Introduction:
Scada Security Challenges and Solutions Training Course Description
SCADA and industrial networks operate as vital supporting infrastructure to critical applications and processes. Their secure, safe, continued availability is not negotiable. This short Scada Security Challenges and Solutions Training course identifies challenges and defines solutions, so that the operational integrity of these mission-critical networked services can be confidently assured.
Thus, the objective of this Scada Security Challenges and Solutions Training course is to familiarize SCADA personnel with the security issues they need to be aware of and provide detailed knowledge of security threats and recognized solutions. Further, Scada Security Challenges and Solutions Training provides students with the tools to assess and mitigate security vulnerabilities — and appreciate the ways in which IT-oriented security measures will help, and understand where unique-to-SCADA approaches are necessary.
Duration: 3-4 days
Related Courses
Customize It:
• If you are familiar with some aspects of Scada Security Challenges and Solutions Training, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Scada Security Challenges and Solutions Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Scada Security Challenges and Solutions Training course in manner understandable to lay audiences.
Objectives:
After completing this course, attendees will be able to:
This course is presented as a workshop program with a series of scada security analysis and design activities. Delegates will have opportunity to develop concepts and interact with others in creating strategies to support and maintain state-of-the-art industrial network security. If the hands-on activity is impractical due to lack of computers, students will be guided through an in-class demonstration of the workshop elements, and be left with software to complete the hands-on part of the course on their own time.
Scada Security Challenges and Solutions Training – Course Outline:
Introduction
•Security Challenges are Universal
•Increased Vulnerability Due To Open Systems Trend
•Increased Vulnerability From Motivated, Knowledgeable Attackers
•Some Documented SCADA Security Failure Incidents
Open Systems Issues Push The Agenda
•Protocols of the Internet Architecture
•Ethernet and Other IT-derived Networks
•Fieldbus Standards
•IEC Standards
•Ethernet/IP and CIP
•Computer Operating Systems; Windows and Unix/Linux
Points of Vulnerability
•The IT Infrastructure
•Leased Infrastructure; Frame Relay and Other Services
•The Sensor/Fieldbus Networks
•Wireless LAN Systems
•Rogue (Undocumented) Dial and Wireless Links
•Infected/Compromised Portable Equipment
•Network Management Systems
SCADA Network Protocols
•Features Common to Most SCADA Networks
•The MODBUS Protocol and Lack of Security
•Demonstration: MODBUS Dialog
•The DNP3 Protocol and Its Security Limitations
•The Near-Universal Trend to Ethernet-Based Networks
•Network Management Systems
Encryption
•Starting With a Secure Physical Environment
•Traditional Purpose of Assuring Privacy is a Minor Issue
•Traditional Symmetric Key Cryptography
•Public Key Cryptography and RSA
•Protecting Field Networks From Intrusion With Encryption
Firewalls and Perimeter Security
•Firewall Design Objectives
•Survey of Firewall Types
•Network Address Translation
•Creating and Populating a SCADA DMZ
•Field-Level Firewalls in the SCADA Network
Access Control and Authorization: Managing Users
•Limitations of User ID’s and Passwords
•Multi-Factor Authentication Methods
•Microsoft’s Active Directory Services
•RADIUS, TACACS and Diameter Authentication Services
Intrusion Detection and Prevention
•NIDS Principles and Features
•Deployment Scenarios
•Packet Signature and Traffic Pattern Analysis
•Strategies For Dealing With The Volumes of Data
Wireless Security Issues
•Wireless Technology Offers Compelling Advantages
•Early Misadventures With Wireless Security
•TKIP and the WPA/IEEE 802.11i Supplemental Standard
•Private Point-to-Point Wireless Services
•Cellular/Mobile Data Networks; Benefits and Risks
Creating and Documenting A Security Solution
•Essential Elements of a Secure Environment
•Promoting User Awareness
•Elements of an Effective Security Policy
•Defining a Model for Internet Access
10 Essential Steps to Improving SCADA Security
•Appendices
•Glossary of Terminology
•Suggestions For Further Reading
•General Index
Whether you are looking for general information or have a specific question, we want to help!
Request More Information