Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
Line 1: Line 1:
== Privacy Usability ==
+
== 1) ''How to Attack and Defend Wind Farms'' and 2) ''How OSINT is Used to Penetrate Infrastructure Assets'' ==
  
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''TIME:'''&nbsp; Friday 18 November 2022, 14:00h<br />'''PLACE:'''&nbsp;  Kristen Nygaards Hall (Room 5370), 5th floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
+
| '''TIME:'''&nbsp; Tuesday 29 November 2022, 12:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1th floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
 
Coffee and snaks served.<br />
 
Coffee and snaks served.<br />
 
<br />'''AGENDA:'''<br />
 
<br />'''AGENDA:'''<br />
14:00h Welcome at IFI and AF''Security''<br />14:15 Invited talk<br />
+
14:00 Invited talk<br />
* TITLE: ''Employee-Centric Design of Technical and Organizational Privacy Measures'' &nbsp;
+
* TITLE: ''How to Attack and Defend Wind Farms'' &nbsp;
* SPEAKER: Jan Tolsdorf, Bonn-Rhein-Sieg University of Applied Sciences, Germany
+
* SPEAKER: Sujeet Shenoi, University of Tulsa, USA
| <center>[[File:photo-Jan-Tolsdorf.jpg|150px|link=https://www.h-brs.de/en/inf/jan-tolsdorf]]</center>
+
| <center>[[File:photo-Sujeet-Shenoi.jpg|150px|link=https://faculty.utulsa.edu/faculty/sujeet-shenoi/]]</center>
| <center>&nbsp;&nbsp;[[File:logo-Bonn-Rhein-Sieg.png|300px|link=https://www.h-brs.de/de]]</center>
+
| <center>[[File:Logo-Tulsa.jpg|150px|link=https://utulsa.edu/]]</center>
 
|}
 
|}
* ABSTRACT:<br />The European General Data Protection Regulation (GDPR) requires the implementation of Technical and Organizational Measures (TOMs) to reduce the risk of illegitimate processing of personal data. For these measures to be effective, they must be applied correctly by employees who process personal data under the authority of their organization. However, even data processing employees often have limited knowledge of data protection policies and regulations, which increases the likelihood of misconduct and privacy breaches. To lower the likelihood of unintentional privacy breaches, TOMs must be developed with employees’ needs, capabilities, and usability requirements in mind. This talk provides insights into a user-centric design study with employees of two public institutions in Germany, with the aim of designing a solution to support data processing employees in handling personal data in a privacy-compliant manner. The presentation covers details on the development process and the evaluations.<br />
+
* ABSTRACT:<br />As modern society grows more reliant on wind energy, wind farm deployments will become increasingly attractive targets for malicious entities. The geographic scale of wind farms, remoteness of assets, flat logical control networks and insecure control protocols expose wind farms to a myriad of threats.  This presentation describes the anatomy of a generic wind farm and the attack vectors that can be leveraged to target its information technology, industrial control system and physical assets.  It discusses attack scenarios involving unauthorized wind turbine control, wind turbine damage, wind farm disruption and damage, and substation disruption and damage.  Additionally, it highlights mitigation techniques that provide robust security coverage and reduce negative cyber and physical impacts. The attack surface, targets, scenarios and mitigation techniques presented are common across wind farm deployments.  However, it is still possible to add details about the unique aspects of wind farm assets, configurations and operations in order to develop a holistic risk management program geared for a specific wind farm deployment.<br />
 +
<br />15:15 Invited talk<br />
 +
* TITLE: ''How OSINT is Used to Penetrate Infrastructure Assets'' &nbsp;
 +
* SPEAKER: Sujeet Shenoi, University of Tulsa, USA
 +
* ABSTRACT:<br />OSINT (Open Source Intelligence) is the activity of using openly and publicly available information for doing reconnaissance about a person or an organization. OSINT is used by threat actors as part of the reconnaissance step which is the first step in the Cyber Kill Chain, to find out how targets can be attacked, and to be used as part of an attack. It is therefore obvious that organizations and individuals have an interest in limiting or reducing the amount of information that OSINT can produce about oneself. This talk presents how OSINT is typically used as a preparation for attacks against assets and also discusses how an organization can reduce the potential of OSINT against themselves, to mitigate threat scenarios and to reduce vulnerabilities.<br />
 +
<br />15:45 Discussion<br />
  
