Utilities Sector & Cybersecurity: Staying Ahead of Cybercriminals

2022-11-18 23:07:02
关注

Utilities Sector & Cybersecurity: Staying Ahead of Cybercriminals
Illustration: © IoT For All

Like all critical infrastructure, U.S. utilities are prone to cyber threats, even in peacetime. It is important to note that with all that is going on between Russia and Ukraine, security is also becoming more of a focus for consumers. According to our survey of American utility users in March of this year, hackers bringing down internal systems were identified as a potential risk to utility supply by 46.9 percent of recipients. Let’s take a look a the importance of cybersecurity for the utility sector.

Utilities looking to embed and maintain a strategic cybersecurity program should constantly review their systems and technology alongside their connectivity partners.' -Alastair MacLeodClick To Tweet

The Digital Battlefield

Cybercriminals are looking for innovative ways to exploit the economic value of the utility sector. Meanwhile, hacktivists seek ways to publicly leverage their opposition to political or environmental agendas by disabling facilities through, for example, a distributed denial of service (DDOS). This digital battlefield is being fought in myriad ways, from disruption to enterprise systems that underpin a utility company’s commercial and human operations, and even more malign intervention of operational technology, designed to inflict severe disruption to civil society. The “AcidRain” malware attack in February of this year caused severe, prolonged disruption to operations on a mass scale. The attack wiped out Viasat’s KA-SAT broadband service’s satellite modems, impacting thousands in Ukraine and further across Europe.

Countering the Threat

According to IBM, the energy industry ranked fifth in overall data breach costs in 2021, and cybersecurity in the utility sector brings with it additional considerations. It is a highly regulated industry where breaches can be costly by any other industry’s standards. Moreover, costs associated with ransomware or cyberattacks can quickly escalate. Between 2020 and 2021, there was a reported 10 percent increase from $3.86 million to $4.24 million per data breach incident. Then, there is the length of time it takes to discover a breach, and the longer the breach goes unnoticed, the more expensive and/or disruptive the incident. And finally, there are the fines incurred from regulatory bodies, both in the E.U. and U.S.

However, it is not all bad news. Cybersecurity is already a priority for utility firms, and there are many ways to counter these threats, starting with recognizing this inherent vulnerability and embedding a culture of awareness that shapes more secure behavior, processes, and system design. This is especially true of the operational technology (OT), focusing on telemetry which measures and identifies trends across the utility network, and/or SCADA (Supervisory Control and Data Acquisition) which controls the system architecture.

Private Networks: How They Can Help

Risk increases when data is exposed to the open internet, which is why utilities must leverage cybersecurity and control using the latest IP technology: Securely operating within public networks or operating via secure, private networks. Private networks and dedicated hubs, such as those within a TSAT satellite system, maintain a vital air gap between telemetry and control and open public networks. On the other hand, enterprise systems are often routed through internet protocols and are inherently more visible. Simply, in an ideal world, SCADA and telemetry data will not be mixed with enterprise traffic. Secure separation helps ensure this data doesn’t fall into the wrong hands.

After all, a sub-station with limited security can be disabled leading to regional power-loss, or worse still, large-scale disconnection at a grid’s source. If a hacker has knowledge of how a grid is being used and can interrupt the control of grid assets at the same time, they have all the power they need for a checkmate. If the first principle of security is to separate the data’s carrier and storage, nowhere is this more important than on the cloud where the superficially attractive proposition of cost savings can lure one into holding telemetry data along with all other data used across the organization’s operations.

Paradoxically, some of the legacy technology still widely used, such as Serial Peripheral Interface (SPI), are more secure due to insulation by virtue of a physical connection. Although new IP-enabled technologies are currently deployed, this only takes place when protected within a private network or software-defined trusted network. There are plenty of examples that illustrate the level of disruption water and energy supplies are prone to. Last year, a cyberattack forced operator Colonial Pipeline to temporarily shut down 5,500 miles of pipeline when an attempt was made to tamper with the levels of sodium hydroxide in Oldsmar, Florida’s water supply. More recently in Ukraine, hostile intervention has led to the disabling of energy in wind farms.

In addition, the control of water flow becomes more critical with the increasing impact of climate change. Extremes necessitate accurate prediction and timely response to rapidly changing conditions. This must be controlled using the latest IP technology, all of which must be securely operated within public networks or operated via secure private networks. In the same way, managing diminished supplies of energy between, and within countries, depends on intelligent, smart technology automatically distributing supply to wherever it is required. It is essential that, in addition to the protection of static data, how data moves is equally resilient, and that in turn means having backup systems in place.

Secure IoT Now

As IoT becomes more embedded in industry day-to-day, it becomes vital that all devices and local networks associated have the necessary software to protect them. One such way is through software-defined wide area network (SD-WAN) technology, which keeps data locked down and secured from the outside world. At the same time, the technology ensures consistent application performance and resilience by automatically steering traffic in an application-driven manner based on business intent, security protocols, and WAN architecture. Primary bearers and platforms need to have alternatives in place, which means satellite, LTE, and 4G/5G solutions. Because telemetry data requires less bandwidth than much of the traffic going over an enterprise system, it can also be more difficult to trace, though we advise all our clients to have these backup solutions in place.

Utilities looking to embed and maintain a strategic cybersecurity program should constantly review their systems and technology alongside their connectivity partners. This is necessary to identify gaps and opportunities based on whatever threat intelligence protocols they have in place to increase situational awareness across teams.

