[LINK] AUSCERT: SCADA connectivity could grow into risky business
Bernard Robertson-Dunn
brd at iimetro.com.au
Tue May 22 15:08:13 AEST 2007
<brd>
We talked about this on Link many years ago before SCADA systems were
ever connected to the internet. IIRC the concensus then was that nobody
would be so stupid.
</brd>
AUSCERT: SCADA connectivity could grow into risky business
U.S. government employee identifies the risks and challenges facing
SCADA systems
Sandra Rossi 22/05/2007 11:24:50
http://www.computerworld.com.au/index.php/id;1732714836
Former White House staffer Marcus Sachs believes that there are
thousands of critical infrastructure attacks that go unreported,
demonstrating the need to educate critical asset owners.
As deputy director of SRI International's computer science laboratory,
Sachs said access to critical infrastructure control systems is easier
than originally thought.
Sachs is responsible for the U.S. Department of Homeland Security's
cybersecurity R&D centre, which is operated by SRI International under
contract. In addition to 20 years in the military, Sachs has also worked
at the National Security Council.
Speaking at AusCERT 2007 about the risks and challenges facing SCADA
systems, he said control systems in decades past have traditionally been
private, and not connected to the Internet.
This has certainly changed today as connectivity has grown, he said.
"Weak security protocols that characterize the Internet have now
transferred to industrial control system," Sachs said.
"In the old days protocols were proprietary, but there is a new trend to
move over to TCP/IP."
Demonstrating vendor advertisements found on the Internet, Sachs showed
how these systems were connected to the Internet so plant managers could
log-on from home. The increased connectivity was said to have created
serious security issues.
"One advertisement demonstrated how to run Modbus on the Internet so you
can log onto the plant's control system from home - how dangerous is
that?" he said.
"Most industries don't report breaches so there is a lot of cover up,
and it is hard to quantify. I believe it happens a lot more than we
realize."
Sachs cited examples of insiders modifying systems, and pointed out that
plant managers generally are more concerned about safety than IT security.
Sachs said there are plenty of threat multipliers in this environment.
For example, he said there is no authentication in most SCADA protocols.
"Machines trust each other. Then there is legacy architectures," Sachs
said. "If vulnerable, they are too costly to upgrade."
Finally, Sachs said there is a serious lack of awareness and education.
"Most of the reported attacks are in the US, Australia and Canada; this
is just the tip of the iceberg," he said.
One major problem is the serious divide between those who manage control
systems and those on the IT side.
He said these are two very different worlds, with totally different
mindsets.
"There is big animosity between the two groups because plant managers
focus on making the plant work and don't see IT as a friend, but an
enemy," Sachs said.
"The big challenge is to bring the two together and bridge the gap."
--
Regards
brd
Bernard Robertson-Dunn
Sydney Australia
brd at iimetro.com.au
More information about the Link
mailing list