Mapping Industrial Control Systems

Size: px
Start display at page:

Download "Mapping Industrial Control Systems"

Transcription

1 Mapping Industrial Control Systems S2ERC Showcase, Washington, D.C. Murat Kuzlu 1, PhD., T. Charles Clancy 2, PhD., Kevin Heaslip 2, PhD., Saifur Rahman 1, PhD., Aditya Nugur 1 Virginia Tech - Advanced Research Institute 1 /Hume Center 2 May 2017

2 Project Overview BACnet, Modbus and DNP3 devices are widely used in industrial control networks found on US military installations. Detecting the presence of BACnet/Modbus/DNP3 devices in a network is crucial in terms of security concerns. 2

3 Project Goals To develop a mapping tool which Can discover all BACnet, Modbus and DNP3 devices in both modern industrial control networks, in addition to legacy systems found on US military installations. Can be used from a single TCP/IP network access point within a local/remote network. Can provide early warnings of cyber attacks on a building network, the U.S. power grid and its dependent systems. To develop a user interface that initiates discovery and inspect discovered devices. To develop a test-bed that includes BACnet/Modbus/DNP3 devices 3 3 3

4 Related Work Under the DOE-funded project "Building Energy Management Open Source Software (BEMOSS)", Virginia Tech - Advanced Research Institute (VT-ARI) has developed a software platform for building energy management that is capable of discovering limited types of BACnet and Modbus devices without DNP3 support. Leveraging this existing work, the mapping tool being developed will enable the discovery of all BACnet, ModBus and DNP3 devices

5 velty of Our Approach TCP/IP Network The mapping tool is capable of: Controller discovering all BACnet, Modbus and DNP3 devices in a network providing early warnings of cyber attacks on a building network, the U.S. power grid and its dependent systems. 3. Party System DNP3 Gateway Mapping Tool Modbus Gateway 3. Party System BACnet Gateway This is beyond commercially available products available in the market. DNP3 Devices Modbus Devices BACnet Devices Serial-RS485 Network 5 Data Flow Communication Link

6 Technical Approach Device Discovery Approach The mapping tool seeks to see through IP gateways, i.e., BACnet, Modbus and DNP3, to discover protocol adhered slave devices, by using the protocols indigenous to those networks. Device types for the mapping tool Discoverable devices Known devices Unknown devices Discovery & Monitoring Mapping Tool TCP/IP Network BACnet Gateway Modbus Gateway DNP3 Gateway Discoverable Known Unknown Discoverable Known Unknown Discoverable Known Unknown Serial RS-485 Network

7 Project Progress Improved the source code to discover DNP3/Modbus devices -Added group 0 support to opendnp3 stack -Incorporated comprehensive Modbus slave scan along with Device Identification Developed a User Interface (UI) for users and operators -User Login Page -Dashboard Page -Discover Page -Approval Page -Approved Device Page -Inspect Device Page -Device Status Page -Manage User Page Extended the lab setup -Added new Modbus devices -Added new DNP3 devices

8 User Interface Discover Page

9 Potential Benefits and Contributions Provide a platform, that supports the discovery of all BACnet, Modbus and DNP3 devices and detects unknown devices in a network. The mapping tool being developed can be used to detect and provide early warnings of cyber attacks on a building network, the U.S. power grid and its dependent systems. Serve as a test-bed that allows testing of security claims and other security related testing evaluation. The tool being developed can be used to discover devices supporting other protocols, such as KNX, Lonworks as well as wireless protocols including WiFi and ZigBee. 9

10 Extended Lab Setup Modbus Devices BACnet Devices DNP3 Device Modbus Gateway BACnet Gateway DNP3 Gateway DNP3 Device 10 Modbus Device

11 Deliverables and Affiliate Support Deliverables: A software mapping tool for discovering BACnet, Modbus and DNP3 devices The lab set-up consisting of BACnet, Modbus and DNP3 gateways/devices Final technical status discussions with DoD Field demonstration discussions with DoD S2ERC Final Report. Affiliate Support: Department of Defense (DoD) provides technical advising 11

