51 research outputs found

    Intrusion Detection in SCADA Networks

    Full text link

    Liga de enfermagem em urgência e emergência: espaço acadêmico de educação em saúde à comunidade

    Get PDF
    Anais do 35º Seminário de Extensão Universitária da Região Sul - Área temática: SaúdeIntrodução: A educação em saúde pode ser concretizada de diversas formas e em múltiplos contextos, na área da saúde, e mais especificamente na área da urgência e emergência, o presente projeto de extensão tem buscado a educação em saúde como forma de capacitar a comunidade para reconhecer uma emergência e realizar seus primeiros atendimentos de maneira segura. Oferecer capacitações para a comunidade é uma forma efetiva de aumentar a sobrevida em casos de emergência. Acidentes podem apresentar-se a qualquer momento e em qualquer ambiente da vida cotidiana, a partir desse fato emergiu a ideia de proporcionar à comunidade capacitações sobre primeiros socorros, visando contribuir para o reconhecimento e para as tomadas de atitudes frente aos agravos de saúde que necessitem de ação rápida e efetiva. Objetivo: Inserir acadêmicos de graduação e de pós-graduação em Enfermagem no planejamento e desenvolvimento de ações voltadas à prevenção de acidentes domésticos e à educação para urgência e emergência envolvendo crianças, adultos e idosos. Metodologia: Vem sendo desenvolvida a prática pedagógica reflexiva, por meio de educação interativa. Esse modelo tem característica viva e oferece constante mudança, através dele o discente torna-se parte da construção do conhecimento. Resultados: A Liga de Enfermagem em Urgência e Emergência iniciou suas atividades em abril de 2017 e já tem realizado ações educativas junto à comunidade, informando e conscientizando a população sobre os processos de suporte básico de vida, prevenção de acidentes domésticos e primeiros socorros. Atualmente, conta com 30 ligantes. São realizadas reuniões periódicas nas quais ocorrem capacitações internas e planejamentos de atividades de extensão. Considerações Finais: Percebe-se que esse projeto de extensão apresenta contribuições tanto para os ligantes, quanto para a comunidade alcançada por meio de suas ações desenvolvidas, as quais proporcionam uma formação cidadã de profissionais enfermeiros, e também, educação permanente para a comunidad

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    Securing future decentralised industrial IoT infrastructures: challenges and free open source solutions

    Get PDF
    peer-reviewedThe next industrial revolution is said to be paved by the use of novel Internet of Things (IoT) technology. One important aspect of the modern IoT infrastructures is decentralised communication, often called Peer-to-Peer (P2P). In the context of industrial communication, P2P contributes to resilience and improved stability for industrial components. Current industrial facilities, however, still rely on centralised networking schemes which are considered to be mandatory to comply with security standards. In order to succeed, introduced industrial P2P technology must maintain the current level of protection and also consider possible new threats. The presented work starts with a short analysis of well-established industrial communication infrastructures and how these could benefit from decentralised structures. Subsequently, previously undefined Information Technology (IT) security requirements are derived from the new cloud based decentralised industrial automation model architecture presented in this paper. To meet those requirements, state-of-the-art communication schemes and their open source implementations are presented and assessed for their usability in the context of industrial IoT. Finally, derived building blocks for industrial IoT P2P security are presented which are qualified to comply with the stated industrial IoT security requirements

    Avoiding the internet of insecure industrial things

    Get PDF
    Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Information Security (NIS) Directive 2016 and the General Data Protection Regulation 2016 (GDPR) (both to be enforced from May 2018). We use the case study of the emergent smart energy supply chain to frame, scope out and consolidate the breadth of security concerns at play, and the regulatory responses. We argue the industrial IoT brings four security concerns to the fore, namely: appreciating the shift from offline to online infrastructure; managing temporal dimensions of security; addressing the implementation gap for best practice; and engaging with infrastructural complexity. Our goal is to surface risks and foster dialogue to avoid the emergence of an Internet of Insecure Industrial Things

    Intrusion Detection in SCADA Networks

    Get PDF
    Supervisory Control and Data Acquisition (SCADA) sys- tems are a critical part of large industrial facilities, such as water dis- tribution infrastructures. With the goal of reducing costs and increas- ing efficiency, these systems are becoming increasingly interconnected. However, this has also exposed them to a wide range of network security problems. Our research focus on the development of a novel flow-based intrusion detection system. Based on the assumption that SCADA net- works are well-behaved, we believe that it is possible to model the normal traffic by establishing relations between network flows. To improve ac- curacy and provide more information on the anomalous traffic, we will also research methods to derive a flow-based model for anomalous flows
    corecore