A
s a demonstration recently, a device was
connected to the Internet with direct port
forwarding and no firewall to control or block
traffic. Within a few seconds the device had auto-
matically locked down all of its access interfaces,
including – not only unsecure interfaces such asTel-
net – but secure interfaces such as SSH. This ser-
vice lockdown was caused by an overload of incor-
rect login attempts from various locations around
the world. These login attempts were not targeted,
but simply a way to show howmany
automated software programs are
running 24/7 around the world,
and randomly testing different
connections for unprotected ac-
cess interfaces. This was a small
yet highly effective demonstration
of just how unsecure the modern day In-
ternet has become, and why having strong
security measures in place is essential for
even small office networks, never mind
large scale control networks.
Background
The introduction of Ethernet networking
into the utility and industrial worlds was
a definite milestone and brought about
the ability to fully control huge enterprises across
large geographical locations without the need for
thousands of individual hardwired connections
and additional hardware such as signal repeaters
or amplifiers. Ethernet allows for much more gran-
ular remote control and monitoring of both digital
and analogue data over a single infrastructure. As
the standards were widely adopted, the rest of
the industry followed closely, with IEDs, PLCs and
other end devices quickly being developed to di-
rectly support various Ethernet based control tech-
nologies, such as ModbusTCP (for the industrial
side) or IEC61850 [1] (for use in utility networks).
At first these networks were mostly isolated,
smaller networks servicing just a single plant,
substation or factory, but this quickly expanded
to interconnect these smaller sites, with the end
goal being a single network to cover all of a com-
pany’s assets. In some cases this interconnection
is accomplished through company-owned infra-
structure, such as long distance fibre optic cabling
between sites. In most cases the cost required for
these large scale WANs greatly exceeds feasible
budgets, not to mention the hassle required in
installing, monitoring and maintaining such infra-
structure. In these cases the only other options are
to use existing infrastructure from an existing ISP.
Security Requirements
on
Mission Critical Control
Networks
Tim Craven, H3iSquared
The modern day Internet has become unsecure, and having strong security meas-
ures in place is essential for small office networks, and certainly, for large scale
control networks.
Network security is the
most important aspect
to consider when plan-
ning Mission Critical
Networks.
No network will ever be
completely secure from
outside attacks.
In planningMission Criti-
cal Networks, one needs
to think like an attacker
and decide whether the
payoff is worth the effort
involved in implementing
the security.
Take Note!
1
2
3