Cybersecurity of Industrial Systems

 
 
Standards Information Network (Verlag)
  • 1. Auflage
  • |
  • erschienen am 9. Juli 2019
  • |
  • 420 Seiten
 
E-Book | PDF mit Adobe-DRM | Systemvoraussetzungen
978-1-119-64451-4 (ISBN)
 
How to manage the cybersecurity of industrial systems is a crucial question.

To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems. They must also have some knowledge of the methods used by attackers, of the standards and regulations involved and of the available security solutions.

Cybersecurity of Industrial Systems presents these different subjects in order to give an in-depth overview and to help the reader manage the cybersecurity of their installation. The book addresses these issues for both classic SCADA architecture systems and Industrial Internet of Things (IIoT) systems.
 

How to manage the cybersecurity of industrial systems is a crucial question.

To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems. They must also have some knowledge of the methods used by attackers, of the standards and regulations involved and of the available security solutions.

Cybersecurity of Industrial Systems presents these different subjects in order to give an in-depth overview and to help the reader manage the cybersecurity of their installation. The book addresses these issues for both classic SCADA architecture systems and Industrial Internet of Things (IIoT) systems.

1. Auflage
  • Englisch
  • Newark
  • |
  • USA
John Wiley & Sons Inc
  • Für Beruf und Forschung
  • Reflowable
  • 12,40 MB
978-1-119-64451-4 (9781119644514)

weitere Ausgaben werden ermittelt
Jean-Marie Flaus is Professor at the University of Grenoble, France, and teaches in several engineering schools. He is an expert on the cybersecurity of industrial systems and conducts research at the G-SCOP laboratory, in collaboration with INERIS and large companies.

Jean-Marie Flaus is Professor at the University of Grenoble, France, and teaches in several engineering schools. He is an expert on the cybersecurity of industrial systems and conducts research at the G-SCOP laboratory, in collaboration with INERIS and large companies.

Foreword xiii

Introduction xix

<b>Chapter 1. Components of an Industrial Control System</b> <b>1</b>

1.1. Introduction 1

1.1.1. Definition: automated and cyber-physical systems 1

1.1.2. Definition: Information System (IS) 1

1.1.3. Definition: industrial IS or ICS 2

1.1.4. Definition: IT and OT system 4

1.1.5. Definition: SCADA 4

1.1.6. Definition: Distributed Control Systems (DCS) 5

1.1.7. Definition: Industrial Internet of Things (IIOT) 5

1.1.8. Different types of ICS 6

1.2. From the birth of the PLC to the SCADA system 6

1.3. Programmable logic controller (PLC) 8

1.4. RTU, master terminal unit and intelligent electronic device 12

1.5. Programmable Automation Controller 13

1.6. Industrial PC 13

1.7. Safety instrumented systems 13

1.8. Human-machine interface (HMI) 15

1.9. Historians 17

1.10. Programming and parameter setting stations 17

1.11. Industrial Internet of Things (IIoT) 18

1.12. Network equipment 19

1.12.1. Switch and hub 19

1.12.2. Router and gateway 20

1.12.3. Firewall 20

1.12.4. IoT gateway 20

1.13. Data processing platform 21

1.14. Lifecycle of an ICS 22

<b>Chapter 2. Architecture and Communication in an Industrial Control System</b> <b>25</b>