12 12 Murat Kuzlu

13 Technical Approach Flowcharts of BACnet, Modbus and DNP3 device discovery process Initiate discovery process Initiate discovery process Initiate discovery process Broadcast Collect MAC address of responded devices and Query for device model and vendor Check if received response is valid response Yes Display vendor name and model name End of discovery process Initiates BACnet discovery API Broadcasts Who-Is request Received I-am Yes response Display unknown device discovered End of discovery process Display no devices found End of discovery process Scan Device Addresses Slave_id= Slave_id +1 Store Slave id count Count is number of unknown Modbus devices Send a Read Request with Slave_id, function code 43 and object id Received response Yes Response is not Illegal function Display Response Initiates Modbus discovery API with Slave_id = 1 on port 502 Yes Slave_id <=254 Queried over all the range ids End of discovery process Scan Device Addresses Slave_id= Slave_id +1 Store Slave id count Count is number of unknown DNP3 devices Yes Send a standard DNP3 application layer request with slave_id, group 0 Received response Yes Response has IIN exception Display Response Yes Initiate discovery API with slave_id 1 and port Slave_id <=65536 Queried over all range ids End of discovery process

14 User Interface Discover Page The Discover page provides 2 types of scanning viz., scanning for known devices and a generic scan. Known devices can be added into the database. Multiple known devices can be searched simultaneously. Generic discovery has a privilege to select a port on which the scan is to be established. When no port number is plugged in, a default port scan is performed. Again these default ports can be configured on the settings page.

Mapping Industrial Control Systems

Mapping Industrial Control Systems Mapping Industrial Control Systems S2ERC Showcase, Pensacola, FL Murat Kuzlu 1, PhD., T. Charles Clancy 2, PhD., Kevin Heaslip 2, PhD., Saifur Rahman 1, PhD., Aditya Nugur 1 Virginia Tech - Advanced Research

More information

Virginia Tech Research Center Arlington, Virginia, USA

Virginia Tech Research Center Arlington, Virginia, USA SMART BUILDINGS AS BUILDING BLOCKS OF A SMART CITY Professor Saifur Rahman Virginia Tech Advanced Research Institute Electrical & Computer Engg Department University of Sarajevo Bosnia, 06 October, 2016

More information

Virginia Tech Research Center

Virginia Tech Research Center 12/4/15 Building Energy Management Open-Source Software (BEMOSS) HVAC Controllers Lighting circuit(s) Lighting Controllers Plug load Controllers Presentation to IEEE PES NoVA/DC chapter June 24, 2015 Saifur

More information

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited Arm Mbed Edge Shiv Ramamurthi Arm Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming and connected sites Increased

More information

CyberFence Protection for DNP3

CyberFence Protection for DNP3 CyberFence Protection for DNP3 August 2015 Ultra Electronics, 3eTI 2015 DNP3 Issues and Vulnerabilities DNP3 is one of the most widely used communications protocols within the utility space for the purpose

More information

Deep Instinct v2.1 Extension for QRadar

Deep Instinct v2.1 Extension for QRadar Deep Instinct v2.1 Extension for QRadar This scalable joint solution enables the seamless ingestion of Deep Instinct events into IBM QRadar platform, this results in higher visibility of security breaches

More information

Trends for Smart Grid Automation and Industry 4.0 Integration. presented by Detlef Raddatz Managing Director SystemCORP Embedded Technology

Trends for Smart Grid Automation and Industry 4.0 Integration. presented by Detlef Raddatz Managing Director SystemCORP Embedded Technology Trends for Smart Grid Automation and Industry 4.0 Integration presented by Detlef Raddatz Managing Director SystemCORP Embedded Technology Agenda Introduction Short History of Utility Communication Utility

More information

Arm Mbed Edge. Nick Zhou Senior Technical Account Manager. Arm Tech Symposia Arm Limited

Arm Mbed Edge. Nick Zhou Senior Technical Account Manager. Arm Tech Symposia Arm Limited Arm Mbed Edge Nick Zhou Senior Technical Account Manager Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming

More information

Standards and Test Procedures for Interconnection and Interoperability (GMLC 1.4.1)

Standards and Test Procedures for Interconnection and Interoperability (GMLC 1.4.1) Standards and Test Procedures for Interconnection and Interoperability (GMLC 1.4.1) DAVID NARANG, NREL April 18-20 Sheraton Pentagon City Arlington, VA Insert Technical Team Area 5/11/2017 1 High Level

More information

EKI-6332 & EKI-136x- MB_setup example SOP. Revision Date Revision Description Author April/2018 V1.0 Initial release ICG AE Jacky.

