Graded security forensics readiness of SCADA systems

نویسندگان

  • Jianghai Li
  • Edita Bajramovic
  • Yuan Gao
  • Mithil Parekh
چکیده

Security event logs are major indicators for the timely discovery of cyberattacks and during security incident examinations. Collection of sufficient logs of events associated with security incident time is critical for effective investigation. SCADA systems logging capabilities are intended for identifying and detecting process disruptions, not security incidents, and are frequently not suitable for digital forensic investigation [Ta13]. Nevertheless, logs provide tremendous support during digital forensics investigations as they consist of vast amounts of information, e.g. step-by-step events that occurred in a system in question, including time stamping [AIJ12]. In addition, logging is a major element of forensic readiness. Numerous tools and methods contribute to log monitoring, e.g. evaluating log records and correlating them through various systems. This can assist in incident handling, identifying policy violations, auditing, and other efforts. Within the general context described above and the more specific graded security approach of IEC 62443-x-x, this paper will identify cybersecurity specific SCADA component requirements, preconditions for subsequent forensic investigations, collecting potential digital evidence, graded forensic-related security controls, and forensic readiness during SCADA lifecycle phases.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems

SCADA and industrial control systems have been traditionally isolated in physically protected environments. However, developments such as standardisation of data exchange protocols and increased use of IP, emerging wireless sensor networks and machine-to-machine communication mean that in the near future related threat vectors will require consideration too outside the scope of traditional SCAD...

متن کامل

Workshop on new security standards for IACS/SCADA industrial systems

The IACS/SCADA-Security WS aims at Security Standards and Practice for Industrial Systems integrated by a sort of Distributed Middleware I4.0. A short tutorial into Security Standards is given by the WS Co-Chairs. In-depth aspects of this issue is discussed and presented by the invited authors from China, UK and Germany presenting: IEC 62443 Security Standards Humans, the strongest and weakest ...

متن کامل

The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems

There is continuing interest in researching generic security architectures and strategies for managing SCADA and process control systems. Documentation from various countries on IT security does now begin to recommendations for security controls for (federal) information systems which include connected process control systems. Little or no work exists in the public domain which takes a big pict...

متن کامل

Cyberspace Forensics Readiness and Security Awareness Model

The goal of reaching a high level of security in wireless and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs). However, these logs are increasingly b...

متن کامل

Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems

The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates [18]. PKI systems are today one of the most accepted and used technologies to enable successful implementation of information systems security services such as authentication and confidentiality. Digital forensics is a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016