Bridging the air gap

47
ISA Ireland Section Cyber Security Conference 8 th May 2014

description

A presentation I gave to the International Society of Automation Ireland Section on how relying on air gaps to protect ICS and secure networks is a fallacy. This talk highlights actual incidents resulting from the air gap failing and systems being compromised

Transcript of Bridging the air gap

Page 1: Bridging the air gap

ISA Ireland Section

Cyber Security Conference

8th May 2014

Page 2: Bridging the air gap

Who Am I?

Page 3: Bridging the air gap
Page 4: Bridging the air gap

What is an Air Gap?

In networks, an air gap is a type of

security where the network is secured

by keeping it separate from other local

networks and the Internet. While this

provides security, it also limits access

to the network by clients.

Page 5: Bridging the air gap
Page 6: Bridging the air gap
Page 7: Bridging the air gap
Page 8: Bridging the air gap
Page 9: Bridging the air gap
Page 10: Bridging the air gap
Page 11: Bridging the air gap
Page 12: Bridging the air gap
Page 13: Bridging the air gap
Page 14: Bridging the air gap
Page 15: Bridging the air gap
Page 16: Bridging the air gap
Page 17: Bridging the air gap
Page 18: Bridging the air gap
Page 19: Bridging the air gap
Page 20: Bridging the air gap
Page 21: Bridging the air gap
Page 22: Bridging the air gap

Attack Breakdown

CountryType

TotalCritical Noncritical

Netherlands 0 2 2

China 5 2 7

Germany 1 4 5

Kazahkstan 0 1 1

Canada 0 1 1

USA 0 3 3

Australia 0 1 1

Moldova 0 1 1

Ukraine 0 2 2

UK 1 0 1

France 1 0 1

Palestine 2 1 3

Poland 0 1 1

Slovenia 0 1 1

Japan 0 1 1

Russia 0 43 43

Total 10 64 74

Page 23: Bridging the air gap
Page 24: Bridging the air gap
Page 25: Bridging the air gap

April 2000 – Insider & Hackers

Controlled Central Switchboard

Page 26: Bridging the air gap

April 2000 – Remote Access

Maroochy Water Services

Page 27: Bridging the air gap

June 2001 – External Hackers

California Independent System

Operator

Page 28: Bridging the air gap

January 2003 – Bypassed Firewall

Davis-Besse Plant via Contractor

Page 29: Bridging the air gap

October 2006 – Infected Laptop

Harrisburg PA Water Treatment

Page 30: Bridging the air gap

Aug 2007 – Unauthorised Software

Tehama Colusa Canal Authority

Page 31: Bridging the air gap

March 2009 – Disgruntled Employee

Pacific Energy Resources

Page 32: Bridging the air gap

October 2010 – Stuxnet

Page 33: Bridging the air gap

Since 2010 - Specialised Malware

Page 34: Bridging the air gap

Goodbye Air Gap

Page 35: Bridging the air gap

BadBIOS – From 2012

Page 36: Bridging the air gap
Page 37: Bridging the air gap

2012 Annual Incidents Report

Page 38: Bridging the air gap

13

76

8

5

6

0 10 20 30 40 50 60 70 80

Third Party Failure

System Failures

Malicious Actions

Human Errors

Natural Phenomena

% Incidents

Page 39: Bridging the air gap

13

9

4

26

36

0 5 10 15 20 25 30 35 40

3rd Party Failure

System Failures

Malicious Actions

Human Errors

Natural Phenomena

Outage in Hours

Page 40: Bridging the air gap

“Cyber-attacks are

the 6th most

important cause of

outages in

telecommunication

infrastructures,

with an impact on

considerable

numbers of users

in this sector”

Page 41: Bridging the air gap

How To Defend

Page 42: Bridging the air gap
Page 43: Bridging the air gap

Invest in Right Tools

Page 44: Bridging the air gap

Awareness

Page 45: Bridging the air gap

Monitor & Respond

Page 46: Bridging the air gap

Incident Response & Forensics

Page 47: Bridging the air gap

@BrianHonan