EKI-6332 & EKI-136x- MB_setup example SOP. Revision Date Revision Description Author April/2018 V1.0 Initial release ICG AE Jacky. EKI-6332 & EKI-136x- MB_setup example SOP Revision Date Revision Description Author April/2018 V1.0 Initial release ICG AE Jacky.Lin 1 Abstract This SOP explains how to configure the EKI-6332 & EKI-136x-MB

More information

RBS OpenEMR Multisite Setup Improper Access Restriction Remote Code Execution of 5

RBS OpenEMR Multisite Setup Improper Access Restriction Remote Code Execution of 5 RBS-2017-001 OpenEMR Multisite Setup Improper Access Restriction Remote Code Execution 2018-03-22 1 of 5 Vendor / Product Information OpenEMR is a Free and Open Source electronic health records and medical

More information

Industrial Ethernet August 2013 Market Intelligence Report

Industrial Ethernet August 2013 Market Intelligence Report www.industrialnetworking.net Industrial Ethernet August 2013 Market Intelligence Report Industrial Ethernet August 2013 Market Intelligence Report Executive Summary An electronic survey of Industrial Networking

More information

Putting the 20 Critical Controls into Action: Real World Use Cases. Lawrence Wilson, UMass, CSO Wolfgang Kandek, Qualys, CTO

Putting the 20 Critical Controls into Action: Real World Use Cases. Lawrence Wilson, UMass, CSO Wolfgang Kandek, Qualys, CTO Putting the 20 Critical Controls into Action: Real World Use Cases Lawrence Wilson, UMass, CSO Wolfgang Kandek, Qualys, CTO Critical Controls Summit, DC August 12, 2013 Agenda Security Program at UMass

More information

Automated Attack Framework for Test & Evaluation (AAFT)

Automated Attack Framework for Test & Evaluation (AAFT) Automated Attack Framework for Test & Evaluation (AAFT) 34 th International Test and Evaluation Association Symposium October 4, 2017 Mr. Andrew Shaffer The Applied Research Laboratory The Pennsylvania

More information

Application Note: Crestron System Integration

Application Note: Crestron System Integration Application Note: Crestron System Integration This application note describes how to integrate a Crestron system with North. Please read the DataSync Driver Manual, and Commander Manual or ObSys Manual

More information

Detection and Analysis of Threats to the Energy Sector (DATES)

Detection and Analysis of Threats to the Energy Sector (DATES) Detection and Analysis of Threats to the Energy Sector (DATES) Sponsored by the Department of Energy National SCADA Test Bed Program Managed by the National Energy Technology Laboratory The views herein

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

Risk Assessments, Continuous Monitoring & Intrusion Detection, Incident Response

Risk Assessments, Continuous Monitoring & Intrusion Detection, Incident Response Risk Assessments, Continuous Monitoring & Intrusion Detection, Incident Response Michael Chipley, PhD PMP LEED AP President January 6, 2014 mchipley@pmcgroup.biz 1 Risk Assessments Multiple Standards and

More information

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry

More information

Introducing. and the. An introduction to the most advanced web-enabled open controls technology available today. Phil Barnett- Tridium Europe Ltd

Introducing. and the. An introduction to the most advanced web-enabled open controls technology available today. Phil Barnett- Tridium Europe Ltd Introducing and the An introduction to the most advanced web-enabled open controls technology available today Phil Barnett- Tridium Europe Ltd Company Facts Niagara Framework launched in 1998 US Company

More information

LGATE-950: Universal Gateway

LGATE-950: Universal Gateway LGATE-950: Universal Gateway LGATE-950 allows a smooth integration between LonMark Systems, BACnet networks, KNX networks, Modbus devices, M-Bus devices as well as ZigBee PRO wireless devices. Network

More information

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts SAP Cybersecurity Solution Brief Objectives Solution Benefits Quick Facts Secure your SAP landscapes from cyber attack Identify and remove cyber risks in SAP landscapes Perform gap analysis against compliance

