Addressing Security Issues for the Smart Grid Infrastructure.ppt
《Addressing Security Issues for the Smart Grid Infrastructure.ppt》由会员分享,可在线阅读,更多相关《Addressing Security Issues for the Smart Grid Infrastructure.ppt(43页珍藏版)》请在麦多课文档分享上搜索。
1、Addressing Security Issues for the Smart Grid Infrastructure,Neil Greenfield, CISSP, CISA IT Security Engineering,AMI-SEC Task Force Meeting June 25, 2008 New Orleans, Louisiana,Definition - U.S. Critical Infrastructures,“.systems and assets, whether physical or virtual, so vital to the United State
2、s that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health and safety, or any combination of those matters.” - USA Patriot Act (P.L. 107-56),Defense in Depth Focus Areas,Defend the network and infra
3、structure Backbone network availability Wireless network security System interconnections Defend the enclave boundary Network access protection Remote access Multilevel security Defend the computing environment End-user environment Application security Supporting infrastructures Key Management Infra
4、structure Detect and respond,Security Pieces & Parts,Identity & access management,Information risk management,Network,People,Process,Technology,Information security organization,Policy and compliance framework,Endpoints,Training awareness & personnel,Information asset management,Database,Business co
5、ntinuity and DR,Application infrastructure,Physical and environment sec,Systems,Incident & threat management,Messaging and content,Systems dev. & ops management,Data,Security Truisms,Protection Configuring our systems and networks as correctly as possible,Reaction Identify problems quickly, respond
6、to any problem and return to a safe state as rapidly as possible,Detection Identify when the configuration has changed or that some network traffic indicates a problem,Security Challenges,Reconfigurability and wireless nature may enable: Jamming (DoS) Device spoofing, configuration of a malicious de
7、vice (DoS, Tampering) Violation of regulatory constraints (DoS) Invalid configuration (DoS) Eavesdropping, insecure software download (Disclosure, Tampering) Exhaustion of system resources (DoS) Improper software functionality (Tampering),Security Threats,Blunders, errors, and omissions Fraud and th
8、eft, criminal activity Disgruntled employees, insiders Curiosity and ignorance, recreational and malicious hackers Industrial espionage Malicious code Foreign espionage and information warfare,Security Mechanism Examples,Jamming agile spectrum allocation Eavesdropping communication channel encryptio
9、n Internet attacks firewalls on connection to public network, strong user authentication Device spoofing, malfunctioning device, violation of regulatory constraints secure configuration, remote attestation,Security Requirements,Prevent loading, installation, instantiation of unauthorized software Ve
10、rify downloaded software from trusted vendor Ensure confidentiality and integrity of over-the-air software download and stored data Ensure the terminal operates within allowed frequency bands and power levels specified by regulators and power operators Provide trusted configuration information to su
11、bstations on request,DOH Vision Statement,The Energy Sector envisions a robust, resilient energy infrastructure in which continuity of business and services is maintained through secure and reliable information sharing, effective risk management programs, coordinated response capabilities, and trust
12、ed relationships between public and private security partners at all levels of industry and government.,- National Infrastructure Protection Plan Energy Sector, 2007,Security Standards Guidelines,ANSI/ISA99.00.012007 Security for Industrial Automation and Control Systems IEC TS 62351 Power Systems M
13、anagement and Associated Information Exchange Data and Communications Security ISO/IEC 13335 Information technology Security techniques Management of information and communications technology security ISO/IEC 21827 Information Technology Systems Security Engineering Capability Maturity Model (SSE-CM
14、M) ITU-T Recommendation X.805 Security Architecture for Systems Providing End-to-End Communications NIST Special Publication 800-27 Engineering Principles for Information Technology Security (A Baseline for Achieving Security) NIST Special Publication 800-53 Recommended Security Controls for Federal
15、 Information Systems Many others.,Security Tools More Than Just a Firewall,Authentication and Authorization Technologies Role-Based Authorization Tools Password Authentication Challenge/Response Authentication Physical/Token Authentication Smart Card Authentication Biometric Authentication Location-
16、Based Authentication Password Distribution and Management Technologies Device-to-Device Authentication,Filtering/Blocking/Access Control Technologies Network Firewalls Host-based Firewalls Virtual Networks,Encryption Technologies and Data Validation Symmetric (Secret) Key Encryption Public Key Encry
17、ption and Key Distribution Virtual Private Networks (VPNs),Management, Audit, Measurement, Monitoring, and Detection Tools Log Auditing Utilities Virus and Malicious Code Detection Systems Intrusion Detection Systems Vulnerability Scanners Forensics and Analysis Tools (FAT) Host Configuration Manage
18、ment Tools Automated Software Management Tools,Industrial Automation and Control Systems Computer Software Server and Workstation Operating Systems Real-time and Embedded Operating Systems Web Technologies,Physical Security Controls Physical Protection Personnel Security,ISO/IEC 21827 SSE-CMM,Intern
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ADDRESSINGSECURITYISSUESFORTHESMARTGRIDINFRASTRUCTUREPPT

链接地址:http://www.mydoc123.com/p-378046.html