cyber physical system security
play

Cyber-Physical System Security Alia Long Advanced Research in - PowerPoint PPT Presentation

Cyber-Physical System Security Alia Long Advanced Research in Cyber Systems (ARCS) Los Alamos National Laboratory LA-UR-17-27644 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA A Cyber-Physical Model


  1. Cyber-Physical System Security Alia Long Advanced Research in Cyber Systems (ARCS) Los Alamos National Laboratory LA-UR-17-27644 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

  2. A Cyber-Physical Model • Cyber Attack Physical-Enabled Cyber Attack • Cyber-Enabled Physical Attack 1 • Physical-Enabled Cyber Attack 1 Physical Attack • Physical Attack Cyber Attack Cyber-Enabled Physical Attack 1) J.Deploy et al., Sandia National Laboratories, “”Risk Assessment for Physical and Cyber Attacks on Critical Infrastructures”, IEEE Mil itary Communications Conference, 2005 LA-UR-17-27644 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

  3. Cyber-Physical System A network of coupled heterogeneous components in numbers that may expand and contract dynamically, a feedback system incorporating inputs and controls from each domain. LA-UR-17-27644 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

  4. Basic Computer Hygiene Security, like cleanliness, must be a process Security is well defined for information technology: • Authentication and Encryption • Defined and Known System • Least Function • Least Privilege • Backups LA-UR-17-27644 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

  5. Basic Computer Hygiene in Cyber Physical Systems • Passwords • Encryption • Identification The vocabulary • Least Privilege and technology • Technology are designed for • Regulatory IT security. • Remoteness • Costly Change LA-UR-17-27644 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

  6. Human Error Subject Matter Experts (SME) are not trained in cybersecurity, but are more aware of system anomalies. John Klossner, http://www.jklossner.com/humannature/ For presentation only, not publication. LA-UR-17-27644 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

  7. Path Forward Computer Hygiene Awareness • Regular inspection • Cross functional analysis • Redundancy Training Novel research Confidentiality, Integrity, and Availability (CIA) of systems must also support the need for stability, controllability, and observability. Authentication research at LANL, Physical Unclonable Function (PUF) Questions? LA-UR-17-27644 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend