How the Internet of Things Puts SCADA Systems at Risk

-- http://www.govtech.com/security/How-the-Internet-of-Things-Puts-SCADA-Systems-at-Risk.html

As the Internet of Things (IoT) turns into extra pervasive in on a regular basis life, extra industrial methods are related to the Internet, which creates threat to the operational know-how (OT) concerned in working these methods.

That was one of the takeaway messages throughout a symposium on Thursday that mentioned safety points surrounding “supervisory management and information acquisition” (SCADA) methods and the Industrial Internet of Things (IIoT). The occasion was organized by Techwire mum or dad firm e.Republic and sponsored by ForeScout, Intel Security and Dyntek.

Operational know-how refers to all know-how that’s concerned in real-world and time-sensitive processes, and its related SCADA controls pipelines, HVAC methods and factories.

“It’s very important that IT folks know that there are major differences between the IT system and the ramifications if they go down versus what will happen if a system goes down on the SCADA side of the house,” stated Intel Security’s Senior Cyber Security Consultant Khaled Brown throughout the panel dialogue.

Since OT is know-how that was constructed pre-Internet and is goal-oriented, its safety will not be at all times a prime precedence, Brown stated. Others agreed.

“I think it’s still sort of a nascent field which is ironic because industrial systems, operational systems are from a past era,” stated Alex Eisen, a safety researcher for ForeScout. Eisen later continued, “Think about trains, iron, mechanical engineering, electrical engineering and now we find ourselves in this modern world, information age, where a lot of these hard skills and experience is sort of tucked away.”

The panel mentioned dangers to assuming OT and IT methods are usually not related. Brown went on to explain a number of assaults which have occurred as a result of of unknown entanglement between the two methods.

The panelists — which included representatives from SMUD, the Sacramento Regional County Sanitation District, safety firms, and others — mentioned how OT methods could be protected:

1. Checking vulnerability updates — IT staff can preserve updated on OT vulnerabilities by checking in with distributors and drawing consideration to issues.

2. Third-party​ patching — The OT vendor will need to have accepted the patch since any purposes might shut down whereas patches are being made. Even virus safety might shut down the system as a result of the system often creates and deletes new information to satisfy its operate.

three. Physical safety — This means understanding who handles whereas in transit, giving background checks to these ​dealing with and sustaining safety cameras, on a separated community, that may look ahead to that shouldn’t be related to the OT system.

four. Updating interfaces — Maintaining up-to-date maps and lists of the place is working. Not understanding the place issues are means they can’t be secured.

5. Standards compliance — Understanding the requirements that apply to an business and whether or not or not a patch will meet these necessities will enable operators to evaluate the patch’s value and plan threat evaluation.

6. Meeting often with OT — Building relationships with OT operators permits for a extra in-depth understanding of the system and worker issues.

This article was initially revealed on Techwire.

SHARE