May SCADA Testbed Cyber-Security Evaluation. Iowa State University. Advisor: Members: Manimaran Govindarasu
|
|
- Andrea Tyler
- 5 years ago
- Views:
Transcription
1 Iowa State University SCADA Testbed Cyber-Security Evaluation Members: Justin Fitzpatrick Rafi Adnan Michael Higdon Ben Kregel Advisor: Manimaran Govindarasu May 1013
2 Project Overview Problem/Need statement Since the early 90 s, experts have become more and more concerned about the threat of cyber attacks on the supervisory control and data acquisition (SCADA) systems used to monitor and manage infrastructure systems. Most SCADA system designs from the past never anticipated the security threats which exist today. SCADA systems are designed to provide an efficient solution to monitoring, regulation and control of various utilities. These systems compose a significant portion of the nation s infrastructure and they are a potential target of attack for this reason. With many of the SCADA systems being significantly dated, security was little concern prior to today s internet age. For this reason most control systems are open to attack from the outside. Design and implementation of SCADA test beds for use in security evaluation, testing and simulations is necessary to guarantee the safety of our critical infrastructure and utilities. A SCADA network consists of three major components and levels of abstraction. A control center and all the resources contained within is used to process data required to operate field devices. Field devices do not make decisions. They merely report data to the control centers via communication methods and receive instructionss based on the parameters of control software. Control Center RTU Relays The high level diagram pictured below is an illustration of how the hierarchy of the SCADA network is configured. Each element serves a specific purpose. Objective Critical infrastructure systems, such as electric power grid and water distribution systems, use SCADA (Supervisory Control and Data Acquisition) system for varieties of sensing, decision making, and control associated with real-time operation of the infrastructure systems. Cyber security of SCADA and hence critical infrastructure systems is a timely R&D challenge due to growing concerns for cyber attacks. The ECpE department at ISU has acquired SCADA system with necessary security software/hardware to setup a SCADA-Security Testbed. The testbed will be used to conduct attack-defenstheir potential impacts on the performancee and stability of the power system. The basic version of the testbed is already exercises to study the various vulnerabilities of SCADA systems and running. The goal of the project is to integrate real-time power system simulation capabilities into the SCADA testbed, and conduct cyber attack-defense evaluations on the integrated system.
3 Hierarchy of our project/system In a high-level sense, the objective was broken into several different, smaller projects. Due to the large scale of the final goal, keeping a focus on many of the smaller, individual pieces of the project proved to be of benefit to the group. Viewing each task or smaller project as an experiment, the group was able to tackle each problem individually. Taking a close look at each particular element of the project allowed the group to organize our time, efforts and other resources in an efficient manner. Accomplishing one experiment at a time, the group was able to build upon a solid foundation. Experiments (Stages) Experiment 1 System Familiarization The following are all pieces which lead to the overall operation and understating of the SCADA test bed. Siemens PowerTG Modes and Launch The following control panel can be used to specify the different modes and operation for the Siemens software. Initially, this host mode panel can be launched by double-clicking the PowerTG icon seen in the taskbar. The logo icon displayed in the taskbar is representative of the mode in which the system database is operating. In illustration below, the database is running in primary mode. Alternate modes of operation would be DTS or Stop for example. Selecting the Start Workstation button will launch the PowerTG workstation interface. Siemens Power TG Operations Index This can be regarded as the Intro or Home screen for the use of a Siemens PowerTG workstation. Upon logging in, this screen seen below will be the first presented to the user. It may be returned to at any point in time.
4 This operations index panel is the heart of an operational SCADA system. It allows the user to configure and monitor all aspects of the system. The page is useful for a system engineer to set alarms, view historical data and view live system statistics. Alarms can be set to warn the user in case of certain circumstances. In the case of over-currents, voltage derivations, outages and faults, alarms can be displayed to the user. These indications represent live data in the field, which may be undesired activity. Trending can be used to monitor the performance or characteristics of the system with respect to time. Graphs, plots and statistics can be used to give the user a visual and quantitative representation of the activity going on elsewhere on the power grid. For example, one might find a graph to display increasing current trends on a warm summer day. System Maintenance Index Following a similar pattern to that of the Operations Index, the System Maintenance Index is used to establish changes to the configuration of the system. A system engineer can use this panel to monitor a greater portion of the system devices and functionality.
