GarrettCom Ethernet Networks and Web Management manual Introduction, Security Overview

Page 2

INTRODUCTION

This paper explores the state of network security options today at the Ethernet switch level and offers an elementary roadmap for industrial operations to plan for and deploy secure communications systems. Industrial systems need to take advantage of the advanced networking technologies that can support greater efficiency, reliability, and security in plant and remote operations. As SCADA systems, relays, and other industrial control, monitoring and management systems become more intelligent, a rich supply of data is available for improving plant performance and remote maintenance and management. However, as with all technology advances, there are challenges as well as opportunities.

SECURITY OVERVIEW

In today’s uncertain world, security stands beside profitability, productivity, performance and control as a key element for maintaining business activities in industrial facilities. Prevention of malicious attacks against business infrastructure has become as vital to ongoing success as has the widespread use of the computer systems which make such attacks so easy and so painful. It is no longer enough to catch the perpetrator during or after the commission of a malicious act; considerable time and expense is being consumed to address how to secure systems to prevent intrusion.

Repercussions from the 2003 power blackout in the Northeastern US were felt throughout the country. Attacks such as the Zobot worm and Mytob bot software effectively shut down well protected computers at CNN, the New York Times and many other places. Imagine how much worse a concentrated and widespread act of industrial sabotage might be.

Until just recently, SCADA (Supervisory Control And Data Acquisition) environments were not considered at risk for cyber attack because of the highly customized nature of these systems. In March 2002, articles were still being written that debunked the concern for more security of utility service providers. Yet this viewpoint is compromised by documented cyber-related incidents, such as the Slammer Worm infiltration of an Ohio Nuclear power plant, and the wireless attack on a sewage- SCADA system in Queensland Australia.

1

Image 2
Contents GarrettCom, Inc 47823 Westinghouse Drive Fremont, CA INTRODUCTION SECURITY OVERVIEWETHERNET SECURITY - THE SWITCH VENDOR’S OPPORTUNITY INDUSTRIAL SECURITY INITIATIVESPage ETHERNET SECURITY STANDARDS BEYOND THE SWITCH REFERENCES BRIEF OVERVIEW OF SP99 AND PCSRF APPENDIX Aassessment of use in the manufacturing and control system environment typical deployment known issues and weaknessessecurity vulnerabilities addressed by this technology APPENDIX B SECURITY STANDARDS IN USE IN ETHERNET INSTALLATIONS SNMPSSL - Secure Socket Layer Remote Security TLS - Transport Layer SecurityMAC Addressing