+ All Categories
Home > Documents > Cyber Security Solutions for Critical Infrastructure€¦ · Virus / Worm Propagation Denial of...

Cyber Security Solutions for Critical Infrastructure€¦ · Virus / Worm Propagation Denial of...

Date post: 24-Jul-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
2
SCALABLE Network Technologies n +1.424.603.6361 n [email protected] n scalable-networks.com SCALABLE NETWORK TECHNOLOGIES Cyber Security Soluons for Crical Infrastructure Power Generation | Water Treatment | Transportation Critical infrastructure relies on networked communications for monitoring and control. This means they are vulnerable to cyber attacks. Cyber threats against public utilities and other critical infrastructure are now just as common as attacks on governmental and corporate computing environments. But, instead of simply losing sensitive data, malicious attacks against power generation and distribution systems, water treatment plants, and transportation facilities can disrupt commerce and daily life across a wide area. There is a pressing need for operators to determine how resilient their communications fabric is to cyber attack and to develop plans to mitigate the associated risks. SCALABLE’s high fidelity network emulation is used to simulate and predict the behavior of networked environments based on various operational scenarios, including cyber attacks. The emulation runs in real-time and models connections, computers, protocols, firewalls and other defenses. SCALABLE’s EXata integrates with OPAL-RT simulators for critical infrastructure in order to more effectively identify and visualize the impact of cyber attacks on monitoring and control systems. We are working together and have integrated SCADA protocols to help create best practices to increase systems availability and lower operational risks. The companies’ integrated tools enable replicating specific environments in a lab and quickly evaluating “what if” scenarios to determine what happens to physical systems if they are subjected to cyber attacks. SCALABLE Virtual Network Models enable high fidelity “what if” analysis of scenarios and risks.
Transcript
Page 1: Cyber Security Solutions for Critical Infrastructure€¦ · Virus / Worm Propagation Denial of Service Man-in-the-Middle Attacks Routing Misconfiguration Adaptive Attacks Sniffing

SCALABLE Network Technologies n +1.424.603.6361 n [email protected] n scalable-networks.com

SCALABLENETWORK TECHNOLOGIES

Cyber Security Solutions forCritical Infrastructure

Power Generation | Water Treatment | TransportationCritical infrastructure relies on networked communications

for monitoring and control.

This means they are vulnerable to cyber attacks.

Cyber threats against public utilities and other critical infrastructure are now just as common as attacks on governmental and corporate computing environments. But, instead of simply losing sensitive data, malicious attacks against power generation and distribution systems, water treatment plants, and transportation facilities can disrupt commerce and daily life across a wide area.

There is a pressing need for operators to determine how resilient their communications fabric is to cyber attack and to develop plans to mitigate the associated risks.

SCALABLE’s high fidelity network emulation is used to simulate and predict the behavior of networked environments based on various operational scenarios, including cyber attacks. The emulation runs in real-time and models connections, computers, protocols, firewalls and other defenses.

SCALABLE’s EXata integrates with OPAL-RT simulators for critical infrastructure in order to more effectively identify and visualize the impact of cyber attacks on monitoring and control systems.

We are working together and have integrated SCADA protocols to help create best practices to increase systems availability and lower operational risks. The companies’ integrated tools enable replicating specific environments in a lab and quickly evaluating “what if” scenarios to determine what happens to physical systems if they are subjected to cyber attacks.

SCALABLE Virtual Network Models enable high fidelity “what if” analysis of scenarios and risks.

Page 2: Cyber Security Solutions for Critical Infrastructure€¦ · Virus / Worm Propagation Denial of Service Man-in-the-Middle Attacks Routing Misconfiguration Adaptive Attacks Sniffing

SCALABLE Network Technologies n +1.424.603.6361 n [email protected] n scalable-networks.com

Cyber Effects Models

SCALABLE offers advanced modeling and simulation technology for cyber attacks, defenses and vulnerabilities.

Examples: � Defensive Breach � Network Security, Firewalls � Host Vulnerability Exploitation � Virus / Worm Propagation � Denial of Service � Man-in-the-Middle Attacks � Routing Misconfiguration � Adaptive Attacks � Sniffing / Eavesdropping / Passive Traffic

Analysis

Network Modeling

The SCALABLE network modeling applications are used to design, analyze and test networks, networked systems and distributed applications behavior.

The software can model networks comprised of thousands of nodes at real-time speeds with real-world high fidelity.

It is a powerful tool for developing networked equipment, protocols and waveforms, and experimenting with potential operating scenarios for various network architectures.

The EXata software includes a system-in-the-loop emulation interface and an optional Cyber Library of cyber attacks, defenses and vulnerabilities. This enables the seamless integration of live hardware and applications with the virtual network models for effective operational testing, and the assessment of networks as to their resiliency to cyber threats.


Recommended