Tweet

Share

Share

Email

  • Connectivity
  • Cybersecurity
  • IT and Security
  • Privacy
  • Security

  • Connectivity
  • Cybersecurity
  • IoT Business Strategy
  • IT and Security
  • Privacy

参考译文
公用事业部门与网络安全:领先于网络罪犯
插图:© IoT For All --> 与所有关键基础设施一样,即使在和平时期,美国的公用事业机构也面临网络威胁。值得注意的是,在俄罗斯与乌克兰之间局势频发的当下,安全问题也变得越来越受到消费者关注。根据我们今年三月份对美国公用事业用户进行的一项调查,46.9%的受访者将黑客攻击内部系统认定为公用事业供应的潜在风险。让我们一起看看网络安全对公用事业部门的重要性。想要在公用事业机构中建立并维持战略性网络安全计划的公司,应始终与他们的连接合作伙伴一起,定期审查自身的系统和技术。' -Alastair MacLeod点击推文分享数字战场网络罪犯正在寻找创新方法,利用公用事业部门的经济价值。同时,黑客活动家也在尝试通过分布式拒绝服务(DDOS)等方式,公开利用关闭设施的方式,来表达他们对政治或环境议程的反对。这场数字战场正以各种形式展开,从干扰支撑公用事业公司商业和人力资源运营的企业系统,到更加严重地干扰操作技术(OT),以造成对社会的严重破坏。今年二月,“AcidRain”恶意软件攻击大规模地造成了严重、长期的运营中断。该攻击破坏了Viasat的KA-SAT宽带服务的卫星调制解调器,影响了乌克兰数千用户,并进一步波及整个欧洲地区。应对威胁根据IBM的数据,能源行业在2021年整体数据泄露成本中排名第五,而公用事业部门的网络安全还带来了额外的考虑因素。这是一个高度监管的行业,按照其他行业的标准,数据泄露也可能非常昂贵。此外,与勒索软件或网络攻击相关的成本可能迅速上升。2020年至2021年间,每起数据泄露事件的成本从386万美元增长到了424万美元,增幅为10%。此外,还有发现数据泄露所需的时间,时间越长,事件就越昂贵和/或破坏性越强。最后,还有来自欧盟和美国监管机构的罚款。然而,好消息是,网络安全已经是公用事业公司的重要优先事项,而且有许多方法可以应对这些威胁,从认识到这种固有的脆弱性开始,嵌入一种安全意识文化,从而塑造更安全的行为、流程和系统设计。这在操作技术(OT)上尤为重要,重点关注遥测,其在公用事业网络中测量并识别趋势,或SCADA(SCADA意为“数据采集与监控系统”),用于控制系统架构。专用网络:它们如何帮助当数据暴露在开放互联网中时,风险会增加,这就是为什么公用事业公司必须利用最新的IP技术来实施网络安全和控制:在公共网络中安全运行,或通过安全的专用网络运行。专用网络和专用中心,例如TSAT卫星系统中的设施,能够在遥测与控制和开放公共网络之间维持关键的“气隙”隔离。而企业系统则常常通过互联网协议路由,因此更容易被察觉。简单来说,在理想情况下,SCADA和遥测数据不应与企业流量混合。安全隔离有助于确保这些数据不会落入错误的人手中。毕竟,一个安全薄弱的变电站可能会被瘫痪,造成地区性停电,甚至更糟的是,造成整个电网源头的大规模断电。如果黑客知道电网的使用方式,并能同时干扰电网资产的控制,他们就拥有了完成“一击必杀”的全部力量。安全的第一原则是将数据的载体和存储区分开来,而这一点在云环境中尤为重要,因为表面上有吸引力的成本节约方案可能会诱使人们将遥测数据与其他所有业务运营数据放在一起存储。相反,一些仍在广泛使用的旧技术,比如串行外围接口(SPI),由于物理连接的隔离,反而更加安全。尽管现在正在部署新的IP技术,但这只在它们被部署在专用网络或软件定义的可信网络中时才进行。许多例子都可以说明水和能源供应容易受到的干扰程度。去年,一次网络攻击迫使运营商Colonial Pipeline在佛罗里达州奥尔德斯马尔试图篡改水中的氢氧化钠水平时,暂时关闭了5500英里的管道。最近在乌克兰,敌对干预导致风力发电场的能源供应被中断。此外,随着气候变化影响的加剧,对水流的控制变得更加关键。极端情况需要准确的预测和对快速变化条件的及时响应。这必须使用最新IP技术进行控制,所有操作都必须在公共网络中安全运行,或通过安全专用网络运行。同样,管理国家间及国家内的能源供应减少,也依赖于智能化、智能技术自动分配供应到所需的地方。除了保护静态数据外,数据的传输方式也必须同样具有韧性,这反过来意味着必须建立备用系统。现在安全物联网随着物联网在工业日常运营中的日益普及,所有相关设备和本地网络都必须具备必要的软件保护变得至关重要。一种方式是通过软件定义广域网(SD-WAN)技术,该技术可以将数据锁定并保护起来,使其免受外部攻击。同时,该技术通过根据业务目标、安全协议和广域网架构以应用驱动的方式自动引导流量,从而确保应用程序性能的稳定性和系统韧性。主要的通信通道和平台必须有备用方案,这意味着应使用卫星、LTE以及4G/5G解决方案。由于遥测数据所需的带宽少于企业系统上的大部分流量,它也更难以被追踪,尽管我们建议所有客户都配备这些备用解决方案。想要在公用事业机构中建立并维持战略性网络安全计划的公司,应始终与他们的连接合作伙伴一起,定期审查自身系统和技术。这是必要的,以便基于现有的威胁情报协议识别差距和机会,从而提高团队的整体态势感知能力。推文分享分享邮件 连接网络安全IT与安全隐私安全 --> 连接网络安全物联网业务策略IT与安全隐私
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告
提取码
复制提取码
点击跳转至百度网盘