Difference between revisions of "29 November 2022"

From mn/ifi/AFSecurity
Jump to: navigation, search
Line 1: Line 1:
 
== AF''Security'' Seminar ==
 
== AF''Security'' Seminar ==
== Cyber Security of Wind Farms ==
+
== Wind Farm Security==
  
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
Line 8: Line 8:
 
<br />'''AGENDA:'''<br />
 
<br />'''AGENDA:'''<br />
 
14:00h Welcome at IFI and AF''Security''<br />14:15 Invited talk<br />
 
14:00h Welcome at IFI and AF''Security''<br />14:15 Invited talk<br />
* TITLE: ''Cyber Security of Wind Farms'' &nbsp;
+
* TITLE: ''How to Attack and Defend Wind Farms'' &nbsp;
 
* SPEAKER: Sujeet Shenoi, University of Tulsa, USA  
 
* SPEAKER: Sujeet Shenoi, University of Tulsa, USA  
 
| <center>[[File:photo-Sujeet-Shenoi.jpg|150px|link=https://regis.academia.edu/EMoore]]</center>
 
| <center>[[File:photo-Sujeet-Shenoi.jpg|150px|link=https://regis.academia.edu/EMoore]]</center>
 
| <center>[[File:Logo-Tulsa.jpg|150px|link=https://utulsa.edu/]]</center>
 
| <center>[[File:Logo-Tulsa.jpg|150px|link=https://utulsa.edu/]]</center>
 
|}
 
|}
* ABSTRACT:<br />T.B.A.<br />
+
* ABSTRACT:<br />As modern society grows more reliant on wind energy, wind farm deployments will become increasingly attractive targets for malicious entities. The geographic scale of wind farms, remoteness of assets, flat logical control networks and insecure control protocols expose wind farms to a myriad of threats. This presentation describes the anatomy of a generic wind farm and the attack vectors that can be leveraged to target its information technology, industrial control system and physical assets.  It discusses attack scenarios involving unauthorized wind turbine control, wind turbine damage, wind farm disruption and damage, and substation disruption and damage.  Additionally, it highlights mitigation techniques that provide robust security coverage and reduce negative cyber and physical impacts. The attack surface, targets, scenarios and mitigation techniques presented are common across wind farm deployments.  However, it is still possible to add details about the unique aspects of wind farm assets, configurations and operations in order to develop a holistic risk management program geared for a specific wind farm deployment.<br />
  
'''BIO:''' &nbsp; Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma; and a member of the technical staff at Johns Hopkins University Applied Physics Laboratory, Laurel, Maryland. An active researcher with specialties in cyber security, cyber operations, critical infrastructure protection and digital forensics, Dr. Shenoi works on exciting “problems” ranging from helping solve homicides to penetrating telecommunications systems, oil and gas pipelines, wind farms and voting machines. Dr. Shenoi is the Editor-in-Chief of the International Journal of Critical Infrastructure Protection (Elsevier); and Editor of the Advances in Digital Forensics and Critical Infrastructure Protection (Springer) series, now in their thirteenth and eleventh volumes, respectively. He spearheads the University of Tulsa's elite Cyber Corps Program that trains “MacGyvers” for U.S. government agencies, and is the Director of the Cyber Security Education Consortium, a National Science Foundation ATE Center that is building a high-tech workforce in the Southwestern United States. For his innovative strategies integrating academics, research and service, Dr. Shenoi was named the 1998-1999 U.S. Professor of the Year by the Carnegie Foundation.  
+
'''BIO:''' &nbsp; Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma. An active researcher with specialties in cyber security, cyber operations, critical infrastructure protection and digital forensics, Dr. Shenoi works on exciting “problems” ranging from helping solve homicides to penetrating telecommunications systems, oil and gas pipelines, wind farms and voting machines. He spearheads the University of Tulsa's elite Cyber Corps Program that trains “MacGyvers” for U.S. government agencies. For his innovative strategies integrating academics, research and service, Dr. Shenoi was named the 1998-1999 U.S. Professor of the Year by the Carnegie Foundation.
 +
 
 +
 
 
<br /><br />
 
<br /><br />
  

Revision as of 07:14, 9 September 2022

AFSecurity Seminar

Wind Farm Security

TIME:  Tuesday 28 November 2022, 14:00h
PLACE:  Kristen Nygaards Hall (Room 5370), 5th floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

Coffee and snaks served.

AGENDA:
14:00h Welcome at IFI and AFSecurity
14:15 Invited talk

  • TITLE: How to Attack and Defend Wind Farms  
  • SPEAKER: Sujeet Shenoi, University of Tulsa, USA
Photo-Sujeet-Shenoi.jpg
Logo-Tulsa.jpg
  • ABSTRACT:
    As modern society grows more reliant on wind energy, wind farm deployments will become increasingly attractive targets for malicious entities. The geographic scale of wind farms, remoteness of assets, flat logical control networks and insecure control protocols expose wind farms to a myriad of threats. This presentation describes the anatomy of a generic wind farm and the attack vectors that can be leveraged to target its information technology, industrial control system and physical assets. It discusses attack scenarios involving unauthorized wind turbine control, wind turbine damage, wind farm disruption and damage, and substation disruption and damage. Additionally, it highlights mitigation techniques that provide robust security coverage and reduce negative cyber and physical impacts. The attack surface, targets, scenarios and mitigation techniques presented are common across wind farm deployments. However, it is still possible to add details about the unique aspects of wind farm assets, configurations and operations in order to develop a holistic risk management program geared for a specific wind farm deployment.

BIO:   Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma. An active researcher with specialties in cyber security, cyber operations, critical infrastructure protection and digital forensics, Dr. Shenoi works on exciting “problems” ranging from helping solve homicides to penetrating telecommunications systems, oil and gas pipelines, wind farms and voting machines. He spearheads the University of Tulsa's elite Cyber Corps Program that trains “MacGyvers” for U.S. government agencies. For his innovative strategies integrating academics, research and service, Dr. Shenoi was named the 1998-1999 U.S. Professor of the Year by the Carnegie Foundation.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png