SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Computer Security Aspects inIndustrial Instrumentation and Measurements Vishnu  S7 CS Roll no 30 1
INTRODUCTION Industrial Control Systems (ICS), formerly isolated proprietary systems. Now they are giving place to highly-connected systems. Implemented using widespread operating systems and network protocols in public networks. It also opens the door to security  threats. 2
This seminar presents the main concepts of security in conventional computing systems,  Discusses their mapping on dependability aspects of ICS,  And exposes some considerations about security aspects of a standard-based control board typically used in industrial applications. 3
BASIC CONCEPTS Security properties: ,[object Object]
Integrity
AvailabilitySecurity Threats ,[object Object]
Threat to integrity
Threat to availability
Security principles4
Security principles Minimum privilege Complete mediation Secure default Mechanism economy Minimum sharing 5
(Cont…) Open project Adequate protection Ease of use Efficiency Weakest link 6
Security Vulnerabilities Examples: ,[object Object]
a user account without password, or with a factory default password, allowing unauthorized users to access the system.
empty disk quotas, allowing a user to fill the entire disk and thus to prevent other users to use the system.7
Attacks Interruption Interception Modification Fabrication Security infrastructure Authentication Access control Auditing 8
SECURITY ASPECTS IN INDUSTRIAL CONTROL SYSTEMS In industrial processes, many kinds of ICS are used as, for example,  Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), Programmable Logic Controllers (PLC) 9

Weitere ähnliche Inhalte

Was ist angesagt?

Network security
Network securityNetwork security
Network securityEstiak Khan
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1RAMESHBABU311293
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
cyber security notes
cyber security notescyber security notes
cyber security notesSHIKHAJAIN163
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxnikshaikh786
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber CrimeDr Raghu Khimani
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitysanjana mun
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 

Was ist angesagt? (20)

Network security
Network securityNetwork security
Network security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber security notes
cyber security notescyber security notes
cyber security notes
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptx
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 

Andere mochten auch

3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Building a Project Management Information System with SharePoint
Building a Project Management Information System with SharePointBuilding a Project Management Information System with SharePoint
Building a Project Management Information System with SharePointASPE, Inc.
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Project management information system
Project management information systemProject management information system
Project management information systemPradeep Patel, PMP®
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information SystemsAhmad Tariq Bhatti
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

Andere mochten auch (8)

3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Building a Project Management Information System with SharePoint
Building a Project Management Information System with SharePointBuilding a Project Management Information System with SharePoint
Building a Project Management Information System with SharePoint
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Project management information system
Project management information systemProject management information system
Project management information system
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
 
project management information system
project management information systemproject management information system
project management information system
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Ähnlich wie Computer security aspects in

Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control SystemHemanth M
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security vSYYULIANISKOMMT
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetIvan Carmona
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Shakeel Ali
 
Brochure network security-en
Brochure network security-enBrochure network security-en
Brochure network security-ensandeep1721
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327vimal Kumar Gupta
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices IJECEIAES
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System SecurityAdel Barkam
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)Zero Science Lab
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxSamatarHussein
 

Ähnlich wie Computer security aspects in (20)

Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security v
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Brochure network security-en
Brochure network security-enBrochure network security-en
Brochure network security-en
 
INT 1010 06-6.pdf
INT 1010 06-6.pdfINT 1010 06-6.pdf
INT 1010 06-6.pdf
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
Cloud security
Cloud securityCloud security
Cloud security
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
Security
SecuritySecurity
Security
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptx
 

Computer security aspects in

  • 1. Computer Security Aspects inIndustrial Instrumentation and Measurements Vishnu S7 CS Roll no 30 1
  • 2. INTRODUCTION Industrial Control Systems (ICS), formerly isolated proprietary systems. Now they are giving place to highly-connected systems. Implemented using widespread operating systems and network protocols in public networks. It also opens the door to security threats. 2
  • 3. This seminar presents the main concepts of security in conventional computing systems, Discusses their mapping on dependability aspects of ICS, And exposes some considerations about security aspects of a standard-based control board typically used in industrial applications. 3
  • 4.
  • 6.
  • 10. Security principles Minimum privilege Complete mediation Secure default Mechanism economy Minimum sharing 5
  • 11. (Cont…) Open project Adequate protection Ease of use Efficiency Weakest link 6
  • 12.
  • 13. a user account without password, or with a factory default password, allowing unauthorized users to access the system.
  • 14. empty disk quotas, allowing a user to fill the entire disk and thus to prevent other users to use the system.7
  • 15. Attacks Interruption Interception Modification Fabrication Security infrastructure Authentication Access control Auditing 8
  • 16. SECURITY ASPECTS IN INDUSTRIAL CONTROL SYSTEMS In industrial processes, many kinds of ICS are used as, for example, Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), Programmable Logic Controllers (PLC) 9
  • 17. The following incidents on ICS are possible: Corrupted information may be sent to the system operators. Delay of information flow through the ICS network. Instruction, command, and code corruption, or similar integrity problems. Unwanted and not managed change in ICS software configuration, settings, and operational parameters. 10
  • 18. ICS software infected with malware, opening doors for several kinds of active or passive security problems. Malicious actions may have an impact on the system output. Attacks may even have dramatic consequences on the system safety. 11
  • 19. Many approaches are conceivable to overcome the aforementioned incidents: A network architecture which includes firewalls Separate authentication mechanisms and credentials for users in the corporate and ICS networks, as dictated by the minimum privilege and the adequate protection principles. 12
  • 20. Using a network topology with multiple layers. Restricting physical access to the ICS network and related devices. Protecting individual ICS components from exploitation. In case of adverse security conditions the system should be able to maintain the correct functionality or to drive itself back to a secure condition. A consideration is here mandatory: incidents are often inevitable. 13
  • 21. wireless networks are becoming a reality in distributed measurement and control systems. physical access to a wireless network is much easier. Due to this, wireless networks are more vulnerable to confidentiality risks,Integrity risks, Availability risks. 14
  • 22. CONCLUSION As industrial instrumentation and measurement systems evolve, they aggregate more sophisticate software, both applications and operating systems. Security threats traditionally present only in corporate/personal computing now represent a real menace for such systems. In this seminar, a parallel between conventional computer security concepts and industrial systems’ dependability have been presented. 15