5 Local settings such as the display board, console and printer can be found in the Equipment column. These parameters simply change preferences for the user. DNP Server As part of understanding our Test bed, we have to look into the communication protocols used by the different systems. One of which is the Distributed Network Protocol (DNP). Its primary use is in communication between the master station and the rest of the remote terminal units (RTUs), intelligent electronic devices (IEDs) etc. Among other things, DNP provides multiplexing, data fragmentation, error checking, link control and prioritization. These properties help create a more robust and reliable network connection between all the devices. Setting up the DNP server in SICAM Since this is a very important aspect of the SCADA system, proper understanding of it is quite crucial. Fortunately its application, for our part, is quite simple and entails setting up the server at each of the substation computers and making sure the master station can communicate the substation DNP server and poll for data from the RTUs. This is done with the help of the SICAM software and making sure the SCALANCE devices are working properly. By the end, upon reading our guide a user will be able to easily set up a DNP server and get a network up and running between the workstations and the RTUs. The DNP server is up and running
6 Databases The PowerTG Source Database (SDB) is an integral part of the PowerTG software. It contains definitions for everything from network information to host system configurations. Setting up stations in the SDB client The database is manipulated using the SDB client and all the information is stored in the SDB server. A basic setup of PowerTG requires the following information to be set up: Define all the stations Define RTUs at each station Define the network over which the system communicates Define individual computers that make up the system Define PowerTG host systems Define HMI consoles Define RTU communication servers After setting up these basic elements, you have to perform a database installation to transfer this information to the PowerTG real time database.
7 Setting up an RTU in the SDB client Our guides will contain a detailed yet brief look into carrying out all these steps including setting up communication lines, creating substations, defining RTU status/control points etc. After going through our guide the user will be able to set up their own complete system and carry out their own set of experiments on the SCADA test bed. The guide will contain an index of glossary, step by step configuration of each element with pictures and diagrams to help out at each step. The guides will be modularized enough so that any individual component will be able to stand on its own and yet be relevant to the rest of the system. Installing the information to the real time database
8 Experiment 2 At this stage of our project, we hope to have a basic and initial set up of our test bed. This would include all the RTUs, substations and master stations working properly and have them all interconnected using simple TCP/IP without any sort of firewall or security devices. This is to ensure at minimum reliable and proper test bed operations allowing us to conduct our later experiments which will include higher level security and attack/defense exercises Host 1 Host 2 WWW Relay 1 Relay Sicam 2 Sicam Topology of a basic networked SCADA system Topology The figure above shows a simple topology of the system. Each host, substation and remote terminal units will be connected to the internet and will be able to communicate with each other and as well as with devices from outside, which is a bad thing. After setting them up we can perform simple tests, such as closing and tripping circuits at the RTUs using the host systems and collecting analog data from them as well.
9 Closing a circuit breaker on a relay We believe with a proper and thorough understanding of the system from Experiment 1 will allow users to easily and quickly set up this system and move on to the next Experiments in our design process. Overview of the RTUCS, comm lines and RTUs Deliverables Deliverables for this stage will contain guides on how to accomplish the following tasks: Initial network hardware setup o Host systems o Database management o Substation and RTU configuration o Switches, Ethernet etc.
10 Internetwork communication o PowerTG to substation and back o Substations to RTUs and back Testing In addition to the previous, our guide will also contain a section on how to troubleshoot and test the final system. This will include simple exercises on how to connect to the DNP server and trip specific RTU led units. Experiment 3 Security Devices The SCALANCE devices are designed to protect individual devices or even entire automation cells from data espionage, data manipulation and unauthorized access. Security features available to us Firewall o IP firewall with stateful packet inspection o Bandwidth limitation Communication made secure by IPsec tunnels o SCALENCE devices are configured to form groups These groups can communicate securely with each other through these tunnels. Can also use SOFTNET Security Client to use establish secure IPsec tunnel communication in the VPN (Virtual Private Network). Protocol-independent o Both IP and non-ip frames are transmitted through the IPsec tunnel Router Mode o The SCALENCE device becomes a router that separates the internal network from the external network. The internal network becomes a separate subnet. Protection for devices and network segments o The firewall and VPN protective function can be applied to the operation of single devices, several devices, or entire network segments. No repercussions when included in flat networks o Just plug the SCALENCE device in and it will automatically find all the internal nodes, with no configuration required to nodes.
11 Our Current Setup - Tunneling Diagram Tunneling Please not that our groups project file for tunneling is located on the computer WORKSTATION in C:\Program Files\siemens\Security_Configuration_Tool\Projects\VPN\. Load this and transfer to all modules and you will have our current setup. ( see tunneling diagram) The following diagram shows what the SIEMENS Security Configuration Tool will show for our tunneling setup.
