Академический Документы
Профессиональный Документы
Культура Документы
Mihai Ru
2
RRC Romania
3
Since 1993 Check Point is The Network Security Leader - 100%
focused in Security
Secure Web
Blue Coat
Protection
Symantec
Endpoint
Platform
(EPP) Websense
Trend Micro
GW
Zscaler
McAfee
McAfee
Sophos
Cisco (IronPort)
Arbor
Palo Alto Networks
Prolexic
Fortinet
Juniper
Cisco
Fortinet
Vmware (Vshield)
Corero
FireEye
Websense (DSS)
Mcafee
Symantec (DLP)
PAN
McAfee (DLP)
Fortinet
2014 RRC & Check Point Software Technologies Ltd .
5
Critical Infrastructure at Risks
Stuxnet
DuQu
Flame
Gauss
In 2013, ICS-CERT responded to 256 incidents reported either directly from asset
owners or through other trusted partners.
ICS-CERT assesses that many incidents are not detected due to a lack of sufficient
detection or logging capabilities.
Computers and manuals sized in Al Quaeda cams full of SCADA info related to
dams and related dam infrastructure
2014 RRC & Check Point Software Technologies Ltd .
10
Why attacks can happen ?
If you have logical access to a PLC you can Read, Write and otherwise Access the
tags/points. Write commands change the process, i.e. open or close valves, raise
temperatures, turn things on or off. It is how operators control the process. These are
ICS protocols that are insecure by design.
The SCADA and ICS are insecure by design and in most cases dont
require an exploit to affect the process in disastrous ways.
URL Threat
Antivirus Application Identity
FW & VPN IPS Anti-Malware Filtering DLP Emulation
Control Awareness
Security system
Security Awarenes