More information

Secure wired and wireless networks with smart access control

Secure wired and wireless networks with smart access control Secure wired and wireless networks with smart access control Muhammad AbuGhalioun Senior Presales Consultant Hewlett-Packard Enterprise Aruba Saudi Arabia Managing risk in today s digital enterprise Increasingly

More information

CS-MARS Integration for Cisco Unified Wireless

CS-MARS Integration for Cisco Unified Wireless 9 CHAPTER A secure unified network, featuring both wired and wireless access, requires an integrated, defense-in-depth approach to security, including cross-network anomaly detection and correlation that

More information

A Passage to Penetration Testing!

A Passage to Penetration Testing! A Passage to Penetration Testing! EC-Council Cyber Research This paper is from EC-Council s site. Reposting is not permitted without express written permission. What Is Penetration Testing? A penetration

More information

Setting up VT Wireless connection Mac OSX

Setting up VT Wireless connection Mac OSX Setting up VT Wireless connection Mac OSX 1. Click on the wireless icon in the upper right hand cornet of the status menu and select CONNECTtoVT- Wireless from the available wireless networks. 2. Open

More information

Identity-Based Cyber Defense. March 2017

Identity-Based Cyber Defense. March 2017 Identity-Based Cyber Defense March 2017 Attackers Continue to Have Success Current security products are necessary but not sufficient Assumption is you are or will be breached Focus on monitoring, detecting

More information

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE Technical Note GLOBAL RESPONSE CENTRE INTRODUCTION IMPACT s Global Response (GRC) acts as the foremost cyber threat resource centre for the global. It provides emergency response to facilitate identification

More information

Reference Design for Residential Energy Gateways

Reference Design for Residential Energy Gateways Reference Design for Residential Energy Gateways Enabling Technologies Development Workshop 1 Presentation Outline Introduction Gateway Overview Reference Design Objectives Reference Design Specifics Future

More information

Introduction to ICS Security

Introduction to ICS Security Introduction to ICS Security Design. Build. Protect. Presented by Jack D. Oden, June 1, 2018 ISSA Mid-Atlantic Information Security Conference, Rockville, MD Copyright 2018 Parsons Federal 2018 Critical

More information

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Industrial Defender ASM. for Automation Systems Management

Industrial Defender ASM. for Automation Systems Management Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping

More information

CONFIGURATION SOFTWARE

CONFIGURATION SOFTWARE MODBUS GATEWAY CONFIGURATION SOFTWARE MBS100E/G/W MODBUS GATEWAY 01 / 2018 MIKRODEV_SM_MBS100_CG_EN CONTENTS 1 MODBUS GATEWAY CONFIGURATION SOFTWARE... 6 1.1 General Information... 6 1.2 Device Connection...

More information

Behavior is the new authentication

Behavior is the new authentication Behavior is the new authentication Tibor Magyar PreSales Engineer Blue Bridge Cyber Security Hub 2017 20 April 2017 Vilnius Classic Defense Does Not Work Anymore Too Many Identities Gartner Security &

More information

CAS Modbus TCP Data Client

CAS Modbus TCP Data Client Toll Free: 1 866 383-1657 3381 Cambie St., #211 Vancouver, BC Canada V5Z 4R3 March 16, 2018 CAS-2500-02 CAS Modbus TCP Data Client PRODUCT DESCRIPTION Chipkin Modbus TCP Data Client is a device that connects

More information

Application Note: Using Modbus With the Conext CL Series. Important Safety Instructions

Application Note: Using Modbus With the Conext CL Series. Important Safety Instructions : Using Modbus With the Conext CL Series 976-0317-01-01 Rev A Important Safety Instructions READ AND SAVE THESE INSTRUCTIONS - DO NOT DISCARD This document contains important safety instructions that must

More information

A Better Space Mission Systems threat assessment by leveraging the National Cyber Range

A Better Space Mission Systems threat assessment by leveraging the National Cyber Range A Better Space Mission Systems threat assessment by leveraging the National Cyber Range Chuck Allen (CISSP) & Jonathon Doubleday CORD Presented to GSAW, Feb-March 2018 2018 The Aerospace Corporation Abstract