12 SCALANCE S (Tunneling) in productive operation The configuration is commissioned and the three SCALANCE S modules can now establish a communication tunnel over which network nodes from the two internal networks can communicate (green dashed line in diagram). No other communication can come from the outside network nor can anything in the tunnel talk to an external node outside the tunnel. You can only talk between SCALANCE devices. You can however set up IP address rules to allow other computers from the outside the network. Pretty much the same as just using the SCALANCE device as a firewall, except you do not have to set up all the IP address rules. SCALANCE Modules Tunneling Vulnerabilities The nice thing about the firewall is, only the rules set by the user are allowed through the SCALANCE devices. Substation 1 does not talk to Substation 2. This is good so that if one of the SCALANCE devices was compromised, it does not compromise both substations. This limits the amount of traffic between the certain SCALANCE devices as well and could improve performance All data being sent through the tunnel is encrypted even when going on the external network to get to the next SCALANCE device. Testing the tunnel function Testing phase 1 (All computers between each SCALANCE Module) 1. Enter the Ping command from Host 1( ) to SICAM 1 ( ) You will then receive the following message:
13 Result: You should see the Sent packets at 4 and the received packets at This means that since no other communication is permitted, these packets must have been transported through the VPN tunnel. 3. You can check all other nodes behind each SCALANCE device. Each node behind each SCALANCE device should be able to talk to the other nodes behind SCALANCE devices. Tunneling Test phase 2 (Computers outside the tunnel, on an external network) 1. Enter the Ping command from the outside computer to SICAM 1 ( ) You will then receive the following message: Result: You should see the Sent packets at 4 and the received packets at This means that the IP frames from the outside computer did not reach SICAM 1 since neither tunnel communication between these two devices is configured nor is normal IP data traffic permitted. A device inside the tunnel cannot talk to an outside computer not in the tunnel. Firewall In the firewall, IP traffic can only be initiated from the internal network; only the response is permitted from the external network. Please note that our groups project file for firewall is located on the computer WORKSTATION in C:\Program Files\siemens\Security_Configuration_Tool\Projects\firewall\. Load this and transfer to all modules and you will have our current setup. (see diagram)
14 Firewall setup diagram The following diagram shows what the SIEMENS Security Configuration Tool will show for our tunneling setup.
15 Configuring the firewall 1. The following are the rules needed for SUB1 to communicate to all other nodes necessary. 2. The following are the rules needed for SUB2 to communicate to all other nodes necessary. 3. The following are the rules needed for CONTROL to communicate to all other nodes necessary. SCALANCE S in productive operation The configuration has now been commissioned and the three SCALANCE S modules are now protecting the internal network with the firewall according to the configured rules. The rules are shown above and follow the diagram for who can communicate with who. Basically CONTROL SUB1 and CONTROL SUB2 Tunneling Vulnerabilities Since the SCALANCE devices are set up to tunnel Substation 1 can talk to Substation 2, which in a real world application, this would not be the case since there is no need for that.
16 This could cause vulnerabilities if somebody got into the tunnel because then it would compromise the whole network since the tunnel would let it talk to anybody inside the tunnel. o This can be fixed by creating 2 separate tunnels. 1 for CONTROL SUB1 and 1 for CONTROL SUB2 There is no way to encrypt the data being sent in this method. All data sent over the external network is not encrypted and could be sniffed if done correctly. Testing the firewall function Testing phase 1 (All computers between each SCALANCE Module) 1. Enter the Ping command from Host 1 to SICAM 1 (IP address ) You will then receive the following message: Result: You should see the Sent packets at 4 and the received packets at Due to the configuration, the ping packets can pass from the internal network to the external network. The PC in the external network has replied to the ping packets. Due to the "stateful inspection" function of the firewall, the reply packets arriving from the external network are automatically passed into the internal network. 3. This test will work for all IP rules set above. You can test each one. Test phase 2 (Computers outside the tunnel, on an external network) 1. Enter the Ping command from the outside computer to SICAM 1 ( ) You will then receive the following message: Result: You should see the Sent packets at 4 and the received packets at 0.
17 2. The IP packets from the outside computer must not reach SICAM 1 since the data traffic from the "internal network" (SICAM 1) to the "external network" (outside computer) is not permitted. 3. This will be the same for any computer not set in the above IP rules. NAT (Network Address Translation) Router Mode 1. The common use case in which all internal nodes send packets to the external network and keep their IP addresses hidden by the NAT functionality is preconditioned on the SCALANCE S. 2. This could be used for each SCALANCE device so that the IP addresses would be hidden of each node behind the SCALANCE device. 3. This would make it a little harder to sniff the data since it is not encrypted in this method. 4. We will be learning more about this method throughout the implementation part of the project. Checking to make sure the test bed works The major test of both all 3 of the methods above is: 1. We need to make sure RTUs. the 2 RTUs connect to the DNP server which gives us the ability to trip the a. This can be tested by logging onto the Power TG software and tripping the relays. b. The light should turn red as show in the picture below. If it does, you have configured everything correctly. c. As an example for Relay 1, IP 201 should talk to 217 when pinging 2. Make sure you cannot talk to the external network based on the rules you set forth or the tunnels you have set up. Along with this making sure all unauthorized connectionsare blocked. Checking status of SCALANCE Modules One of the things you can do is log the packets coming in and out of the SCALANCE device Allows you to see what is coming in and out of the SCALANCE device and what is actually being blocked. This allows you to see if someone from the outside is trying to get to your nodes behind the SCALANCE.
