network security lewis r. folkerth, p. e. consumers energy energy management systems...

15
Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems [email protected]

Upload: alexia-cook

Post on 14-Dec-2015

218 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Network Security

Lewis R. Folkerth, P. E.

Consumers Energy

Energy Management Systems

[email protected]

Page 2: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Overview

• Why Network Security?

• Types of Security

• Network Configurations

• Intrusion Detection

• Maintaining Security

Page 3: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Why Network Security?

• EMS as installed:– no outside connections

– no or limited dialup

– few threats

EM S

R TU

Page 4: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Why Network Security?

• EMS today– Network connections

• Company

• Internet

– Dialup

– More threats• “Hackers”

• Competitors

• Terrorists

EM SH ub

C orporate N etw orks D ia lup

In ternet

Page 5: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Types of Security

• Host Security– Passwords

– OS

– Vulnerability Analysis

– Intrusion Detection

• Network Security– Firewalls

– Packet Filtering

– Vulnerability Analysis

– Intrusion Detection

Page 6: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Common EMS Network

R oute r

F irew a ll

In te rne t

S C A D A N e tw ork

E M S P C N e tw ork

C orpo ra te N e tw orks

Page 7: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Add a Layer of Protection

S C A D A N e tw ork

E M S P C N e tw ork

C orpo ra te N e tw orks

R ou te r

F irew a ll

In te rne t

R ou te r

F irew a ll

Page 8: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Add Intrusion Detection

S C A D A N e tw ork

E M S P C N e tw ork

C orpo ra te N e tw orks

R ou te r

F irew a ll

In te rne t

R ou te r

F irew a ll

S

A

S

SS

S - SensorA - Ana lysis System

Page 9: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Isolate the Intrusion Detection

S C A D A N e tw ork

E M S P C N e tw ork

C orpo ra te N e tw orks

R ou te r

F irew a ll

In te rne t

R ou te r

F irew a ll

SA

SS

Page 10: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Firewalls

• Commercial product is probably best

• Consider location when choosing brand and type– Parallel implementations

• Use same type and brand as main Internet firewall

– Series implementations• Use different brand from main firewall

Page 11: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Packet Filtering

• Available in most routers

• Used where a firewall is overkill

• More difficult to maintain

Page 12: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Vulnerability Analysis

• Host based– COPS (UNIX)

– ASET (Solaris)

– SCE (NT)

– Commercial

• Network Based– SATAN

– nmap

– Commercial

Page 13: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Intrusion Detection

• Host Based– Tripwire (UNIX)– Commercial (Other)

• Network Based– SHADOW– Commercial

Page 14: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Building an Intrusion Detection System (IDS)

• Obtain Software• Obtain Hardware

– Sensor Requirements– Analysis Station

Requirements

• Install the sensor– OS– tcpdump, libpcap, ssh,

SHADOW– Configure

• Install the analysis system– OS

– tcpdump, libpcap, ssh, apache, browser, SHADOW

– Configure

Page 15: Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems lrfolkerth@cmsenergy.com

Maintaining Security

• Keep up with the latest exploits

• Ongoing education

• Newsletters

• Incident Response Groups

• NIPC - Infragard