Project SHINE recently found an electric substation directly connected to the Internet. Project SHINE analysts were able to see DNP3 ports, Serial Port Server ports, Telnet interface ports, and a web page server. They discovered this via search engines without even accessing the site itself.
While discussing the recent turbine loss of control issue, I was reminded of a software version issue that I first encountered during Y2K. That is the issue of how long vendors will support older versions of software.
The draft agenda for the October ICS Cyber Security Conference is now available at www.icscybersecurityconference.com. As events continue to unfold, the agenda will be modified accordingly. A new session is being added to address the recent loss of turbine control incident that will be led by the utility. If you...
Five months ago, the utility hosting the ICS cyber security test bed met with one of their major ICS vendors. Some of the security patches actually impacted the reliability of the ICS and the overall system.
Since the original AURORA test bed at Idaho Labs in 2007 much has been said about the merits of the test conducted and many conjectures concerning its validity have been made. It is important to remember that AURORA is not an isolated case that exists outside the cybersecurity framework. To...
On October 12, 2011, I gave an invited presentation on cyber security of industrial control systems to a graduate electrical engineering colloquium at Stanford - http://www.youtube.com/watch?v=S3Yyv53dZ5A.
Latest Aurora information – this affects ANY electric utility customer with 3-phase rotating electric equipment!
There have been numerous discussions about cyber risk within NERC, the utilities, and ICS equipment suppliers. Aurora is an unresolved risk that could have significant impact on the utilities, suppliers of relay protection devices, and utility customers with 3-phase rotating equipment.
There are starting to be more discussions about the need for integration between Information Technology (IT) and Operations Technology (OT) to secure ICSs. From my experience, I have found very few effective OT managers. I believe an effective OT manager must be very familiar with ICSs and their constraints and...
August 22nd, the DHS Cyber Security Division held the Transition to Practice Technology Demonstration for Investors, Integrators and IT Companies in San Jose. To great fanfare (it was on local radio and TV) there were 8 cybersecurity technologies being showcased. NONE were directly relevant to control systems!
The issue of critical infrastructure protection, or control system cyber security, is getting to be more popular with the mainstream IT community as demonstrated by the number of presentations at Black Hat. The issue is really separating the real issues from the hype.