18 SCALANCE Device Summary Ideally we would use a combination of all these 3 methods. Each has their own benefits and flaws. When implementing this we have to make sure the testbed is set up like a real world situation. As of now everything is talking to each other the way they should be and we will be starting with the basics and trying to hack into that and then working our way up to higher security. Experiment 4 - Adjustable load on Relays Relay Overview The SIPROTEC series relays being used on this SCADA test bed are flexible and have the ability to serve in a variety of applications across the system. Primarily, relays are used on a power distribution network to open and close loads or various branches of the power grid. The Siemens SIPROTEC 7SJ61 relay modules have the ability to monitor current flow on all three phases of whatever particular node they may be connected to. Above is an illustration of a Siemens relay monitoring a distribution line. Current Monitoring Monitoring current becomes the secondary focus and implementation of these relays. Data can be logged from the activity of the relay as an analog point of the live performance. An analog point simply becomes a variable of some particular characteristic within the test bed. Say, current at a particular branch of a long three-phase transmission line, or the phase voltage at the end of a lengthy span of conductor.
19 Above is a relay on the test bed displaying data from a single analog point. A constant load has been connected to this relay, drawing a current of 5 amps. Deliverables In this scenario, the practice of over current protection will be the focus of our efforts. In the field, transmission lines are subject to handling excess amounts of current in times of high load demand or weather conditions. As a result, equipment can be damaged, transmission lines can heat up to levels compromising the reliability of the grid. To protect against these potentially harmful or dangerous situations, relays can release load from the distribution network, helping preserve the integrity of the grid. Modeling in PowerTG Data from the analog points of a relay can be monitored from within the Siemens PowerTG software. Naturally, an engineer on a regional power grid is going to use such relays to report data and protect their infrastructure. Over currents can be monitored in real-time, and set to be rapidly acted upon. In this case, we will be opening relays whose lines exceed chosen current values.
20 Above is a large scale representation of the analog points which a PowerTG control center can be monitoring. In a fully configured system, the values would not read 0. Above is a screenshot indicating two circuit breakers indicated by CBA 1 and CBA 2 contained within a single relay. These both display status trip which means that they have been opened by the PowerTG software for reasons related to protecting the system. Execution of action
21 Above is another screenshot displaying some configuration parameters from the PowerTG database. This particular configuration indicates how a section of the relay is currently configured to remain in a tripped or closed state based on a monitored analog point. Testing A simple method of testing can be used in the scenarios of a SCADA test bed such as the model used in this design project. With a fully functional network of equipment, it is unnecessary to have relays connected to an actual power transmission line to verify the switching and protection of an over current. Although actual testing procedures have not yet taken place, it is an intended focus of the Spring 2010 semester. In principle, the testing on our test bed will be composed of introducing a variable load to a relay. The load will be selectable and can range in value. Initially, a small load can be subjected to the relay. Slowly, load can be increased to such a level that the relay will execute an opening, or trip action as defined in PowerTG parameters. When the observed load exceeds this current threshold, the action will take place. Implementing such a test can be done by using some simple components and Electrical Engineering principles. We will be designing a panel containing perhaps a half dozen resistors. In this case, simple 100 watt light bulbs will suffice adequately. With a light switch in series with each bulb, current ranging from 0 to 5 amps can be produced when connected to a 120v source. Experiment 5 The final stage of our project consists of the security evaluation of our SCADA testbed. All 4 previous experiments have lead to the development of an operational, small-scale SCADA network. The primary goals of this evaluation will be to conduct an investigation into Critical Infrastructure Protection (CIP) protocol standards to determine whether our SCADA network adheres to these standards and if not, how can the system be modified to do so? The secondary objective will be to examine various types of known attack schemes and determine if any of them can be used effectively to compromise our SCADA network. In conjunction with this effort our team will also examine the SCADA system and software to determine if any security vulnerabilities exist which could potentially be exploited. Criticial Infrastructure Protection (CIP) Compliance The North American Electric Reliability Corporation (NERC) defines the reliability requirements for operation of bulk power systems such as those that might be controlled by our SCADA network testbed. The CIP standards, and their explanations as taken from NERC, consist of 9 requirements that all bulk power operators are required to follow: CIP-001-1: Purpose: CIP-002-2: Purpose: Sabotage Reporting Disturbances or unusual occurrences, suspected or determined to be caused by sabotage, shall be reported to the appropriate systems, governmental agencies and regulatory bodies. Critical Cyber Asset Identification Provide a framework for the identification and protection of Critical Cyber Assets to support reliable operation of the Bulk Electric System. Management and maintenance of Bulk Electric Systems relies on communication between Cyber Assets that support critical reliability functions and process. Development of a risk-based methodology to identify and document Critical Cyber Assets.
