Details

Cybersecurity of Industrial Systems


Cybersecurity of Industrial Systems


1. Aufl.

von: Jean-Marie Flaus

139,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 09.07.2019
ISBN/EAN: 9781119644514
Sprache: englisch
Anzahl Seiten: 424

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p>How to manage the cybersecurity of industrial systems is a crucial question.<br /> <br /> To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems. They must also have some knowledge of the methods used by attackers, of the standards and regulations involved and of the available security solutions.<br /> <br /> Cybersecurity of Industrial Systems presents these different subjects in order to give an in-depth overview and to help the reader manage the cybersecurity of their installation. The book addresses these issues for both classic SCADA architecture systems and Industrial Internet of Things (IIoT) systems. </p>
<p>Foreword xiii</p> <p>Introduction xix</p> <p><b>Chapter 1. Components of an Industrial Control System</b> <b>1</b></p> <p>1.1. Introduction 1</p> <p>1.1.1. Definition: automated and cyber-physical systems 1</p> <p>1.1.2. Definition: Information System (IS) 1</p> <p>1.1.3. Definition: industrial IS or ICS 2</p> <p>1.1.4. Definition: IT and OT system 4</p> <p>1.1.5. Definition: SCADA 4</p> <p>1.1.6. Definition: Distributed Control Systems (DCS) 5</p> <p>1.1.7. Definition: Industrial Internet of Things (IIOT) 5</p> <p>1.1.8. Different types of ICS 6</p> <p>1.2. From the birth of the PLC to the SCADA system 6</p> <p>1.3. Programmable logic controller (PLC) 8</p> <p>1.4. RTU, master terminal unit and intelligent electronic device 12</p> <p>1.5. Programmable Automation Controller 13</p> <p>1.6. Industrial PC 13</p> <p>1.7. Safety instrumented systems 13</p> <p>1.8. Human–machine interface (HMI) 15</p> <p>1.9. Historians 17</p> <p>1.10. Programming and parameter setting stations 17</p> <p>1.11. Industrial Internet of Things (IIoT) 18</p> <p>1.12. Network equipment 19</p> <p>1.12.1. Switch and hub 19</p> <p>1.12.2. Router and gateway 20</p> <p>1.12.3. Firewall 20</p> <p>1.12.4. IoT gateway 20</p> <p>1.13. Data processing platform 21</p> <p>1.14. Lifecycle of an ICS 22</p> <p><b>Chapter 2. Architecture and Communication in an Industrial Control System</b> <b>25</b></p> <p>2.1. Network architecture 25</p> <p>2.1.1. Purdue model and CIM model 26</p> <p>2.1.2. Architecture of the Industrial Internet of Things 29</p> <p>2.2. Different types of communication networks 31</p> <p>2.2.1. Topology 31</p> <p>2.2.2. Types of networks 33</p> <p>2.2.3. Virtual private network 34</p> <p>2.2.4. OSI model 34</p> <p>2.3. Transport networks 35</p> <p>2.3.1. Ethernet 35</p> <p>2.3.2. Wi-Fi 36</p> <p>2.3.3. The IEEE 802.15.1 (Bluetooth) standard 36</p> <p>2.3.4. IEEE 802.15.4 networks 37</p> <p>2.3.5. LPWAN networks 38</p> <p>2.3.6. Cellular networks 38</p> <p>2.4. Internet protocols 39</p> <p>2.4.1. The Internet protocol 39</p> <p>2.4.2. Transmission Control Protocol 39</p> <p>2.4.3. Unified Datagram Protocol (UDP) 42</p> <p>2.4.4. Address Resolution Protocol (ARP) 42</p> <p>2.4.5. Internet Control Message Protocol (ICMP) 42</p> <p>2.4.6. The IPv6 protocol 43</p> <p>2.5. Industrial protocols 43</p> <p>2.5.1. Introduction 43</p> <p>2.5.2. Modbus 45</p> <p>2.5.3. Profibus and Profinet 46</p> <p>2.5.4. Actuator/sensor interface 47</p> <p>2.5.5. Highway Addressable Remote Transducer 48</p> <p>2.5.6. DNP3 and IEC 60870 48</p> <p>2.5.7. The CAN bus 49</p> <p>2.5.8. Ethernet/IP and Common Industrial Protocol (CIP) 49</p> <p>2.5.9. OLE for Process Control (OPC) 51</p> <p>2.5.10. Other protocols 52</p> <p>2.6. IoT protocols 52</p> <p>2.6.1. 