More information

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric

More information

Commercial Product Matrix

Commercial Product Matrix PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer

More information

Securing the Modern Data Center with Trend Micro Deep Security

Securing the Modern Data Center with Trend Micro Deep Security Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public

More information

Migrating from Legacy Control Systems. Jared Schnaidt US South Central Sales Manager

Migrating from Legacy Control Systems. Jared Schnaidt US South Central Sales Manager Migrating from Legacy Control Systems Jared Schnaidt US South Central Sales Manager jschnaidt@prosoft-technology.com What We ll Cover Why Upgrading is Important Migration Options Challenges ProSoft Remote

More information

MIMOSA. PMA-209 Industry Day and FACE Exhibition/TIM Event. October 17, Mr. Matthew Baxter

MIMOSA. PMA-209 Industry Day and FACE Exhibition/TIM Event. October 17, Mr. Matthew Baxter MIMOSA PMA-209 Industry Day and FACE Exhibition/TIM Event October 17, 2017 Mr. Matthew Baxter Research Engineer I Georgia Tech Research Institute ELSYS ESID OSSB WARNING - This document contains technical

More information

for M-Bus, Modbus and 1-Wire devices

for M-Bus, Modbus and 1-Wire devices Kara Systems Kara BACnet Gateway V2.2 for M-Bus, Modbus and 1-Wire devices The Kara BACnet Gateway integrates M-Bus(EN-1434-3) Modbus and 1-Wire devices to a BACnet Infrastructure Network. It is a three

More information

Lab - Configure a NIC to Use DHCP in Windows

Lab - Configure a NIC to Use DHCP in Windows Introduction In this lab, you will configure an Ethernet NIC to use DHCP to obtain an IP address and test connectivity between two computers. Recommended Equipment Wireless router Two computers running

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

IEEE and DER Interconnection: US-Africa Clean Energy Standards Program

IEEE and DER Interconnection: US-Africa Clean Energy Standards Program IEEE 2030.5 and DER Interconnection: US-Africa Clean Energy Standards Program Robby Simpson, PhD Member, IEEE-SA Board of Governors Vice Chair, IEEE P2030.5 System Architect, GE Grid Solutions 1 Introduction

More information

Leveraging Building Automation Systems to support ongoing commissioning

Leveraging Building Automation Systems to support ongoing commissioning Leveraging Building Automation Systems to support ongoing commissioning Building Automation Systems Introduction Show me the money Critical components Building Automation System Architectures Protocols

More information

NAFEM Data Protocol Version 3.0 Application Note

NAFEM Data Protocol Version 3.0 Application Note NAFEM Data Protocol Version 3.0 Application Note 1.0 Introduction The on-line kitchen is designed to make today s foodservice facilities easier and simpler to operate by automating the management processes

More information

Port Mirroring in CounterACT. CounterACT Technical Note

Port Mirroring in CounterACT. CounterACT Technical Note Table of Contents About Port Mirroring and the Packet Engine... 3 Information Based on Specific Protocols... 4 ARP... 4 DHCP... 5 HTTP... 6 NetBIOS... 7 TCP/UDP... 7 Endpoint Lifecycle... 8 Active Endpoint

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

BREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS

BREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS BREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS Security Thomas Skybakmoen, Jason Pappalexis Tested Products AhnLab MDS Fidelis XPS Direct 1000 FireEye Web MPS 4310 and Email MPS 5300 Fortinet FortiSandbox

More information

Chapter 1 Getting Started with Switch Management

Chapter 1 Getting Started with Switch Management Chapter 1 Getting Started with Switch Management This section provides an overview of switch management, including the methods you can choose to start managing your NETGEAR GS700TS Gigabit Stackable Smart

More information

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network? Cybersecurity Due Diligence Checklist Control # Control Name Risks Questions for IT 1 Make an Benign Case: Employees Inventory of using unapproved Authorized devices without Devices appropriate security

More information

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling

More information

IEEE A Perspective on Product Design

IEEE A Perspective on Product Design IEEE 1711-2010 A Perspective on Product Design Tien Van Tracy Amaio, Ph.D. tvan@sequi.com teamaio@sequi.com INDUSTRIAL CONTROL SYSTEMS (ICS) Characteristics: Long operational life (10+ yrs) Small to large

More information

WhatsUp Gold 2016 Application Performance Monitoring

WhatsUp Gold 2016 Application Performance Monitoring WhatsUp Gold 2016 Application Performance Monitoring Contents Introduction 1 Overview... 1 APM Terminology... 2 APM licensing and user rights... 3 Getting started with APM... 3 Application Profiles...

