industrial wireless security (japanese)

124
<Document Number> Copyright © Yokogawa Electric Corporation -1- - 2014/10/8 ಅဇዴᨥแᙹ ISA100 Wireless TM (IEC 62734) ỉἍỿἷἼἘỵಒᙲ ඕᩓೞ() IA PF ЎἍὅἑὊ ዴἏἼἷὊἉἹὅᢿ ޛஜԗʚ

Upload: digital-bond

Post on 09-Jun-2015

257 views

Category:

Technology


1 download

DESCRIPTION

Shuji Yamamoto of Yokogawa session at OTDay, S4xJapan on ISA100 / Industrial Wireless Security (Japanese)

TRANSCRIPT

  • 1. ISA100 WirelessTM (IEC 62734)() IA PF Copyright Yokogawa Electric Corporation - 1 -2014/10/8

2. - 2 -Copyright Yokogawa Electric CorporationISA100 WirelessISA100 Wireless 3. Copyright Yokogawa Electric Corporation- 3 - 4. ISA100WebThe ISA100 Standard Characteristics and Benefits of the Standard, Latest Developments & Progress- 4 -IEEE 802.15.4ISA100.11aCopyright Yokogawa Electric Corporation 5. ISA100 Wireless- 5 -Copyright Yokogawa Electric CorporationI/O Router BackboneRouterSystemManagerSecurityManagerGateway Provisioning ISA100 Wireless 6. - 6 -Copyright Yokogawa Electric Corporation 7. - 7 -Copyright Yokogawa Electric Corporation 8. - 8 -Copyright Yokogawa Electric CorporationISA100 Wireless 9. ISA100 WirelessCopyright Yokogawa Electric Corporation- 9 - 10. (WEP)(24bit) 5000250% () PC - 10 -Copyright Yokogawa Electric Corporation 11. 1ms13byte 128 - 11 -ISA100 WirelessCopyright Yokogawa Electric Corporation 12. ISA100 Wirelessintegrity - 12 -Copyright Yokogawa Electric Corporation 13. ISA100 Wireless Copyright Yokogawa Electric Corporation- 13 - 14. ISA100 Wireless Security Manager - 14 -Copyright Yokogawa Electric Corporation 15. (Provisioning)(Join Key) Join Key Join Key Join Key - 15 -Copyright Yokogawa Electric Corporation 16. ISA100 WirelessEnd to End - 16 -System managerSecurity ManagerCopyright Yokogawa Electric CorporationBackbone NetworkAccess Point 17. Wireless subnet Backbone network- 17 -2App LayerTransportCopyright Yokogawa Electric CorporationApp LayerTransportNetworkMACPHYNetworkMACPHYApp LayerTransportNetworkMACPHYNetworkMACPHYField DeviceField Device /Router Backbone RouterGateway ,System / Security ManagerTransport ( end-to-end )Link ( hop-by-hop )ISA100 Wireless network 18. ISA100 Wireless - 18 -Copyright Yokogawa Electric Corporation 19. - 19 -Copyright Yokogawa Electric Corporation 20. Hop to Hop()- 20 -Copyright Yokogawa Electric Corporation 21. End to End (ex. GatewayDevice)()- 21 -Copyright Yokogawa Electric Corporation 22. - 22 -Copyright Yokogawa Electric Corporation 23. ISA100 Wireless 1msn n - 23 -Copyright Yokogawa Electric Corporation 24. - 24 -Copyright Yokogawa Electric Corporation 25. Copyright Yokogawa Electric Corporation- 25 - 26. - 26 -Copyright Yokogawa Electric CorporationAES 128bit2 4 27. Thank youfor your attention !Copyright Yokogawa Electric Corporation- 27 - 28. Cyber security for ICS 2014 by Elbit Systems | Elbit Systems Proprietary! Lev 1! Lev 2! Lev - 3Rani Kehat CISSPDirector MarketingIntelligence & Cyber SolutionsElbit [email protected] 29. Siting by my computer screenWhite turns to blackBlack turns to WhiteAll Shades of Grey 2014 by Elbit Systems | Elbit Systems Proprietary 30. ICS ProtectionApplication and DPI White Listing 2014 by Elbit Systems | Elbit Systems Proprietary 31. AIG New Cyber Policy 2014 by Elbit Systems | Elbit Systems Proprietary! Will cover :! Physical Damage! Property! Harm to People! Not only data breach ! SecurityWeek April 2014 :! request especially fromSCADA industrial powerplants , but as they reviewapplicants , they refused mostof them. that protectionwere inadequate ! AIG is setting high demands ?or inadequate protection ?Or both ?? 32. Application White Listing 2014 by Elbit Systems | Elbit Systems Proprietary 33. 2014 by Elbit Systems | Elbit Systems ProprietaryWhat is What ? 34. 2014 by Elbit Systems | Elbit Systems ProprietaryWhat is AWL! Node level protection against Malware and unauthorized executable .! Scans disk for executable and stamps them with HASH ( MD5, SHA1 ,SHA256)! To each HASH a security Policy is attached .! One policy for all nodes , or differentiated according to operationalfunction .! Policy example : File creation , Trusted Path , File Integrity, Executioncontrol .HASH to Policy:A RuleRule BRunPendingDenyExecutable HashFile 35. In two words ... Or More! Whitelisting Only allow the Trusted good to run! Anti Virus Only stops known bad things to run! What about the rest ?Executable 2014 by Elbit Systems | Elbit Systems ProprietaryRun ProcessPendingTrustedBadNot allowed BadA=BB>CC