TOP 10
CRITICAL INFRASTRUCTURE
AND SCADA/ICS CYBERSECURITY
VULNERABILITIES & THREATS
Operational Technology (OT) Systems Lack Basic Security Controls.
Below Are the Most Common Threats:
OT Systems are vulnerable to attack and should
incorporate anti-malware protection, host-based
firewall controls, and patch-management
policies to reduce exposure.
OT Systems run on legacy software that lack
sufficient user and system authentication, data
authenticity verification, or data integrity
checking features that allow attackers
uncontrolled access to systems.
Legacy Software
01
02
DDoS Attacks
Invalidated sources and limited access-controls
allow attackers intent on sabotaging OT systems
to execute DoS attacks on vulnerable unpatched
systems.
03
Malware04
05
Lack of Encryption
Legacy SCADA controllers and industrial
protocols lack the ability to encrypt
communication. Attackers use sniffing software
to discover username and passwords.
Lack of Network Segmentation
06Internet connected OT flat and misconfigured
network, firewall features that fail to detect or
block malicious activity provide attackers a means
to access OT systems.
07
Policies & Procedures
Security gaps are created when IT and OT
personnel differ in their approach to securing
industrial controls. Different sides should work
together to create a unified security policy that
protects both IT and OT technology.
08 Web Application Attacks
Traditional OT systems including
human-management interfaces (HMI) and
programmable logic computers (PLC) are
increasingly connected to the network and
accessible anywhere via the web-interface.
Unprotected systems are vulnerable to cross-site
scripting and SQL injection attacks.
09
Remote Access Policies
SCADA systems connected to unaudited dial-up
lines or remote-access servers give attackers
convenient backdoor access to the OT network as
well as the corporate LAN.
10
Default Configuration
Out-of-box systems with default or simple
passwords and baseline configurations make it
easy for attackers to enumerate and compromise
OT systems.
Vulnerabilities Threats
OT Systems run on legacy software that lacks
sufficient user and system authentication, data
authenticity verification, or data integrity
checking features that allow attackers
uncontrolled access to systems.
Command Injection and
Parameters Manipulation
©2016 Check Point Software Technologies Ltd. All rights reserved.
January 2016
CONTACT US
Worldwide Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: info@checkpoint.com
U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com
Industrial Control Systems (ICS) used in critical
infrastructure and manufacturing industries are
targets of sophisticated cyberattacks. The Check Point
1200R rugged appliance line delivers proven,
integrated security for deployment in harsh
environments as part of a complete end-to-end ICS
security solution.
WE SECURE THE FUTURE
To learn more about Check Point’s Solutions for Critical Infrastructure,
please visit www.checkpoint.com/products/industrial-control-systems-appliances

2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabilities & Threats

  • 1.
    TOP 10 CRITICAL INFRASTRUCTURE ANDSCADA/ICS CYBERSECURITY VULNERABILITIES & THREATS Operational Technology (OT) Systems Lack Basic Security Controls. Below Are the Most Common Threats: OT Systems are vulnerable to attack and should incorporate anti-malware protection, host-based firewall controls, and patch-management policies to reduce exposure. OT Systems run on legacy software that lack sufficient user and system authentication, data authenticity verification, or data integrity checking features that allow attackers uncontrolled access to systems. Legacy Software 01 02 DDoS Attacks Invalidated sources and limited access-controls allow attackers intent on sabotaging OT systems to execute DoS attacks on vulnerable unpatched systems. 03 Malware04 05 Lack of Encryption Legacy SCADA controllers and industrial protocols lack the ability to encrypt communication. Attackers use sniffing software to discover username and passwords. Lack of Network Segmentation 06Internet connected OT flat and misconfigured network, firewall features that fail to detect or block malicious activity provide attackers a means to access OT systems. 07 Policies & Procedures Security gaps are created when IT and OT personnel differ in their approach to securing industrial controls. Different sides should work together to create a unified security policy that protects both IT and OT technology. 08 Web Application Attacks Traditional OT systems including human-management interfaces (HMI) and programmable logic computers (PLC) are increasingly connected to the network and accessible anywhere via the web-interface. Unprotected systems are vulnerable to cross-site scripting and SQL injection attacks. 09 Remote Access Policies SCADA systems connected to unaudited dial-up lines or remote-access servers give attackers convenient backdoor access to the OT network as well as the corporate LAN. 10 Default Configuration Out-of-box systems with default or simple passwords and baseline configurations make it easy for attackers to enumerate and compromise OT systems. Vulnerabilities Threats OT Systems run on legacy software that lacks sufficient user and system authentication, data authenticity verification, or data integrity checking features that allow attackers uncontrolled access to systems. Command Injection and Parameters Manipulation
  • 2.
    ©2016 Check PointSoftware Technologies Ltd. All rights reserved. January 2016 CONTACT US Worldwide Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected] U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com Industrial Control Systems (ICS) used in critical infrastructure and manufacturing industries are targets of sophisticated cyberattacks. The Check Point 1200R rugged appliance line delivers proven, integrated security for deployment in harsh environments as part of a complete end-to-end ICS security solution. WE SECURE THE FUTURE To learn more about Check Point’s Solutions for Critical Infrastructure, please visit www.checkpoint.com/products/industrial-control-systems-appliances