Secure Data Transfer Guidance for Industrial Control and SCADA Systems | |
Mahan, Robert E. ; Fluckiger, Jerry D. ; Clements, Samuel L. ; Tews, Cody W. ; Burnette, John R. ; Goranson, Craig A. ; Kirkham, Harold | |
关键词: COMPUTER NETWORKS; CONTROL SYSTEMS; DATA ACQUISITION; DATA TRANSMISSION; ELECTRIC POWER; EXPENDITURES; IMPLEMENTATION; INTRUSION DETECTION SYSTEMS; MONITORING; NATIONAL SECURITY; NATURAL GAS; SECURITY; THEFT SCADA; Industrial Control Systems; Cyber Security; Security Architecture; Guidance; | |
DOI : 10.2172/1030885 RP-ID : PNNL-20776 PID : OSTI ID: 1030885 Others : Other: 830403000 Others : TRN: US201201%%429 |
|
美国|英语 | |
来源: SciTech Connect | |
【 摘 要 】
This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO201704210001265LZ | 3085KB | download |