2.1. Network architecture 25

2.1.1. Purdue model and CIM model 26

2.1.2. Architecture of the Industrial Internet of Things 29

2.2. Different types of communication networks 31

2.2.1. Topology 31

2.2.2. Types of networks 33

2.2.3. Virtual private network 34

2.2.4. OSI model 34

2.3. Transport networks 35

2.3.1. Ethernet 35

2.3.2. Wi-Fi 36

2.3.3. The IEEE 802.15.1 (Bluetooth) standard 36

2.3.4. IEEE 802.15.4 networks 37

2.3.5. LPWAN networks 38

2.3.6. Cellular networks 38

2.4. Internet protocols 39

2.4.1. The Internet protocol 39

2.4.2. Transmission Control Protocol 39

2.4.3. Unified Datagram Protocol (UDP) 42

2.4.4. Address Resolution Protocol (ARP) 42

2.4.5. Internet Control Message Protocol (ICMP) 42

2.4.6. The IPv6 protocol 43

2.5. Industrial protocols 43

2.5.1. Introduction 43

2.5.2. Modbus 45

2.5.3. Profibus and Profinet 46

2.5.4. Actuator/sensor interface 47

2.5.5. Highway Addressable Remote Transducer 48

2.5.6. DNP3 and IEC 60870 48

2.5.7. The CAN bus 49

2.5.8. Ethernet/IP and Common Industrial Protocol (CIP) 49

2.5.9. OLE for Process Control (OPC) 51

2.5.10. Other protocols 52

2.6. IoT protocols 52

2.6.1. 6LowPAN 53

2.6.2. Message Queuing Telemetry Transport 53

2.6.3. CoAP 54

2.6.4. Other protocols 54

<b>Chapter 3. IT Security</b> <b>57</b>

3.1. Security objectives 57

3.1.1. The AIC criteria 57

3.1.2. The different levels of IT security 61

3.2. Differences between IT and OT systems 64

3.2.1. The functionalities 64

3.2.2. The technology 65

3.2.3. System lifecycle 66

3.2.4. Security management 67

3.2.5. IT/OT convergence 68

3.2.6. Summary 68

3.3. Risk components 70

3.3.1. Asset and impact 70

3.3.2. Threats 71

3.3.3. Attacks 71

3.3.4. Vulnerabilities 72

3.3.5. Definition of risk 73

3.3.6. Scenarios and impact 74

3.3.7. Risk measurement 75

3.4. Risk analysis and treatment process 77

3.4.1. Principle 77

3.4.2. Acceptance of risk 79

3.4.3. Risk reduction 79

3.5. Principle of defense in depth 80

3.6. IT security management 82

3.7. Risk treatment process 85

3.8. Governance and security policy for IT systems 86

3.8.1. Governance 86

3.8.2. Security policy 87

3.9. Security management of industrial systems 88

<b>Chapter 4. Threats and Attacks to ICS</b> <b>91</b>

4.1. General principle of an attack 91

4.2. Sources of threats 95

4.3. Attack vectors 98

4.4. Main categories of malware 99

4.4.1. Virus/worms 100

4.4.2. Trojan horse 100

4.4.3. Logical bomb 101

4.4.4. Rootkit 101

4.4.5. Spyware 101

4.4.6. Back doors 101

4.4.7. Botnet 102

4.4.8. Ransomware 103

4.5. Attacks on equipment and applications 103

4.5.1. Buffer overflow and integer overflow 103

4.5.2. Attack by brute force 104

4.5.3. Attack via a zero day flaw 105

4.5.4. Side-channel attacks 105

4.5.5. Attacks specific to ICS equipment 106

4.5.6. Attacks on IIoT systems 107

4.6. Site attacks and via websites 108

4.7. Network attacks 109

4.7.1. Man-in-the-middle 109

4.7.2. Denial of service 110

4.7.3. Network and port scanning 111

4.7.4. Replay attack 112

4.8. Physical attacks 112

4.9. Attacks using the human factor 113

4.9.1. Social engineering 113

4.9.2. Internal fraud 114

4.10. History of attacks on ICS 114

4.11. Some statistics 119

<b>Chapter 5. Vulnerabilities of ICS</b> <b>121</b>

5.1. Introduction 121

5.2. Generic approach to vulnerability research 122

5.3. Attack surface 124

5.4. Vulnerabilities of SCADA industrial systems 126

5.5. Vulnerabilities of IoT industrial systems 128

5.6. Systematic analysis of vulnerabilities 130

5.7. Practical tools to analyze technical vulnerability 136

5.7.1. Databases and information sources 137

5.7.2. Pentest tools 137

5.7.3. Search engines 139

<b>Chapter 6. Standards, Guides and Regulatory Aspects</b> <b>141</b>

6.1. Introduction 141

6.2. ISO 27000 family 142

6.3. NIST framework and guides 144

6.3.1. NIST Cyber Security Framework 144

6.3.2. The guides 145

6.4. Distribution and production of electrical energy 148

6.4.1. NERC CIP 148

6.4.2. IEC 62351 150

6.4.3. IEEE 1686 151

6.5. Nuclear industry 151

6.5.1. The IAEA technical guide 151

6.5.2. IEC 62645 152

6.6. Transportation 153

6.6.1. Vehicles 153

6.6.2. Aeronautics 153

6.7. Other standards. 154

6.7.1. National Information Security Standards 154

6.7.2. Operating safety standards 154

6.8. ANSSI's approach 155

6.9. Good practices for securing industrial Internet of Things equipment 159

6.9.1. Trust base (root of trust) 160

6.9.2. Identity management (endpoint identity) 161

6.9.3. Secure boot 161

6.9.4. Cryptographic services 161

6.9.5. Secure communications 162

6.9.6. Equipment configuration and management 162

6.9.7. Activity dashboard and event management by a SIEM 162

6.10. Legislative and regulatory aspects 163

<b>Chapter 7. The Approach Proposed by Standard 62443</b><b> 167</b>

7.1. Presentation 167

7.2. IACS lifecycle and security stakeholders 169

7.3. Structure of the IEC 62443 standard 170

7.4. General idea of the proposed approach 172

7.5. Basics of the standard 174

7.5.1. Fundamental requirements 174

7.5.2. Security Levels (SL) 177

7.5.3. Zones and conduits 180

7.5.4. Maturity level 182

7.5.5. Protection level 183

7.6. Risk analysis 184

7.6.1. General approach 185

7.6.2. Detailed risk analysis 186

7.6.3. Determination of SL-T 187

7.6.4. Countermeasures 188

7.7. Security management 189

7.8. Assessment of the level of protection 190

7.9. Implementation of the IEC 62443 standard 191

7.9.1. Certification 191

7.9.2. Service providers and integrators 192

7.9.3. IACS Operators 192

<b>Chapter 8. Functional Safety and Cybersecurity</b> <b>193</b>

8.1. Introduction 193

8.1.1. Components of operational safety 193

8.1.2. SIS and SIL levels 198

8.2. IEC 61508 standard and its derivatives 200

8.3. Alignment of safety and security 203

8.4. Risk analysis methods used in operational safety 204

8.4.1. Preliminary hazard analysis 204

8.4.2. Failure Mode and Effects Analysis 205

8.4.3. HAZOP 207

8.4.4. Layer Of Protection Analysis 208

8.4.5. Fault trees and bowtie diagrams 210

<b>Chapter 9. Risk Assessment Methods</b> <b>213</b>

9.1. Introduction 213

9.2. General principle of a risk analysis 214

9.2.1. General information 214

9.2.2. Setting the context 217

9.2.3. Risk identification 218

9.2.4. Estimation of the level of risk 219

9.2.5. Risk assessment and treatment 219

9.2.6. Tailor-made approach and ICS 221

9.3. EBIOS method 221

9.3.1. Workshop 1: framing and security base 222

9.3.2. Workshop 2: sources of risk 226

9.3.3. Workshop 3: study of strategic scenarios 227

9.3.4. Workshop 4: study of operational scenarios 229

9.3.5. Workshop 5: risk treatment 230

9.3.6. Implementation for ICS 233

9.4. Attack trees 234

9.5. Cyber PHA and cyber HAZOP 236

9.5.1. Principle 236

9.5.2. Cyber PHA 239

9.5.3. Cyber HAZOP 243

9.6. Bowtie cyber diagram 245

9.7. Risk analysis of IIoT systems 246

<b>Chapter 10. Methods and Tools to Secure ICS</b><b> 249</b>

10.1. Identification of assets 249

10.2. Architecture security 253

10.2.1. Presentation 253

10.2.2. Secure architecture 254

10.2.3. Partitioning into zones 255

10.3. Firewall 257

10.4. Data diode 260

10.5. Intrusion detection system 261

10.5.1. Principle of operation 261

10.5.2. Detection methods 264

10.5.3. Intrusion detection based on a process model 267

10.6. Security incident and event monitoring 268

10.7. Secure element 270

<b>Chapter 11. Implementation of the ICS Cybersecurity Management Approach</b> <b>273</b>

11.1. Introduction 273

11.1.1. Organization of the process 273

11.1.2. Technical, human and organizational aspects 275

11.1.3. Different levels of implementation and maturity 275

11.2. Simplified process 276

11.3. Detailed approach 277

11.4. Inventory of assets 279

11.4.1. Mapping 279

11.4.2. Documentation management 279

11.5. Risk assessment 280

11.6. Governance and ISMS 281

11.6.1. Governance of the ICS and its enviroment 281

11.6.2. ISMS for ICS 281

11.7. Definition of the security policy and procedures 282

11.8. Securing human aspects 283

11.9. Physical security 284

11.10. Network security 285

11.11. Securing exchanges by removable media 285

11.12. Securing machines 285

11.12.1. Securing workstations and servers 285

11.12.2. Securing engineering stations 286

11.12.3. Securing PLCs 286

11.12.4. Securing IIoT equipment 287

11.12.5. Securing network equipment 287

11.12.6. Antivirus 287

11.13. Data security and configuration 288

11.14. Securing logical accesses 289

11.15. Securing supplier and service provider interactions 290

11.16. Incident detection 291

11.16.1. Logging and alerts 291

11.16.2. Intrusion detection system 291

11.16.3. Centralization of events (SIEM) 291

11.17. Security monitoring 291

11.17.1. Updating mapping and documentation 291

11.17.2. Security patch management 291

11.17.3. Audit of the facility 292

11.18. Incident handling 292

11.19. Recovery 293

11.19.1. Backup 293

11.19.2. Business continuity plan 294

11.20. Cybersecurity and lifecycle 294

Appendix 1 295

Appendix 2 303

Appendix 3 309

Appendix 4 329

Appendix 5 355

Appendix 6 361

List of acronyms and abbreviations 363

References 367

Index 377

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Bitte beachten Sie bei der Verwendung der Lese-Software Adobe Digital Editions: wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Als Download verfügbar

126,99 €
inkl. 7% MwSt.
E-Book Einzellizenz
PDF mit Adobe-DRM
siehe Systemvoraussetzungen
E-Book bestellen