6LowPAN 53</p> <p>2.6.2. Message Queuing Telemetry Transport 53</p> <p>2.6.3. CoAP 54</p> <p>2.6.4. Other protocols 54</p> <p><b>Chapter 3. IT Security</b> <b>57</b></p> <p>3.1. Security objectives 57</p> <p>3.1.1. The AIC criteria 57</p> <p>3.1.2. The different levels of IT security 61</p> <p>3.2. Differences between IT and OT systems 64</p> <p>3.2.1. The functionalities 64</p> <p>3.2.2. The technology 65</p> <p>3.2.3. System lifecycle 66</p> <p>3.2.4. Security management 67</p> <p>3.2.5. IT/OT convergence 68</p> <p>3.2.6. Summary 68</p> <p>3.3. Risk components 70</p> <p>3.3.1. Asset and impact 70</p> <p>3.3.2. Threats 71</p> <p>3.3.3. Attacks 71</p> <p>3.3.4. Vulnerabilities 72</p> <p>3.3.5. Definition of risk 73</p> <p>3.3.6. Scenarios and impact 74</p> <p>3.3.7. Risk measurement 75</p> <p>3.4. Risk analysis and treatment process 77</p> <p>3.4.1. Principle 77</p> <p>3.4.2. Acceptance of risk 79</p> <p>3.4.3. Risk reduction 79</p> <p>3.5. Principle of defense in depth 80</p> <p>3.6. IT security management 82</p> <p>3.7. Risk treatment process 85</p> <p>3.8. Governance and security policy for IT systems 86</p> <p>3.8.1. Governance 86</p> <p>3.8.2. Security policy 87</p> <p>3.9. Security management of industrial systems 88</p> <p><b>Chapter 4. Threats and Attacks to ICS</b> <b>91</b></p> <p>4.1. General principle of an attack 91</p> <p>4.2. Sources of threats 95</p> <p>4.3. Attack vectors 98</p> <p>4.4. Main categories of malware 99</p> <p>4.4.1. Virus/worms 100</p> <p>4.4.2. Trojan horse 100</p> <p>4.4.3. Logical bomb 101</p> <p>4.4.4. Rootkit 101</p> <p>4.4.5. Spyware 101</p> <p>4.4.6. Back doors 101</p> <p>4.4.7. Botnet 102</p> <p>4.4.8. Ransomware 103</p> <p>4.5. Attacks on equipment and applications 103</p> <p>4.5.1. Buffer overflow and integer overflow 103</p> <p>4.5.2. Attack by brute force 104</p> <p>4.5.3. Attack via a zero day flaw 105</p> <p>4.5.4. Side-channel attacks 105</p> <p>4.5.5. Attacks specific to ICS equipment 106</p> <p>4.5.6. Attacks on IIoT systems 107</p> <p>4.6. Site attacks and via websites 108</p> <p>4.7. Network attacks 109</p> <p>4.7.1. Man-in-the-middle 109</p> <p>4.7.2. Denial of service 110</p> <p>4.7.3. Network and port scanning 111</p> <p>4.7.4. Replay attack 112</p> <p>4.8. Physical attacks 112</p> <p>4.9. Attacks using the human factor 113</p> <p>4.9.1. Social engineering 113</p> <p>4.9.2. Internal fraud 114</p> <p>4.10. History of attacks on ICS 114</p> <p>4.11. Some statistics 119</p> <p><b>Chapter 5. Vulnerabilities of ICS</b> <b>121</b></p> <p>5.1. Introduction 121</p> <p>5.2. Generic approach to vulnerability research 122</p> <p>5.3. Attack surface 124</p> <p>5.4. Vulnerabilities of SCADA industrial systems 126</p> <p>5.5. Vulnerabilities of IoT industrial systems 128</p> <p>5.6. Systematic analysis of vulnerabilities 130</p> <p>5.7. Practical tools to analyze technical vulnerability 136</p> <p>5.7.1. Databases and information sources 137</p> <p>5.7.2. Pentest tools 137</p> <p>5.7.3. Search engines 139</p> <p><b>Chapter 6. Standards, Guides and Regulatory Aspects</b> <b>141</b></p> <p>6.1. Introduction 141</p> <p>6.2. ISO 27000 family 142</p> <p>6.3. NIST framework and guides 144</p> <p>6.3.1. NIST Cyber Security Framework 144</p> <p>6.3.2. The guides 145</p> <p>6.4. Distribution and production of electrical energy 148</p> <p>6.4.1. NERC CIP 148</p> <p>6.4.2. IEC 62351 150</p> <p>6.4.3. IEEE 1686 151</p> <p>6.5. Nuclear industry 151</p> <p>6.5.1. The IAEA technical guide 151</p> <p>6.5.2. IEC 62645 152</p> <p>6.6. Transportation 153</p> <p>6.6.1. Vehicles 153</p> <p>6.6.2. Aeronautics 153</p> <p>6.7. Other standards. 