+ All Categories
Home > Documents > Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems...

Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems...

Date post: 14-Dec-2015
Category:
Upload: alexia-cook
View: 217 times
Download: 1 times
Share this document with a friend
Popular Tags:
15
Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems [email protected]
Transcript
Page 1: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Network Security

Lewis R. Folkerth, P. E.

Consumers Energy

Energy Management Systems

[email protected]

Page 2: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Overview

• Why Network Security?

• Types of Security

• Network Configurations

• Intrusion Detection

• Maintaining Security

Page 3: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Why Network Security?

• EMS as installed:– no outside connections

– no or limited dialup

– few threats

EM S

R TU

Page 4: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Why Network Security?

• EMS today– Network connections

• Company

• Internet

– Dialup

– More threats• “Hackers”

• Competitors

• Terrorists

EM SH ub

C orporate N etw orks D ia lup

In ternet

Page 5: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Types of Security

• Host Security– Passwords

– OS

– Vulnerability Analysis

– Intrusion Detection

• Network Security– Firewalls

– Packet Filtering

– Vulnerability Analysis

– Intrusion Detection

Page 6: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Common EMS Network

R oute r

F irew a ll

In te rne t

S C A D A N e tw ork

E M S P C N e tw ork

C orpo ra te N e tw orks

Page 7: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Add a Layer of Protection

S C A D A N e tw ork

E M S P C N e tw ork

C orpo ra te N e tw orks

R ou te r

F irew a ll

In te rne t

R ou te r

F irew a ll

Page 8: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Add Intrusion Detection

S C A D A N e tw ork

E M S P C N e tw ork

C orpo ra te N e tw orks

R ou te r

F irew a ll

In te rne t

R ou te r

F irew a ll

S

A

S

SS

S - SensorA - Ana lysis System

Page 9: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Isolate the Intrusion Detection

S C A D A N e tw ork

E M S P C N e tw ork

C orpo ra te N e tw orks

R ou te r

F irew a ll

In te rne t

R ou te r

F irew a ll

SA

SS

Page 10: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Firewalls

• Commercial product is probably best

• Consider location when choosing brand and type– Parallel implementations

• Use same type and brand as main Internet firewall

– Series implementations• Use different brand from main firewall

Page 11: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Packet Filtering

• Available in most routers

• Used where a firewall is overkill

• More difficult to maintain

Page 12: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Vulnerability Analysis

• Host based– COPS (UNIX)

– ASET (Solaris)

– SCE (NT)

– Commercial

• Network Based– SATAN

– nmap

– Commercial

Page 13: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Intrusion Detection

• Host Based– Tripwire (UNIX)– Commercial (Other)

• Network Based– SHADOW– Commercial

Page 14: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Building an Intrusion Detection System (IDS)

• Obtain Software• Obtain Hardware

– Sensor Requirements– Analysis Station

Requirements

• Install the sensor– OS– tcpdump, libpcap, ssh,

SHADOW– Configure

• Install the analysis system– OS

– tcpdump, libpcap, ssh, apache, browser, SHADOW

– Configure

Page 15: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com.

Maintaining Security

• Keep up with the latest exploits

• Ongoing education

• Newsletters

• Incident Response Groups

• NIPC - Infragard


Recommended