50 likes | 195 Views
TTU NSF-SFS Workshop on Cybersecurity for Critical Infrastructure. Day One Wrap-Up. Themes. What is “critical infrastructure”? How is cybersecurity for critical infrastructure different from cybersecurity for information systems? What are the new challenges?
E N D
TTU NSF-SFS Workshop onCybersecurity for Critical Infrastructure Day One Wrap-Up
Themes • What is “critical infrastructure”? • How is cybersecurity for critical infrastructure different from cybersecurity for information systems? • What are the new challenges? • What are the emerging solutions?
What is Critical Infrastructure? • JU: “Vital assets, systems, networks” • JU: Power grid, transportation systems, financial networks • VSa: “Cyberphysical systems” • VSa: Aircraft, spacecraft, tanks, ships, weapons systems • VSa: Heterogeneous elements & skills • VSa: “Systems of systems” • VR: “Smart Grid” • DD: Industrial control systems • VR, DD: superposition of real-time 24/7 physical infrastructure with information infrastructure • VR, DD: Physical sensing and modeling intrinsic • VR: Renewable energy = smaller, distributed sources Complex networks including physical and information components
What Are the Challenges? • JU, VR: Cybersecurity for critical infrastructure lags cybersecurity for information systems • VSa: “Countably infinite” complexity • VSa: Abstraction hides complexity, creates vulnerabilities • VSa, VR: Capabilities = Vulnerabilities • VSa, VR, DD: Solutions must acknowledge limited resources • DD: No tradition/awareness of cyber vulnerability for industrial control systems • DD: Security impacts performance • DD: Cybersecurity is recent concern in ICS • DD: Forensics for ICS networks is technically/legally challenging and underdeveloped • VSa, DD: Everybody is a potential attacker
What Are the Solutions? • VSa, VR: Idea of “system” expands to entire lifecycle, all supporting/interdependent systems • VSa: Mitigate the “unknown unknowns” • VR DD: Develop real-time simulators including real hardware and virtual simulators • VR: Develop multidisciplinary approach to research, education, and training • VR: Include security in the development phase; don’t add it on later • VR: Use physical models of the system • DD: Develop “secure cyber ecosystem” with resilience, robustness, and self-healing • DD: Develop automated tools that allow defenders to match the speed of the attacks • DD: Develop lines of communication to allow full response to attack • DD: Passive security monitoring system independent and in parallel with ICS “Prepare for the unexpected” vs “Identify every possible vulnerability”