
![Page 16: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/16.jpg)
Correlation between COD, BOD, TSS
![Page 17: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/17.jpg)
BOD Greater than COD? Distillery..
![Page 18: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/18.jpg)
Last 30 days for a Power Plant NOxm
g/m
3m
g/m
3
Till this point it was exceeding
![Page 19: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/19.jpg)
Uptime
![Page 20: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/20.jpg)
Uptime from Same Industry for different parameter
![Page 21: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/21.jpg)
Averaging Effect on Data
Watch for Discontinuous Data Stream!!
![Page 22: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/22.jpg)
Uptime Analysis for 3 Months!!
![Page 23: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/23.jpg)
![Page 24: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/24.jpg)
Key Focus Area for Regulators during Site Inspection
© Copyright 2016. All Rights Reserved
• Consent to Operate (CTO)• Location of the Installation• Technology Choices for different Process• Range of the Analyzer• Inspection of the Analyzer • Connectivity Scheme• Operation of the Analyser• Data Transmission• Comparison with Historical Trends• Calibration Information • Factors and Normalization• Key items to watch
• File Based Transfer• Delayed Data Transfer• Switching of Analyzers
![Page 25: Data Tampering Threats and Counter Measures](https://reader030.fdocuments.in/reader030/viewer/2022012718/61b07e1bc0aacd5c787641bc/html5/thumbnails/25.jpg)
© Copyright 2016 . All Rights Reserved
Thank You