Supply Chain Security? SEPTEMBER 20, 2013 JESS SMITH RESEARCH - - PowerPoint PPT Presentation

supply chain security
SMART_READER_LITE
LIVE PREVIEW

Supply Chain Security? SEPTEMBER 20, 2013 JESS SMITH RESEARCH - - PowerPoint PPT Presentation

ANNUAL INDUSTRY WORKSHOP NOVEMBER 6-7, 2013 What do you mean, Supply Chain Security? SEPTEMBER 20, 2013 JESS SMITH RESEARCH ENGINEER, PACIFIC NORTHWEST NATIONAL LABORATORY TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG 1


slide-1
SLIDE 1

1

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG

UNIVERSITY OF ILLINOIS | DARTMOUTH COLLEGE | UC DAVIS | WASHINGTON STATE UNIVERSITY

FUNDING SUPPORT PROVIDED BY DOE-OE AND DHS S&T

ANNUAL INDUSTRY WORKSHOP NOVEMBER 6-7, 2013

What do you mean,

Supply Chain Security?

JESS SMITH

RESEARCH ENGINEER, PACIFIC NORTHWEST NATIONAL LABORATORY SEPTEMBER 20, 2013

slide-2
SLIDE 2

2

ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G

Is Supply Chain Security…

Logistics management? Counterfeit detection? Smuggling detection? Intellectual property protection? Risk management? Preventing weapons trafficking? A box on the auditors forms? Protecting data about supply chains? Understanding the sub-contractor tree? Detection of malicious injections?

slide-3
SLIDE 3

3

ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G

A Taxonomy

What is Security? Confidentiality

Preventing unauthorized disclosure

Integrity

Accuracy and consistency

Availability

Accessibility

What is the Supply Chain? Elements

The product (ICs, hotdogs, iPads)

Processes

What we do to elements: transfer, combine, test

Network

The configuration of the processes which are applied on the elements

The network is where processes act upon elements.

slide-4
SLIDE 4

4

ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G

A Map

Confidentiality

Supplier information, contracts, number of available elements in the network secret Exact action steps are secret Intellectual property is kept secret

Integrity

Correct order of processing Workers trained correctly, machines are calibrated Element is what it claims to be (no counterfeiting, malicious injections)

Availability

Disaster management, physical security Workers or electricity are available, instructions provided Element is available when/where needed

Network Processes Elements

slide-5
SLIDE 5

5

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG

UNIVERSITY OF ILLINOIS | DARTMOUTH COLLEGE | UC DAVIS | WASHINGTON STATE UNIVERSITY

FUNDING SUPPORT PROVIDED BY DOE-OE AND DHS S&T

ANNUAL INDUSTRY WORKSHOP NOVEMBER 6-7, 2013

QUESTIONS? JESS SMITH

RESEARCH ENGINEER, PNNL JESS 6 NOV 2013