22 CIP-003-2: Purpose: CIP-004-2: Purpose: CIP-005-2: Purpose: CIP-006-2: Purpose: CIP-007-2: Purpose: CIP-008-2: Purpose: CIP-009-2: Purpose: Security Management Controls Development and documentation of a security policy that addresses the issues of cyber security policy exceptions, information protection and access control. Personnel & Training Establishment, documentation, implementation and maintenance of a security awareness program to ensure that personnel having authorized cyber or authorized unescorted physical access to Critical Cyber Assets, including contractors and service vendors, have an appropriate level of personnel risk assessment, training, awareness of security practices. Electronic Security Perimeter(s) Identification and protection of the Electronic Security Perimeter(s) inside which all Critical Cyber Assets reside, as well as access points on the perimeter. This evaluation should include an assessment of cyber vulnerability at access points as well as electronic access controls and monitoring of these access control mechanism. Physical Security of Critical Cyber Assets Establishment of a physical security program for the protection of Critical Cyber Assets. The Physical Security Plan should include documentation of physical access points, protection physical and electronic access control systems, monitoring and protection of physical access controls, and logging of physical access. Systems Security Management Definition of methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeter(s). Process and procedures should include port and service necessity, security patch management, malicious software prevention, account management, security status monitoring, and vulnerability assessment. Incident Reporting and Response Planning Identification, classification, response, and reporting of Cyber Security Incidents related to Critical Cyber Assets, including but not limited to an Incident Response Plan consisting of procedures to classify incidents, response actions, communication plans, reporting incidents and updating and ensuring the Incident Response Plan. Recovery Plans for Critical Cyber Assets Ensure that recovery plan(s) are put in place for Critical Cyber Assets and that these plans follow established business continuity and disaster recovery techniques and practices. Recovery plans should plans and procedures for response actions, exercising/drilling of the plan, making changes, and backup and restoration of information used to restore Critical Cyber Assets. CIP Compliance Evaluation During our security evaluation we will use the CIP Standard documents from the NERC website to take a detailed look at which requirements our SCADA network and lab adhere to as well as where the holes are and how they can be
23 modified. We will look to determine where the requirements leave the electronic realm and begin to enter the physical. Additionally, we plan to employ the Cyber Security Evaluation Tool (CSET) development by the Department of Homeland Security US-CERT. The purpose of the software is guide the user through a step-by-step process to evaluate the control system security practices against industry standards. This software incorporates standards from organizations such as NIST and NERC; our hope in using this software is to gain additional insight into industry standard control system security best practices. Attack Development After our evaluation of the SCADA testbed with respect to CIP compliance our focus will move more towards software and network security. While some of these concerns are addressed in CIP-007-2, Systems Security Management, the reliability standard does not seem to completely cover the topic. The main goal of this phase of the security evaluation will be to look mainly at network and some software level attacks that could potentially be deployed against our SCADA network. At the same time we will be examining the Siemens software looking for potential security vulnerabilities within the software. What follows is a few broad categories characterizing attacks we hope to develop and deploy: Denial-of-Service Prevent access to a network resource using various DoS attack schemes Invalid Data Sending packets into the network with invalid headers or data Physical Attacks Attacks to network connections or physical devices Remote Access Targeting applications and protocols used to remotely access devices and software Information Theft obtaining information using network traffic sniffing or social engineering Social Engineering Development of social engineering based access scenarios Testing Testing the effectiveness of these various attacks would be relatively simply and consist mainly of the development and execution of attacks against the SCADA network. It is likely that we will relax some of the security settings on our system in order to prove that an attack works without security measures in place and fails with security in place. Follow-up The last element of this phase will be an examination of any vulnerabilities discovered during the evaluation process. If software or network vulnerabilities are found then we will determine the risk presented by the vulnerabilities and look for solutions to correct the problem presented.
i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS
i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS siemens.com/ruggedcom INTERACTIVE REMOTE ACCESS INTELLIGENT ELECTRONIC DEVICES Intelligent Electronic Devices (IEDs) Devices that can provide real-time
More informationSecurity Standards for Electric Market Participants
Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system
More informationIowa State University
Iowa State University Cyber Security Smart Grid Testbed Senior Design, Final Report Dec 13-11 Derek Reiser Jared Pixley Rick Sutton Faculty Advisor: Professor Manimaran Govindarasu 1 Table of Contents
More informationCyber Threats? How to Stop?
Cyber Threats? How to Stop? North American Grid Security Standards Jessica Bian, Director of Performance Analysis North American Electric Reliability Corporation AORC CIGRE Technical Meeting, September
More informationHow AlienVault ICS SIEM Supports Compliance with CFATS
How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal
More informationAutomation Services and Solutions
Automation Services and Solutions Automate substation data acquisition and control to improve performance Maintain uninterrupted power services with proactive grid monitoring and controlling features.
More informationChapter X Security Performance Metrics
DRAFT February 19, 15 BES Security s Working Group Page 1 of 7 Chapter X Security Performance s 1 3 3 3 3 0 Background The State of Reliability 1 report noted that the NERC PAS was collaborating with the
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).
More informationIntro to the NERC/NIPC Indications, Analysis & Warnings Program
Intro to the NERC/NIPC Indications, Analysis & Warnings Program (IAW Program - Electric Power Sector) Before Seeing this Presentation, Make Sure Everyone Has a Copy of Each of the Following: Job Aid (NIPC
More informationSecuring Industrial Control Systems
L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting
More informationChapter X Security Performance Metrics
Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical
More informationPage 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES
002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission
More informationControl Systems Cyber Security Awareness
Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 3 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
More informationFirewalls (IDS and IPS) MIS 5214 Week 6
Firewalls (IDS and IPS) MIS 5214 Week 6 Agenda Defense in Depth Evolution of IT risk in automated control systems Security Domains Where to put firewalls in an N-Tier Architecture? In-class exercise Part
More informationNERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS
NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements
More informationДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT
ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ENERGY AUTOMATION - SMART GRID Restricted Siemens AG 20XX All rights reserved. siemens.com/answers Frederic Buchi, Energy Management Division, Siemens AG Cyber
More information1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010
Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes
More informationSubstation automation products. MicroSCADA Pro for substation automation
Substation automation products for substation automation Perfect control anywhere, anytime is an investment for today and tomorrow. Start, for instance, with monitoring or gateway functionality and integrate
More information90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government
More informationDigital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation
Digital Substation A Substation Why Should We Make It Digital? Adopt new business models Time to operation Quality assurance Business agility Avoid outages Investment security Ensuring grid availability
More informationPRACTICAL NETWORK DEFENSE VERSION 1
PRACTICAL NETWORK DEFENSE VERSION 1 The world s premiere online practical network defense course elearnsecurity has been chosen by students in over 140 countries in the world and by leading organizations
More informationToward Open Source Intrusion Tolerant SCADA. Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania
Toward Open Source Intrusion Tolerant SCADA Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania Outline What is SCADA? SCADA Vulnerabilities What is Intrusion Tolerance? Prime PvBrowser Our
More informationIndustrial Security - Protecting productivity. Industrial Security in Pharmaanlagen
- Protecting productivity Industrial Security in Pharmaanlagen siemens.com/industrialsecurity Security Trends Globally we are seeing more network connections than ever before Trends Impacting Security
More informationAUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID
AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern
More informationDRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1
DRAFT Cyber Security Communications between Control Centers Technical Rationale and Justification for Reliability Standard CIP-012-1 March May 2018 NERC Report Title Report Date I Table of Contents Preface...
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
More informationSecurity Audit What Why
What A systematic, measurable technical assessment of how the organization's security policy is employed at a specific site Physical configuration, environment, software, information handling processes,
More informationChapter X Security Performance Metrics
Chapter X Security Performance Metrics Page 1 of 9 Chapter X Security Performance Metrics Background For the past two years, the State of Reliability report has included a chapter for security performance
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More informationLesson Learned CIP Version 5 Transition Program
Lesson Learned CIP Version 5 Transition Program CIP-002-5: BES Cyber Assets Version: December 7, 2015 This document is designed to convey lessons learned from NERC s various CIP version 5 transition activities.
More informationCyber Security and Substation Equipment Overview
Cyber Security and Substation Equipment Overview Northeast Power Coordinating Council Task Force on Infrastructure Security & Technology s Cyber Security Workshop June 7 & 8, 2006 John Ciufo Alfred Moniz
More informationCIP Cyber Security Personnel & Training
A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-5.1 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the BES from individuals
More informationTechnical Questions and Answers CIP Version 5 Standards Version: June 13, 2014
Technical s and s CIP Version 5 Standards Version: June 13, 2014 This document is designed to convey lessons learned from NERC s various activities. It is not intended to establish new requirements under
More informationCyber security for digital substations. IEC Europe Conference 2017
Cyber security for digital substations IEC 61850 Europe Conference 2017 Unrestricted Siemens 2017 siemens.com/gridsecurity Substation Digitalization process From security via simplicity 1st generation:
More informationIndustrial Defender ASM. for Automation Systems Management
Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping
More informationCategorizing Cyber Systems
Categorizing Cyber Systems An Approach Based on BES Reliability Functions NERC Cyber Security Standards Drafting Team for Order 706 06/15/2009 Team CATEGORIZING CYBER SYSTEMS: AN APPROACH BASED ON IMPACT
More informationCYBER SECURITY POLICY REVISION: 12
1. General 1.1. Purpose 1.1.1. To manage and control the risk to the reliable operation of the Bulk Electric System (BES) located within the service territory footprint of Emera Maine (hereafter referred
More informationComprehensive Cyber Security Features in SIPROTEC & SICAM. SIPROTEC Dag 11. Mei 2017
Comprehensive Cyber Security Features in SIPROTEC & SICAM SIPROTEC Dag 11. Mei 2017 siemens.tld/keyword Changes to Substation Automation and Protection over Time Evolving Threat Landscape (tomorrow today...)
More informationSpecialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com
Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting
More informationCyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.
Cyber Security For Utilities Risks, Trends & Standards IEEE Toronto March 22, 2017 Doug Westlund Senior VP, AESI Inc. Agenda Cyber Security Risks for Utilities Trends & Recent Incidents in the Utility
More informationTop 10 ICS Cybersecurity Problems Observed in Critical Infrastructure
SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical
More informationCIP Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security System Security Management 2. Number: CIP-007-5 3. Purpose: To manage system security by specifying select technical, operational, and procedural requirements in
More informationON-LINE EXPERT SUPPORT THROUGH VPN ACCESS
ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of
More informationThe Honest Advantage
The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents
More informationGrid Automation Products. MicroSCADA Pro Substation automation applications.
Grid Automation Products Substation automation applications. 2 Substation automation applications Automate, control and optimize your operations. is an investment for today and tomorrow. Start, for instance,
More informationExternal Supplier Control Obligations. Cyber Security
External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place
More informationPROTECTING MANUFACTURING and UTILITIES Industrial Control Systems
PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems Mati Epstein Global Sales Lead, Critical Infrastructure and ICS [Internal Use] for Check Point employees 1 Industrial Control Systems (ICS)/SCADA
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationEducation Network Security
Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or
More informationCIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra
CIP-014 JEA Compliance Approach FRCC Fall Compliance Workshop Presenter Daniel Mishra Acronyms & Terminologies DHS Department of Homeland Security JEA It s not an acronym JSO Jacksonville Sheriff's Office
More informationWhy Should You Care About Control System Cybersecurity. Tim Conway ICS.SANS.ORG
Why Should You Care About Control System Cybersecurity Tim Conway ICS.SANS.ORG Events Example #1 Dec 23, 2015 Cyber attacks impacting Ukrainian Power Grid Targeted, synchronized, & multi faceted Three
More informationPotential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group
Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group Submitted on behalf of the U.S. Department of Energy National
More informationSnort: The World s Most Widely Deployed IPS Technology
Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,
More informationTitle. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018.
Critical Infrastructure Protection Getting Low with a Touch of Medium Title CanWEA Operations and Maintenance Summit 2018 January 30, 2018 George E. Brown Compliance Manager Acciona Wind Energy Canada
More informationSecurity Solutions. Overview. Business Needs
Security Solutions Overview Information security is not a one time event. The dynamic nature of computer networks mandates that examining and ensuring information security be a constant and vigilant effort.
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).
More informationCIP Cyber Security Recovery Plans for BES Cyber Systems
A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-6 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan
More informationCIP Cyber Security Security Management Controls. A. Introduction
CIP-003-7 - Cyber Security Security Management Controls A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-7 3. Purpose: To specify consistent and sustainable security
More informationCIP Cyber Security Personnel & Training
A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-6 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the Bulk Electric
More informationPowerCyber: CPS Security Testbed for Power Grid
Learn invent impact PowerCyber: CPS Security Testbed for Power Grid REMOTE ACCESS INTERFACE USER GUIDE Version 1.0 Funded jointly by: NSF Award #CNS 1446831 Compiled by: Sujatha K Swamy, Graduate Research
More informationTestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified
TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145
More informationLoss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP September 30, 2014
Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP-009-3 September 30, 2014 James Williams Lead Compliance Specialist jwilliams.re@spp.org 501.614.3261 Jeremy Withers Senior Compliance Specialist
More informationMethods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment
S&L Logo Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment Date: October 24, 2017 Authors/Presenters: J. Matt Cole, PE
More informationTABLE OF CONTENTS. Section Description Page
GPA Cybersecurity TABLE OF CONTENTS Section Description Page 1. Cybersecurity... 1 2. Standards... 1 3. Guides... 2 4. Minimum Hardware/Software Requirements For Secure Network Services... 3 4.1. High-Level
More informationCritical Infrastructure Protection for the Energy Industries. Building Identity Into the Network
Critical Infrastructure Protection for the Energy Industries Building Identity Into the Network Executive Summary Organizations in the oil, gas, and power industries are under increasing pressure to implement
More informationEasily configurable HMI system for power automation siemens.com/sicam
SICAM SCC Easily configurable HMI system for power automation siemens.com/sicam Small components big prospects: Your SICAM SCC station control Power grid operation is becoming more and more dynamic. To
More informationConnectivity 101 for Remote Monitoring Systems
Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance
More informationCyber Attacks & Breaches It s not if, it s When
` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,
More informationOvation Ethernet Link Controller Module Data Sheet
Ovation Ethernet Link Controller Module Features: Provides native Ethernet connectivity capability at the I/O level Enables faster, more efficient integration of robust data from third-party devices Dedicated
More informationEnterprise Cybersecurity Best Practices Part Number MAN Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationMay 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations
May 14, 2018 1:30PM to 2:30PM CST In Plain English: Cybersecurity and IT Exam Expectations Options to Join Webinar and audio Click on the link: https://www.webcaster4.com/webcast/page/584/24606 Choose
More informationConsideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015
Federal Energy Regulatory Commission Order No. 791 January 23, 2015 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently
More informationMicroSCADA Pro Substation automation applications.
