Cargando…

Summary of the Control System Cyber-Security (CS)2/HEP Workshop

Over the last few years modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, PLCs, SCADA systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming wi...

Descripción completa

Detalles Bibliográficos
Autor principal: Lüders, S
Lenguaje:eng
Publicado: 2007
Materias:
Acceso en línea:http://cds.cern.ch/record/1063600
_version_ 1780913226520723456
author Lüders, S
author_facet Lüders, S
author_sort Lüders, S
collection CERN
description Over the last few years modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, PLCs, SCADA systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data be altered. The (CS)2/HEP workshop held the weekend before ICALEPCS2007 was intended to present, share, and discuss countermeasures deployed in HEP laboratories in order to secure control systems. This presentation will give a summary of the solutions planned, deployed and the experience gained.
id cern-1063600
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2007
record_format invenio
spelling cern-10636002019-09-30T06:29:59Zhttp://cds.cern.ch/record/1063600engLüders, SSummary of the Control System Cyber-Security (CS)2/HEP WorkshopEngineeringOver the last few years modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, PLCs, SCADA systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data be altered. The (CS)2/HEP workshop held the weekend before ICALEPCS2007 was intended to present, share, and discuss countermeasures deployed in HEP laboratories in order to secure control systems. This presentation will give a summary of the solutions planned, deployed and the experience gained.CERN-IT-Note-2007-026oai:cds.cern.ch:10636002007-10-17
spellingShingle Engineering
Lüders, S
Summary of the Control System Cyber-Security (CS)2/HEP Workshop
title Summary of the Control System Cyber-Security (CS)2/HEP Workshop
title_full Summary of the Control System Cyber-Security (CS)2/HEP Workshop
title_fullStr Summary of the Control System Cyber-Security (CS)2/HEP Workshop
title_full_unstemmed Summary of the Control System Cyber-Security (CS)2/HEP Workshop
title_short Summary of the Control System Cyber-Security (CS)2/HEP Workshop
title_sort summary of the control system cyber-security (cs)2/hep workshop
topic Engineering
url http://cds.cern.ch/record/1063600
work_keys_str_mv AT luderss summaryofthecontrolsystemcybersecuritycs2hepworkshop