More information

Understand iwag Solution for 3G Mobile Data

Understand iwag Solution for 3G Mobile Data Understand iwag Solution for 3G Mobile Data Contents Introduction Prerequisites Requirements Components Used Background Information Acronyms Explanation of Terminology Used Understand Mobility Services

More information

Automating the Top 20 CIS Critical Security Controls

Automating the Top 20 CIS Critical Security Controls 20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises

More information

How-To Threat Centric NAC Cisco AMP for Endpoints in Cloud and Cisco Identity Service Engine (ISE) Integration using STIX Technology

How-To Threat Centric NAC Cisco AMP for Endpoints in Cloud and Cisco Identity Service Engine (ISE) Integration using STIX Technology How-To Threat Centric NAC Cisco AMP for Endpoints in Cloud and Cisco Identity Service Engine (ISE) Integration using STIX Technology Author: John Eppich Table of Contents About this Document... 3 Introduction

More information

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab

More information

Certified Tester Foundation Level Performance Testing Sample Exam Questions

Certified Tester Foundation Level Performance Testing Sample Exam Questions International Software Testing Qualifications Board Certified Tester Foundation Level Performance Testing Sample Exam Questions Version 2018 Provided by American Software Testing Qualifications Board and

More information

BEMOSS: An Agent Platform to FacilitateGrid- Interactive Building Operation with IoT Devices

BEMOSS: An Agent Platform to FacilitateGrid- Interactive Building Operation with IoT Devices 1 BEMOSS: An Agent Platform to FacilitateGrid- Interactive Building Operation with IoT Devices M.Pipattanasomporn, M. Kuzlu,W. Khamphanchai, A. Saha, K. Rathinavel and S. Rahman Virginia Tech Advanced

More information

Forecast to Industry 2016

Forecast to Industry 2016 Forecast to Industry 2016 Cyber Portfolio COL Brian Lyttle Program Executive Officer, Cyber 17 November 2016 UNCLASSIFIED 1 Our Mission Develop, integrate, and assure cyber capabilities in order to enable

More information

VeederRoot to BACnet IP and Modbus (RTU and TCP) and HTML Gateway

VeederRoot to BACnet IP and Modbus (RTU and TCP) and HTML Gateway Toll Free: 1 866 383-1657 3381 Cambie St., #211 Vancouver, BC Canada V5Z 4R3 February 09, 2018 CAS-2700-02 VeederRoot to BACnet IP and Modbus (RTU and TCP) and HTML Gateway PRODUCT DESCRIPTION Chipkin

More information

Omar Alrawi. Security Evaluation of Home-based IoT Deployments

Omar Alrawi. Security Evaluation of Home-based IoT Deployments Omar Alrawi Security Evaluation of Home-based IoT Deployments About Us Astrolavos Research Lab at Georgia Tech We specialize in Network Security Measurements Work is presented on behalf of my team Omar

More information

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET Managing Cybersecurity Risk

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET Managing Cybersecurity Risk U.S. FLEET CYBER COMMAND U.S. TENTH FLEET Managing Cybersecurity Risk Neal Miller, Navy Authorizing Official December 13, 2016 UNCLASSIFIED 1 Some Inconvenient Truths The bad guys and gals still only work

More information

Think Like an Attacker

Think Like an Attacker Think Like an Attacker Using Attack Intelligence to Ensure the Security of Critical Business Assets Current State of Information Security Focused on detection and response Desire to reduce detection to

More information

Title: Can I use Ethernet to read and write values to my HMI?

