1 / 5

TTU NSF-SFS Workshop on Cybersecurity for Critical Infrastructure

TTU NSF-SFS Workshop on Cybersecurity for Critical Infrastructure. Day One Wrap-Up. Themes. What is “critical infrastructure”? How is cybersecurity for critical infrastructure different from cybersecurity for information systems? What are the new challenges?

simone
Download Presentation

TTU NSF-SFS Workshop on Cybersecurity for Critical Infrastructure

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TTU NSF-SFS Workshop onCybersecurity for Critical Infrastructure Day One Wrap-Up

  2. Themes • What is “critical infrastructure”? • How is cybersecurity for critical infrastructure different from cybersecurity for information systems? • What are the new challenges? • What are the emerging solutions?

  3. What is Critical Infrastructure? • JU: “Vital assets, systems, networks” • JU: Power grid, transportation systems, financial networks • VSa: “Cyberphysical systems” • VSa: Aircraft, spacecraft, tanks, ships, weapons systems • VSa: Heterogeneous elements & skills • VSa: “Systems of systems” • VR: “Smart Grid” • DD: Industrial control systems • VR, DD: superposition of real-time 24/7 physical infrastructure with information infrastructure • VR, DD: Physical sensing and modeling intrinsic • VR: Renewable energy = smaller, distributed sources Complex networks including physical and information components

  4. What Are the Challenges? • JU, VR: Cybersecurity for critical infrastructure lags cybersecurity for information systems • VSa: “Countably infinite” complexity • VSa: Abstraction hides complexity, creates vulnerabilities • VSa, VR: Capabilities = Vulnerabilities • VSa, VR, DD: Solutions must acknowledge limited resources • DD: No tradition/awareness of cyber vulnerability for industrial control systems • DD: Security impacts performance • DD: Cybersecurity is recent concern in ICS • DD: Forensics for ICS networks is technically/legally challenging and underdeveloped • VSa, DD: Everybody is a potential attacker

  5. What Are the Solutions? • VSa, VR: Idea of “system” expands to entire lifecycle, all supporting/interdependent systems • VSa: Mitigate the “unknown unknowns” • VR DD: Develop real-time simulators including real hardware and virtual simulators • VR: Develop multidisciplinary approach to research, education, and training • VR: Include security in the development phase; don’t add it on later • VR: Use physical models of the system • DD: Develop “secure cyber ecosystem” with resilience, robustness, and self-healing • DD: Develop automated tools that allow defenders to match the speed of the attacks • DD: Develop lines of communication to allow full response to attack • DD: Passive security monitoring system independent and in parallel with ICS “Prepare for the unexpected” vs “Identify every possible vulnerability”

More Related