[Infowarrior] - Non-Profit Targets Cyber-Security in Plants

Richard Forno rforno at infowarrior.org
Wed Sep 23 14:50:01 UTC 2009


Non-Profit Targets Cyber-Security in Plants
by Stephanie Neil, MA Editorial Staff

http://www.managingautomation.com/maonline/news/read/NonProfit_Targets_CyberSecurity_in_Plants_33037

The move from proprietary, non-networked control systems in the plant  
to off-the-shelf, open applications that share information across  
industrial and business networks is a double-edged sword for  
manufacturers. On one side, people are more productive; on the other  
side, SCADA and process control systems are falling victim to hackers  
and network viruses.


Getting a handle on how to manage cyber-threats, however, has always  
been a bit tricky. Reporting an industrial incident to organizations  
such as the government-backed CERT program, which tracks Internet and  
network security attacks, accidents, and failures, could expose a  
company’s network vulnerability or create a legal liability. As a  
result, many manufacturers keep a lid on their own security issues,  
which limits knowledge sharing that could help the industrial  
community as a whole.


Enter the Security Incidents Organization, a newly formed non-profit  
group that provides public access to its Repository of Industrial  
Security Incidents (RISI). Established in July, the group maintains an  
industry-wide repository for collecting, investigating, analyzing, and  
sharing critical information regarding cyber-security incidents that  
directly affect SCADA and process control systems.


The RISI database dates back to 2001, when it was housed at the  
British Columbia Institute of Technology (BCIT) as part of a research  
project that was shut down in 2006. At that time, BCIT faculty member  
Eric Byres purchased the database and continued to collect data on  
incidents. His company, Byres Research, was acquired by safety and  
security services firm exida earlier this year.


Exida’s intent was to resurrect the database and make it available to  
the industry in a cost-effective model. “We also had to figure out a  
way to incentivize companies to report incidents so that it is not a  
static database, but dynamic and growing,” said John Cusimano, exida’s  
director of security services and the executive director of the  
Security Incidents Organization.


To encourage participation, the group, which is directed by an  
advisory board of manufacturers, vendors, and consultants, will  
provide a complimentary three-month membership (or extend a current  
membership for three months) with each unique incident reported. Basic  
introductory membership is $195 per year for an individual, but  
corporate memberships are available, as well as incident and analysis  
reports for an additional fee.


The group researches each reported incident before posting it in the  
database, which is the real value of the service. “The purpose of the  
database is to separate fact from fiction,” Cusimano said.


Currently, there are 154 incidents in the database related to industry  
cyber-security. The majority of cases have been from outside attacks.  
Some are accidental events, such as a virus or worm that gets into the  
business network and works its way into the control system. Then there  
is the problem of the disgruntled employee. “There are not a lot of  
those, but the amount of damage they do is significant,” Cusimano said.


While the vast majority of cases reported involve a line shutdown that  
disrupts production, worst-case scenarios involve disabling safety  
systems or altering production so that a product is not salable or  
does not meet specification. The goal of the RISI database is to  
provide manufacturers with a tool that helps avoid such catastrophic  
situations. 


More information about the Infowarrior mailing list