Title: Can I use Ethernet to read and write values to my HMI? Title: Can I use Ethernet to read and write values to my HMI? Article Number: TN1084 Date: 1/23/04 Information in this article applies to: HMI500 Series & EZware-500 HMI Product(s) HMI500 Series Controller

More information

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX 1 INTRODUCTION The MITRE Corporation Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK ) Matrix provides a model

More information

Improving SCADA System Security

Improving SCADA System Security Improving SCADA System Security NPCC 2004 General Meeting Robert W. Hoffman Manager, Cyber Security Research Department Infrastructure Assurance and Defense Systems National Security Division, INEEL September

More information

GPS OCX BLOCK 1 NETCENTRIC INTERFACES. Walid Al-Masyabi Raytheon Company, Intelligence, Information and Services,

GPS OCX BLOCK 1 NETCENTRIC INTERFACES. Walid Al-Masyabi Raytheon Company, Intelligence, Information and Services, GPS OCX BLOCK 1 NETCENTRIC INTERFACES Walid Al-Masyabi Raytheon Company, Intelligence, Information and Services, Chuck Corwin, Sarah Law, Stephen Moran, Michael Worden Raytheon Company, Intelligence, Information

More information

PG AC Modbus TCP to LonWorks Protocol Converter

PG AC Modbus TCP to LonWorks Protocol Converter PG-101-105-AC Modbus TCP to LonWorks Protocol Converter PG-101-105-AC is highly powerful, superior, completely configurable and productive Building & Industrial Automation gateway for integrators to effortlessly

More information

Configuring Vulnerability Assessment Devices

Configuring Vulnerability Assessment Devices CHAPTER 10 Revised: November 10, 2007 Vulnerability assessment (VA) devices provide MARS with valuable information about many of the possible targets of attacks and threats. They provide information useful

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

Defense in Depth Security in the Enterprise

Defense in Depth Security in the Enterprise Defense in Depth Security in the Enterprise Mike Mulville SAIC Cyber Chief Technology Officer MulvilleM@saic.com Agenda The enterprise challenge - threat; vectors; and risk Traditional data protection

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Johns Hopkins

Johns Hopkins Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows XP, Mac OS X, and Linux can be found at: http://www.it.johnshopkins.edu/services/networking/wireless/

More information

TAC5 + MODBUS TCP/IP

TAC5 + MODBUS TCP/IP TAC5 + MODBUS TCP/IP TAC5 + MODBUS TCP/IP Installation and user s manual TABLE OF CONTENTS 1 Overview... 5 1.1 Scope... 5 1.2 Plugging the satellite module... 5 1.3 Connections of the SATELLITE MODULES...

More information

A Unifying Standard for Interfacing Transducers to Networks IEEE

A Unifying Standard for Interfacing Transducers to Networks IEEE A Unifying Standard for Interfacing Transducers to Networks IEEE-1451.0 James Wiczer, Ph.D. President Smart Sensor Interface Research and Development Group Sensor Synergy, Inc. 1110 W. Lake Cook Rd. Suite

More information

MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1a CONTENTS

MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1a CONTENTS MODBUS APPLICATION PROTOCOL SPECIFICATION V11a CONTENTS 1 Introduction 2 11 Scope of this document 2 2 Abbreviations 2 3 Context 3 4 General description 3 41 Protocol description 3 42 Data Encoding 6 43

More information

Hubbell Building Automation #LXBASM. ProtoNode LER Startup Guide

Hubbell Building Automation #LXBASM. ProtoNode LER Startup Guide Hubbell Building Automation #LXBASM ProtoNode LER Startup Guide For Interfacing Customer Product: Hubbell Automation LX Lighting Control Panels To Building Automation Systems: BACnet MS/TP, BACnet/IP,

More information

Kaspersky Open Space Security

Kaspersky Open Space Security Kaspersky Open Space Security Flexible security for networks and remote users Kaspersky Open Space Security Kaspersky Open Space Security offers new flexibility to network security by extending beyond

More information

HIPAA Regulatory Compliance

HIPAA Regulatory Compliance Secure Access Solutions & HIPAA Regulatory Compliance Privacy in the Healthcare Industry Privacy has always been a high priority in the health profession. However, since the implementation of the Health

More information

Protecting Smart Buildings

Protecting Smart Buildings Protecting Smart Buildings The next frontier of critical infrastructure security Suzanne Rijnbergen - MBA visibility detection control Who am I? Global Director Professional Services @SecurityMatters (ForeScout)