'''BIO:''' &nbsp;  
+
'''BIO:''' &nbsp; Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma. An active researcher with specialties in cyber security, cyber operations, critical infrastructure protection and digital forensics, Dr. Shenoi works on exciting “problems” ranging from helping solve homicides to penetrating telecommunications systems, oil and gas pipelines, wind farms and voting machines.  He spearheads the University of Tulsa's elite Cyber Corps Program that trains “MacGyvers” for U.S. government agencies. For his innovative strategies integrating academics, research and service, Dr. Shenoi was named the 1998-1999 U.S. Professor of the Year by the Carnegie Foundation.
<br />Jan Tolsdorf works as a research assistant in the Data and Application Security Group of Prof. Dr.-Ing. Luigi Lo Iacono at Bonn-Rhein-Sieg University of Applied Sciences, Germany. He has recently completed his PhD in Computer Science at the University of Göttingen, Germany. Jan’s research activities are in the area of usable security and privacy. The Talk covers findings from his research focusing on the study of human factors in privacy in the employment context.
+
 
 +
 
 +
<br /><br />
  
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"

Revision as of 12:44, 19 November 2022

1) How to Attack and Defend Wind Farms and 2) How OSINT is Used to Penetrate Infrastructure Assets

TIME:  Tuesday 29 November 2022, 12:00h
PLACE:  Auditorium Smalltalk, 1th floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

Coffee and snaks served.

AGENDA:
14:00 Invited talk

  • TITLE: How to Attack and Defend Wind Farms  
  • SPEAKER: Sujeet Shenoi, University of Tulsa, USA
Photo-Sujeet-Shenoi.jpg
Logo-Tulsa.jpg
  • ABSTRACT:
    As modern society grows more reliant on wind energy, wind farm deployments will become increasingly attractive targets for malicious entities. The geographic scale of wind farms, remoteness of assets, flat logical control networks and insecure control protocols expose wind farms to a myriad of threats. This presentation describes the anatomy of a generic wind farm and the attack vectors that can be leveraged to target its information technology, industrial control system and physical assets. It discusses attack scenarios involving unauthorized wind turbine control, wind turbine damage, wind farm disruption and damage, and substation disruption and damage. Additionally, it highlights mitigation techniques that provide robust security coverage and reduce negative cyber and physical impacts. The attack surface, targets, scenarios and mitigation techniques presented are common across wind farm deployments. However, it is still possible to add details about the unique aspects of wind farm assets, configurations and operations in order to develop a holistic risk management program geared for a specific wind farm deployment.


15:15 Invited talk

  • TITLE: How OSINT is Used to Penetrate Infrastructure Assets  
  • SPEAKER: Sujeet Shenoi, University of Tulsa, USA
  • ABSTRACT:
    OSINT (Open Source Intelligence) is the activity of using openly and publicly available information for doing reconnaissance about a person or an organization. OSINT is used by threat actors as part of the reconnaissance step which is the first step in the Cyber Kill Chain, to find out how targets can be attacked, and to be used as part of an attack. It is therefore obvious that organizations and individuals have an interest in limiting or reducing the amount of information that OSINT can produce about oneself. This talk presents how OSINT is typically used as a preparation for attacks against assets and also discusses how an organization can reduce the potential of OSINT against themselves, to mitigate threat scenarios and to reduce vulnerabilities.


15:45 Discussion

BIO:   Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma. An active researcher with specialties in cyber security, cyber operations, critical infrastructure protection and digital forensics, Dr. Shenoi works on exciting “problems” ranging from helping solve homicides to penetrating telecommunications systems, oil and gas pipelines, wind farms and voting machines. He spearheads the University of Tulsa's elite Cyber Corps Program that trains “MacGyvers” for U.S. government agencies. For his innovative strategies integrating academics, research and service, Dr. Shenoi was named the 1998-1999 U.S. Professor of the Year by the Carnegie Foundation.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png