Cargando…
Summary of the Control System Cyber-Security (CS)2/HEP Workshop
Over the last few years modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, PLCs, SCADA systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming wi...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
2007
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1063600 |
_version_ | 1780913226520723456 |
---|---|
author | Lüders, S |
author_facet | Lüders, S |
author_sort | Lüders, S |
collection | CERN |
description | Over the last few years modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, PLCs, SCADA systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data be altered. The (CS)2/HEP workshop held the weekend before ICALEPCS2007 was intended to present, share, and discuss countermeasures deployed in HEP laboratories in order to secure control systems. This presentation will give a summary of the solutions planned, deployed and the experience gained. |
id | cern-1063600 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2007 |
record_format | invenio |
spelling | cern-10636002019-09-30T06:29:59Zhttp://cds.cern.ch/record/1063600engLüders, SSummary of the Control System Cyber-Security (CS)2/HEP WorkshopEngineeringOver the last few years modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, PLCs, SCADA systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data be altered. The (CS)2/HEP workshop held the weekend before ICALEPCS2007 was intended to present, share, and discuss countermeasures deployed in HEP laboratories in order to secure control systems. This presentation will give a summary of the solutions planned, deployed and the experience gained.CERN-IT-Note-2007-026oai:cds.cern.ch:10636002007-10-17 |
spellingShingle | Engineering Lüders, S Summary of the Control System Cyber-Security (CS)2/HEP Workshop |
title | Summary of the Control System Cyber-Security (CS)2/HEP Workshop |
title_full | Summary of the Control System Cyber-Security (CS)2/HEP Workshop |
title_fullStr | Summary of the Control System Cyber-Security (CS)2/HEP Workshop |
title_full_unstemmed | Summary of the Control System Cyber-Security (CS)2/HEP Workshop |
title_short | Summary of the Control System Cyber-Security (CS)2/HEP Workshop |
title_sort | summary of the control system cyber-security (cs)2/hep workshop |
topic | Engineering |
url | http://cds.cern.ch/record/1063600 |
work_keys_str_mv | AT luderss summaryofthecontrolsystemcybersecuritycs2hepworkshop |