-
Industrial Control Systems (ICS)
-
Reasons an ICS may be targeted:
- Successful ICS attacks can have a large impact.
- ICS systems are often not well-secured.
-
Because ICS systems require continuous operation, they may lack vital patches and updates.
-
Real-Time Operating System (RTOS)
- A device that requires (practically) 100% uptime or availability and no latency.
-
Types
-
Supervisory Control and Data Acquisition (SCADA)
-
Common in industries that require remote monitoring of their infrastructure and productions systems:
- Natural gas pipelines
- Power production and distribution infrastructure
- Water supply control systems
-
Remote Telemetry Units
- Individual remote sensors used by the SCADA system to receive reports and administer local control.
- Attacks against SCADA systems can target the feedback provided to the central control system or can cause the local sensor and control unit to perform an incorrect action.
-
Distributed Control System (DCS)
-
Frequently used to control:
- Water and wastewater treatment systems
- Power generation plants
- Refineries and production lines
- Manufacturing facilities
- DCS systems use a combination of sensors and feedback systems to control and adjust processes as they receive feedback.
- Much like SCADA systems, an attack against a DCS system could be as simple as providing incorrect feedback, resulting in a shut-down, overproduction, or delay in the system at a critical time.
-
Programmable Logic Controller (PLC)
- Special-purpose computers designed to handle difficult environments with special temperature, vibration, or other requirements.
- PLCs are designed to handle and respond to their specialized input and output requirements reliably to ensure that the processes they support occur without interruption or delay.
- Typical PLCs don't have a monitor or other interface beyond buttons or lights built into them.
- PLCs are commonly used in both SCADA and DCS systems.
-
System on a Chip (SoC) / Internet of Things (IoT)
-
System on a Chip (SoC):
- An Integrated Circuit that integrates all components of a computer.
-
Parts:
- CPU
- Memory
- I/O Ports
- Secondary Storage
- SoCs are very common in the mobile computing market, as well as in embedded systems, because of their low power consumption.
-
Internet of Things (IoT):
- The network of items embedded with Internet access. This enables these items to connect, collect and exchange data.
- The adoption of SoC-based, IoT-enabled devices is growing rapidly. However, security has not kept pace. Because these technologies use the standard methods of wireless communication, attackers can easily modify current Wi-Fi, RFID, and Bluetooth attacks to target these devices.
-
Heating Ventilation & Air Conditioning (HVAC)
-
Temperature Control:
- Heat from servers must be dissipated
-
Important for:
- Server rooms
- Data centers
- Heavy-duty air-conditioning system
-
Humidity Control:
- Static electricity is our enemy
- By increasing humidity, we decrease the buildup of static electricity and the chance of ESD
- It is important to have this system on its own dedicated circuit that is rated properly.
-
Pipeless System and/or Access Control for Temperature & Humidity Control
- Because HVAC uses refrigerant, the pipes must be located away from the servers and other equipment. Another option is to use a pipeless system.
- Access controls to be able to change the temperature and humidity should be implemented. This can be integrated with current controls such as a monitoring system or key card access system.
-
Hot and Cold Aisles
- The aisles in a server room or data center that circulate cold air into the systems and hot air out of them.
- Usually, the systems and cabinets are supported by a raised floor.
-
Special Purpose
-
Vehicles
-
Air Gap
- A method of securing a control unit, system, or network through isolation and possibly shielding.
-
All vehicles should have appropriate locking systems and additional authentication methods such as:
- Passcodes
- Proximity Keys
- Biometrics
-
Wireless Systems:
- Disable Bluetooth, GPS, and Wi-Fi when not in use.
-
Unmanned Aerial Vehicle (UAV)
- More commonly known as a drone.
-
UAVs may be targets of the following attacks:
- Command and Control (C2) Attacks
- Data Link Jamming
- Sensor Jamming
- Spoofing
-
The organization that owns the UAV can prevent this by using:
- Best Coding Practices (SDLC)
- Encryption
- Mutual Authentication
- UAV-Specific Security Standards
-
A well-funded attacker might own UAV technology and use it for:
- Reconnaissance
- Gaining Access to a Wireless Network
-
To prevent this potential threat:
- Use strong wireless encryption protocols
- Physical security
- No-fly-zone policies
- Decrease the Wi-Fi power level to reduce the Wi-Fi area.