More information

Agenda 05/21/

Agenda 05/21/ DNP3 Protocol AGA/GTI SCADA Security Meeting August 19, 2002 / Washington, DC Presented By: Mr. Jim Coats, President Triangle MicroWorks, Inc. Raleigh, North Carolina www.trianglemicroworks.com 05/21/97

More information

The Keys to Monitoring Internal Web Applications

The Keys to Monitoring Internal Web Applications WHITEPAPER The Keys to Monitoring Internal Web Applications Much of the focus on applications today revolves around SaaS apps delivered from the cloud. However, many large enterprises are also required

More information

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission

More information

Chapter 5: Vulnerability Analysis

Chapter 5: Vulnerability Analysis Chapter 5: Vulnerability Analysis Technology Brief Vulnerability analysis is a part of the scanning phase. In the Hacking cycle, vulnerability analysis is a major and important part. In this chapter, we

More information

PilieroMazza Webinar Preparing for NIST SP December 14, 2017

PilieroMazza Webinar Preparing for NIST SP December 14, 2017 PilieroMazza Webinar Preparing for NIST SP 800-171 December 14, 2017 Presented by Jon Williams, Partner jwilliams@pilieromazza.com (202) 857-1000 Kimi Murakami, Counsel kmurakami@pilieromazza.com (202)

More information

Information Warfare Industry Day

Information Warfare Industry Day Information Warfare Industry Day 20180510 RDML Barrett, OPNAV N2N6G TRANSPORT COMMERCIAL INTERNET DISN SCI Coalition Networks ADNS TELEPORT NMCI & ONE-NET JRSS MOC GNOC NCDOC USMC ISNS / CANES / SUBLAN

More information

AirMagnet Enterprise Version 6.1. Release Notes. January 24, 2006

AirMagnet Enterprise Version 6.1. Release Notes. January 24, 2006 AirMagnet Enterprise Version 6.1 Table of Contents: Introduction, page 1 Special Notes, page 1 Warning, page 2 New Features, page 2 Known Issues, page 5 Release Notes Technical Support, page 7 Release

More information

Communication Pattern Anomaly Detection in Process Control Systems

Communication Pattern Anomaly Detection in Process Control Systems Communication Pattern Anomaly Detection in Process Control Systems Sponsored by the Department of Energy National SCADA Test Bed Program Managed by the National Energy Technology Laboratory The views herein

More information

Securing Your Amazon Web Services Virtual Networks

Securing Your Amazon Web Services Virtual Networks Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,

More information

Call for Participation in AIP-6

Call for Participation in AIP-6 Call for Participation in AIP-6 GEOSS Architecture Implementation Pilot (AIP) Issue Date of CFP: 9 February 2013 Due Date for CFP Responses: 15 March 2013 Introduction GEOSS Architecture Implementation

More information

The system has several front-end content discovery options. Here are examples of their interfaces (see more on our site at

The system has several front-end content discovery options. Here are examples of their interfaces (see more on our site at November, 2014 1 TrenDemon is a content marketing platform which helps boost conversions from your existing traffic and content using personalized recommendations and call to actions. The system has several

More information

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017 Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication

More information

Vulnerability Disclosure

Vulnerability Disclosure Vulnerability Disclosure Rita Wells National SCADA Test Bed DoE-OE September 09, 2008 Department of Energy-Office of Electricity Delivery and Energy Reliability: National SCADA Test Bed Program Mission

More information

Smart Buildings as Cyber- Physical Systems (CPS) In Smart Cities: Living Building

Smart Buildings as Cyber- Physical Systems (CPS) In Smart Cities: Living Building Smart Buildings as Cyber- Physical Systems (CPS) In Smart Cities: Living Building Dr. Driss Benhaddou Associate Professor and Fulbright Scholar University of Houston, TX dbenhaddou@uh.edu Tuesday, 01/05/2016

More information

Indegy. Industrial Cyber Security. The Anatomy of an Industrial Cyber Attack

Indegy. Industrial Cyber Security. The Anatomy of an Industrial Cyber Attack Indegy Industrial Cyber Security The Anatomy of an Industrial Cyber Attack Today s Presenter Eliminating Security Blindspots in SCADA and Control Networks Presented By: Dana Tamir, VP Marketing, Indegy

More information