Skip to main content

2013 | OriginalPaper | Buchkapitel

Cyber Security for Chemical Plants

verfasst von : Maurizio Martellini, Stephanie Meulenbelt, Krzysztof Paturej

Erschienen in: Cyber Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

“Cyber Security for Chemical Plants” by Maurizio Martellini, Stephanie Meulenbelt and Krzysztof Paturej provides a technical analysis of possible cyber attacks towards critical infrastructures in chemical industry and chemical safety. The paper analyses attacks and possible countermeasures such as those aimed at sabotage, those exploit the SCADA systems like Stuxnet, and those aimed at espionage, such as Flame. The paper also pictures a possible involvement of the Organization for the Prohibition of Chemical Weapons (OPCW) in cyber security for chemical plants.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Industrial control systems are computerized systems that open and close valves, switches, and factory processes vital to the chemical, industrial, and power sectors.
 
2
In 2011, the US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) received 198 reports of incidents, compared to just nine incidents reports in 2009.
 
3
The virus was infecting Microsoft’s Windows operating systems using several flaws that had not been detected before (called a “zero days”). Such flaws can be sold on the black market for as much as $100,000 each.
 
4
SCADA systems are used to monitor and control processes in industrial facilities and public utilities, such as chemical plants, electric power plants, refineries, oil and gas pipelines, wastewater treatment, and other installations. Large and complex SCADA installations can cover a large geographical area, especially if they include a grid.
 
5
The recovered samples have been created after the last-discovered version of Stuxnet.
 
6
For Stuxnet to be effective, for instance, its creators needed to know exactly the computer configurations that were used in the facility in Natanz. Traces of an early version of Stuxnet, exploring, scanning, and recording what it found, have been found in 2009. It is believed that the Duqu virus serves a similar purpose.
 
7
The Iranian oil sector was at the time already struggling to combat another virus called “Wiper”. The Wiper virus has erased data on hard drives inside the Iranian Ministry of Oil in April 2012. Wiper could be one of Flame’s command modules.
 
8
A total of 29 companies in the chemical sector were confirmed to be targeted in this attack wave and another 19 in various other sectors, primarily the defence sector, were seen to be affected as well. These 48 companies are the minimum number of companies targeted and likely other companies were also targeted. Companies affected include: Multiple Fortune 100 companies involved in research and development of chemical compounds and advanced materials; Companies that develop advanced materials primarily for military vehicles; and companies involved in developing manufacturing infrastructure for the chemical and advanced materials industry.
 
9
This application is freely available from poisonivy-rat.com. It comes fully loaded with a number of plug-ins to give an attacker complete control of the compromised computer.
 
10
The UK Intelligence Agency GCHQ, for instance, estimates that 80 % of the cyber-attacks can be dealt with by better computer ‘hygiene’.
 
11
These are all initiatives by the US’s Department of Homeland Security. To obtain a copy of the documents, or for more information, contact: http://​www.​dhs.​gov.
 
15
For instance, in late 2006, US Congress passed a law that gave the Department of Homeland Security (DHS) the authority to regulate the US’s highest risk chemical facilities and directs DHS to develop chemical facility security regulation. On 9 April 2007, the DHS published the Chemical Facility Anti-Terrorism Standards (CFATS) in response (available at http://​www.​dhs.​gov/​files/​programs/​gc_​1169501486179.​shtm).
 
16
Remarkable in this respect is the fact that the US Bill that sought to protect computer networks running the power grid, gas pipelines and water supply and transportation systems from hackers by creating a set of security standards for companies to meet, known as the Cybersecurity Act of 2012, was voted down by the Senate on Thursday 2 August 2012, despite warnings that hackers could shut down critical infrastructure with the click of a mouse. Republicans opposed the Bill, siding with business lobbyists who claimed that any security standards, even voluntary ones, would unfairly saddle business with cositly regulations. This means that key US national security legislation will likely not be addressed until 2013.
 
17
For more information, contact: Mr. K. Paturej, Director OSP, email: krzysztof.​paturej@msz.​gov.​pl .
 
18
In the nuclear area some efforts in this respect have been made as well; for instance, IAEA Evaluation Worksheets or NUREG/CR-6847, “Cyber Security Self-Assessment Method for U.S. Nuclear Power Plants”.
 
19
For instance, the US National Cyber Security Division has established a mechanism to report vulnerabilities and incidents. Available at: https://​forms.​us-cert.​gov/​report/​.
 
Literatur
Zurück zum Zitat European Union (2012) Council Decision 2012/166/CFSP of 23 March 2012 European Union (2012) Council Decision 2012/166/CFSP of 23 March 2012
Zurück zum Zitat OPCW, Opening statement by the director-general to the executive council at its sixty-ninth session, 10 July 2012, EC-69/INF.3 (2012) OPCW, Opening statement by the director-general to the executive council at its sixty-ninth session, 10 July 2012, EC-69/INF.3 (2012)
Zurück zum Zitat T. Rid, P. McBurney, Cyber-weapons. RUSI J. 157(1), 6–13 T. Rid, P. McBurney, Cyber-weapons. RUSI J. 157(1), 6–13
Zurück zum Zitat The UK Intelligence Agency GCHQ, for instance, estimates that 80% of the cyber-attacks can be dealt with by better computer ‘hygiene’ (Hopkins op.cit) The UK Intelligence Agency GCHQ, for instance, estimates that 80% of the cyber-attacks can be dealt with by better computer ‘hygiene’ (Hopkins op.cit)
Metadaten
Titel
Cyber Security for Chemical Plants
verfasst von
Maurizio Martellini
Stephanie Meulenbelt
Krzysztof Paturej
Copyright-Jahr
2013
DOI
https://doi.org/10.1007/978-3-319-02279-6_4