G R I D AUTO M ATI O N PRO D U C T S Substation automation applications. ABB Oy Finland Power Grids Grid Automation P.O. Box 614 FI-65101 Vaasa, Finland Phone: +358 10 22 21999 (Customer Support Center)
More informationIT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I
Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program
More informationProtecting Control Systems from Cyber Attack: A Primer on How to Safeguard Your Utility May 15, 2012
Protecting Control Systems from Cyber Attack: A Primer on How to Safeguard Your Utility May 15, 2012 Paul Kalv Electric Director, Chief Smart Grid Systems Architect, City of Leesburg Doug Westlund CEO,
More informationDisclaimer Executive Summary Introduction Overall Application of Attachment Generation Transmission...
CIP-002-4 Cyber Security Critical Cyber Asset Identification Rationale and Implementation Reference Document September, 2010 Table of Contents TABLE OF CONTENts Disclaimer... 3 Executive Summary... 4 Introduction...
More informationSECURING THE SUPPLY CHAIN
SECURING THE SUPPLY CHAIN BY Jerome Farquharson, CISSP, Donald Dustin Williams, PE, AND Courtney Buser The advance of smart grids, smart devices and increasingly interconnected systems provides exceptional
More informationThis draft standard is being posted for an initial comment and ballot. The draft includes modifications to meet the directives of FERC Order No. 791.
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationIEC A cybersecurity standard approaching the Rail IoT
IEC 62443 A cybersecurity standard approaching the Rail IoT siemens.com/communications-for-transportation Today s Siemens company structure focusing on several businesses Siemens AG Power and Gas (PG)
More informationOctober 05, ECE 421 Session 12. Utility SCADA and Automation. Presented by: Chris Dyer
ECE 421 Session 12 October 05, 2017 Utility SCADA and Automation Presented by: Chris Dyer Utility SCADA & Automation Chris Dyer, P.E. BSEE University of Idaho, 1997 SCADA & Automation Engineer POWER Engineers,
More informationChapter 2 State Estimation and Visualization
Chapter 2 State Estimation and Visualization One obvious application of GPS-synchronized measurements is the dynamic monitoring of the operating conditions of the system or the dynamic state estimation
More informationSubmitted on behalf of the DOE National SCADA Test Bed. Jeff Dagle, PE Pacific Northwest National Laboratory (509)
Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group (CSSWG) Submitted on behalf of the DOE National SCADA Test
More informationInformation Security for Mail Processing/Mail Handling Equipment
Information Security for Mail Processing/Mail Handling Equipment Handbook AS-805-G March 2004 Transmittal Letter Explanation Increasing security across all forms of technology is an integral part of the
More informationPND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access
The World s Premier Online Practical Network Defense course PND at a glance: Self-paced, online, flexible access 1500+ interactive slides (PDF, HTML5 and Flash) 5+ hours of video material 10 virtual labs
More informationMIS5206-Section Protecting Information Assets-Exam 1
Your Name Date 1. Which of the following contains general approaches that also provide the necessary flexibility in the event of unforeseen circumstances? a. Policies b. Standards c. Procedures d. Guidelines
More informationTrends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk
Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk Standards Certification Education & Training Publishing Conferences & Exhibits Steve Liebrecht W/WW Industry
More informationCritical Cyber Asset Identification Security Management Controls
Implementation Plan Purpose On January 18, 2008, FERC (or Commission ) issued Order. 706 that approved Version 1 of the Critical Infrastructure Protection Reliability Standards, CIP-002-1 through CIP-009-1.
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
More informationIPM Secure Hardening Guidelines
IPM Secure Hardening Guidelines Introduction Due to rapidly increasing Cyber Threats and cyber warfare on Industrial Control System Devices and applications, Eaton recommends following best practices for
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationCIP Cyber Security Recovery Plans for BES Cyber Systems
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationHugo E. Meier, Heidelberg, Germany, June 2014 Integrator Partner Seminar2014 Substation automation trends
Hugo E. Meier, Heidelberg, Germany, June 2014 Integrator Partner Seminar2014 Substation automation trends Substation automation trends Contents Product Portfolio Trends in substation automation Cyber Security
More informationGujarat Forensic Sciences University
Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat
More informationProject Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives
Project 2014-02 - Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives Violation Risk Factor and Justifications The tables
More information20-CS Cyber Defense Overview Fall, Network Basics
20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter
More information