Cyber-Physical System Security Alia Long Advanced Research in - - PowerPoint PPT Presentation

cyber physical system security
SMART_READER_LITE
LIVE PREVIEW

Cyber-Physical System Security Alia Long Advanced Research in - - PowerPoint PPT Presentation

Cyber-Physical System Security Alia Long Advanced Research in Cyber Systems (ARCS) Los Alamos National Laboratory LA-UR-17-27644 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA A Cyber-Physical Model


slide-1
SLIDE 1

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

LA-UR-17-27644

Cyber-Physical System Security

Alia Long Advanced Research in Cyber Systems (ARCS) Los Alamos National Laboratory

slide-2
SLIDE 2

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

LA-UR-17-27644

A Cyber-Physical Model

  • Cyber Attack

Cyber Attack

  • Cyber-Enabled Physical Attack 1

Cyber-Enabled Physical Attack

  • Physical-Enabled Cyber Attack 1

Physical-Enabled Cyber Attack

1) J.Deploy et al., Sandia National Laboratories, “”Risk Assessment for Physical and Cyber Attacks on Critical Infrastructures”, IEEE Military Communications Conference, 2005

  • Physical Attack

Physical Attack

slide-3
SLIDE 3

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

LA-UR-17-27644

Cyber-Physical System

A network of coupled heterogeneous components in numbers that may expand and contract dynamically, a feedback system incorporating inputs and controls from each domain.

slide-4
SLIDE 4

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

LA-UR-17-27644

Basic Computer Hygiene

Security, like cleanliness, must be a process Security is well defined for information technology:

  • Authentication and Encryption
  • Defined and Known System
  • Least Function
  • Least Privilege
  • Backups
slide-5
SLIDE 5

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

LA-UR-17-27644

  • Passwords
  • Encryption
  • Identification
  • Least Privilege
  • Technology
  • Regulatory
  • Remoteness
  • Costly Change

Basic Computer Hygiene in Cyber Physical Systems

The vocabulary and technology are designed for IT security.

slide-6
SLIDE 6

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

LA-UR-17-27644

Human Error

Subject Matter Experts (SME) are not trained in cybersecurity, but are more aware of system anomalies.

John Klossner, http://www.jklossner.com/humannature/ For presentation only, not publication.

slide-7
SLIDE 7

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

LA-UR-17-27644

Computer Hygiene Awareness

  • Regular inspection
  • Cross functional analysis
  • Redundancy

Training

Novel research Confidentiality, Integrity, and Availability (CIA) of systems must also support the need for stability, controllability, and observability. Authentication research at LANL, Physical Unclonable Function (PUF) Questions?

Path Forward