154</p> <p>6.7.1. National Information Security Standards 154</p> <p>6.7.2. Operating safety standards 154</p> <p>6.8. ANSSI’s approach 155</p> <p>6.9. Good practices for securing industrial Internet of Things equipment 159</p> <p>6.9.1. Trust base (root of trust) 160</p> <p>6.9.2. Identity management (endpoint identity) 161</p> <p>6.9.3. Secure boot 161</p> <p>6.9.4. Cryptographic services 161</p> <p>6.9.5. Secure communications 162</p> <p>6.9.6. Equipment configuration and management 162</p> <p>6.9.7. Activity dashboard and event management by a SIEM 162</p> <p>6.10. Legislative and regulatory aspects 163</p> <p><b>Chapter 7. The Approach Proposed by Standard 62443</b><b> 167</b></p> <p>7.1. Presentation 167</p> <p>7.2. IACS lifecycle and security stakeholders 169</p> <p>7.3. Structure of the IEC 62443 standard 170</p> <p>7.4. General idea of the proposed approach 172</p> <p>7.5. Basics of the standard 174</p> <p>7.5.1. Fundamental requirements 174</p> <p>7.5.2. Security Levels (SL) 177</p> <p>7.5.3. Zones and conduits 180</p> <p>7.5.4. Maturity level 182</p> <p>7.5.5. Protection level 183</p> <p>7.6. Risk analysis 184</p> <p>7.6.1. General approach 185</p> <p>7.6.2. Detailed risk analysis 186</p> <p>7.6.3. Determination of SL-T 187</p> <p>7.6.4. Countermeasures 188</p> <p>7.7. Security management 189</p> <p>7.8. Assessment of the level of protection 190</p> <p>7.9. Implementation of the IEC 62443 standard 191</p> <p>7.9.1. Certification 191</p> <p>7.9.2. Service providers and integrators 192</p> <p>7.9.3. IACS Operators 192</p> <p><b>Chapter 8. Functional Safety and Cybersecurity</b> <b>193</b></p> <p>8.1. Introduction 193</p> <p>8.1.1. Components of operational safety 193</p> <p>8.1.2. SIS and SIL levels 198</p> <p>8.2. IEC 61508 standard and its derivatives 200</p> <p>8.3. Alignment of safety and security 203</p> <p>8.4. Risk analysis methods used in operational safety 204</p> <p>8.4.1. Preliminary hazard analysis 204</p> <p>8.4.2. Failure Mode and Effects Analysis 205</p> <p>8.4.3. HAZOP 207</p> <p>8.4.4. Layer Of Protection Analysis 208</p> <p>8.4.5. Fault trees and bowtie diagrams 210</p> <p><b>Chapter 9. Risk Assessment Methods</b> <b>213</b></p> <p>9.1. Introduction 213</p> <p>9.2. General principle of a risk analysis 214</p> <p>9.2.1. General information 214</p> <p>9.2.2. Setting the context 217</p> <p>9.2.3. Risk identification 218</p> <p>9.2.4. Estimation of the level of risk 219</p> <p>9.2.5. Risk assessment and treatment 219</p> <p>9.2.6. Tailor-made approach and ICS 221</p> <p>9.3. EBIOS method 221</p> <p>9.3.1. Workshop 1: framing and security base 222</p> <p>9.3.2. Workshop 2: sources of risk 226</p> <p>9.3.3. Workshop 3: study of strategic scenarios 227</p> <p>9.3.4. Workshop 4: study of operational scenarios 229</p> <p>9.3.5. Workshop 5: risk treatment 230</p> <p>9.3.6. Implementation for ICS 233</p> <p>9.4. Attack trees 234</p> <p>9.5. Cyber PHA and cyber HAZOP 236</p> <p>9.5.1. Principle 236</p> <p>9.5.2. Cyber PHA 239</p> <p>9.5.3. Cyber HAZOP 243</p> <p>9.6. Bowtie cyber diagram 245</p> <p>9.7. Risk analysis of IIoT systems 246</p> <p><b>Chapter 10. Methods and Tools to Secure ICS</b><b> 249</b></p> <p>10.1. Identification of assets 249</p> <p>10.2. Architecture security 253</p> <p>10.2.1. Presentation 253</p> <p>10.2.2. Secure architecture 254</p> <p>10.2.3. Partitioning into zones 255</p> <p>10.3. Firewall 257</p> <p>10.4. Data diode 260</p> <p>10.5. Intrusion detection system 261</p> <p>10.5.1. Principle of operation 261</p> <p>10.5.2. Detection methods 264</p> <p>10.5.3. Intrusion detection based on a process model 267</p> <p>10.6. Security incident and event monitoring 268</p> <p>10.7. Secure element 270</p> <p><b>Chapter 11. Implementation of the ICS Cybersecurity Management Approach</b> <b>273</b></p> <p>11.1. Introduction 273</p> <p>11.1.1. Organization of the process 273</p> <p>11.1.2. Technical, human and organizational aspects 275</p> <p>11.1.3. Different levels of implementation and maturity 275</p> <p>11.2. Simplified process 276</p> <p>11.3. Detailed approach 277</p> <p>11.4. Inventory of assets 279</p> <p>11.4.1. Mapping 279</p> <p>11.4.2. Documentation management 279</p> <p>11.5. Risk assessment 280</p> <p>11.6. Governance and ISMS 281</p> <p>11.6.1. Governance of the ICS and its enviroment 281</p> <p>11.6.2. ISMS for ICS 281</p> <p>11.7. Definition of the security policy and procedures 282</p> <p>11.8. Securing human aspects 283</p> <p>11.9. Physical security 284</p> <p>11.10. Network security 285</p> <p>11.11. Securing exchanges by removable media 285</p> <p>11.12. Securing machines 285</p> <p>11.12.1. Securing workstations and servers 285</p> <p>11.12.2. Securing engineering stations 286</p> <p>11.12.3. Securing PLCs 286</p> <p>11.12.4. Securing IIoT equipment 287</p> <p>11.12.5. Securing network equipment 287</p> <p>11.12.6. Antivirus 287</p> <p>11.13. Data security and configuration 288</p> <p>11.14. Securing logical accesses 289</p> <p>11.15. Securing supplier and service provider interactions 290</p> <p>11.16. Incident detection 291</p> <p>11.16.1. Logging and alerts 291</p> <p>11.16.2. Intrusion detection system 291</p> <p>11.16.3. Centralization of events (SIEM) 291</p> <p>11.17. Security monitoring 291</p> <p>11.17.1. Updating mapping and documentation 291</p> <p>11.17.2. Security patch management 291</p> <p>11.17.3. Audit of the facility 292</p> <p>11.18. Incident handling 292</p> <p>11.19. Recovery 293</p> <p>11.19.1. Backup 293</p> <p>11.19.2. Business continuity plan 294</p> <p>11.20. Cybersecurity and lifecycle 294</p> <p>Appendix 1 295</p> <p>Appendix 2 303</p> <p>Appendix 3 309</p> <p>Appendix 4 329</p> <p>Appendix 5 355</p> <p>Appendix 6 361</p> <p>List of acronyms and abbreviations 363</p> <p>References 367</p> <p>Index 377</p>
<p>Jean-Marie Flaus is Professor at the University of Grenoble, France, and teaches in several engineering schools. He is an expert on the cybersecurity of industrial systems and conducts research at the G-SCOP laboratory, in collaboration with INERIS and large companies. </p>

Diese Produkte könnten Sie auch interessieren:

Pulsed Power
Pulsed Power
von: Gennady A. Mesyats
PDF ebook
309,23 €
High-Frequency Oscillator Design for Integrated Transceivers
High-Frequency Oscillator Design for Integrated Transceivers
von: J. van der Tang, Dieter Kasperkovitz, Arthur H.M. van Roermund
PDF ebook
149,79 €
MEMS Vibratory Gyroscopes
MEMS Vibratory Gyroscopes
von: Cenk Acar, Andrei Shkel
PDF ebook
149,79 €