|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Security Analysis of Industrial Control Systems
If you have a question about this talk, please contact Wei Ming Khoo.
Industrial Control Systems (ICS), often referred to as SCADA (Supervisory Control And Data Acquisition) Systems, have gained the increasing attention of IT-Security researchers. This talk introduces the terminology and background of ICS and exposes the reasons why it is difficult to secure ICS . Moreover, the talk will present security analysis guidelines for ICS devices. These guidelines can be applied to many ICS devices and are mostly vendor-independent. Furthermore, based on Scapy, a Modbus/TCP interactive packet manipulation program was developed for assessing critical infrastructures and ICS devices.
In the second half of the talk, I will describe a security analysis performed on a real device – an ICS democase containing current products in use in ICS . Besides known security issues, the analysis shows how the data visualized by the Human Machine Interface (HMI) can be altered and modified without limit. Secondly, physical values read by sensors, such as temperatures, can be altered within the Programmable Logic Controller (PLC). Thirdly, input validation also represent critical security issues in the ICS world. Lastly, existing security solutions for securing current ICS are briefly presented.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsMonday Mechanics Seminars (DAMTP) Pharmacology Lunch Club Engineering Department Energy, Fluids and Thermo seminars
Other talksSources and Methods Workshop: Voices from the (Nazi) perpetrator side and the limits of oral history Inherent Inconsistency of EU Energy Policymaking Are we any closer to understanding and treating tinnitus? Motion filtering: Marshalling, steering and sorting Cell polarity in lymphocytes A Changing Landscape: Securing The Internet of Things (IoT)