Internship Presentation 1.pptx on Kota thermal power plant cybersecurity
ChakshuTyagi3
91 views
11 slides
Apr 25, 2024
Slide 1 of 11
1
2
3
4
5
6
7
8
9
10
11
About This Presentation
ppt about thermal cybersecurity
Size: 742.4 KB
Language: en
Added: Apr 25, 2024
Slides: 11 pages
Slide Content
First Internship Presentation Practical Trainee Kota Super Thermal Power Station Mentor: Vipin Gupta ( Executive Engineer) Name: Chakshu Tyagi Enrolment No. : BT20CSE142 Duration : January 2024 - May 2024 INDIAN INSTITUTE OF INFORMATION TECHNOLOGY, NAGPUR Department of Computer Science and Engineering
Contents Company Overview Technologies Used Challenges Solution Learnings
ABOUT THE COMPANY Kota Super Thermal Power Station is a coal-fired power plant located in Kota, Rajasthan, India. It is situated on the west bank of the Chambal River. The power station began operating in 1983 and was Rajasthan’s first major coal-fired power plant. It has a total installed capacity of 1,241 MW, generated through seven operational units. The power station is owned and operated by Rajasthan Rajya Vidyut Utpadan Nigam (RVUNL). The power station burns bituminous coal from the SECL coal mine & NCL coal mine Fly ash from the plant is collected and used for cement manufacturing, brick manufacturing and land filling. The Kota power plant also uses heavy fuel oil as a secondary fuel source, and uses the Kota Barrage in the Chambal River as a cooling source.
TECHNOLOGIES USED OPERATIONAL TECHNOLOGY: The term "operational technology"(OT) refers to hardware and software that detects or causes a change in industrial equipment, assets, processes, and events through direct monitoring and/or control. The term OT has come to represent the technological and functional differences between traditional information technology (IT) systems and the environment of industrial control systems (ICS). INFORMATION TECHNOLOGY: Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data. The IT department ensures that the organization's systems, networks, data and applications all connect and function properly.
CHALLENGES OF IT AND OT SYSTEMS
CYBER SECURITY AND CYBER THREAT The cyber security threats are primarily on CIA Triad. CIA Triad stands for the triad formed by Confidentiality, Integrity, and Availability. An attacker hamper one of the elements of CIA triad and cause damage. Confidentiality: Cracking encrypted data Man in the middle attacks on plain text Data leakage/ Unauthorised copying if sensitive data Integrity: Web penetration for malware insertion maliciously accessing servers and forging records Unauthorized database scans Availability : Ransomware attacks- Forced encryption of key data Deliberately disrupting a server rooms power supply Flooding a server with too many requests
INTRUSION KILL CHAIN The "cyber kill chain" has been adopted by data security organizations to define phases of cyberattacks. A cyber kill chain reveals the phases of a cyberattack from early reconnaissance to the goal of data exfiltration.The kill chain can also be used as a management tool to help continuously improve network defense. Reconnai ssance: Intruder selects target, researches it, and attempts to identify vulnerabilities in the target network. Weaponization: Intruder creates remote access malware weapon, such as a virus or worm, tailored to one or more vulnerabilities. Delivery: Intruder transmits weapon to target (e.g., via e-mail attachments, websites, or USB drives) Exploitation: Malware weapon's program code triggers, which takes action on target network to exploit vulnerability. Installation: Malware weapon installs access point (e.g., "backdoor") usable by intruder. Command and Control: Malware enables intruder to have "hands on the keyboard" persistent access to target network. Actions on Objective: Intruder takes action to achieve their goals, such as data exfiltration, data destruction, or encryption for ransom
Defensive courses of action can be taken against these phases: Detect: Determine whether an intruder is present. Deny: Prevent information disclosure and unauthorized access. Disrupt: Stop or change outbound traffic (to attacker). Degrade: Counter-attack command and control. Deceive: Interfere with command and control.
IMPLEMENTATION OF CYBER SECURITY S TEPS TO I MPLEMENT C YBERSECURITY Define Clear Boundaries: Define the information system’s boundaries clearly. Apart from identifying where the data is stored, you must regulate where the data flows, as well as the critical dependencies. Deter Insider Threats: As per the cybersecurity statistics, the majority of cyber attacks occur from within and result from person who have access to confidential data. Network Segmentation: Network segmentation involves dividing a more extensive computer network into several small subnetworks that are isolated from each other to improve network security. It is an essential and highly effective security measure an organization can implement when building a new product architecture. Vulnerability Management and Remediation: To stay ahead of the cybercriminals, professionals should enable automatic detection and remediation of vulnerabilities throughout the cycle. Security and Privacy by Design: ‘Security and Privacy by Design Principles’ involve the concept of implementing cybersecurity and privacy into technology solutions both by design and by default. Review the Latest Cybersecurity Cases: Reviewing the real-world use-cases will help you understand how organizations are leveraging cyber products and services to strengthen their cyber posture. Data Mapping: It’s imperative to make a data processing map to assess privacy risks in case of sensitive data. Data mapping makes it easier to point out where to implement security measures.
OTHER MEASURES TAKEN FOR SECURITY Tools: SIEM (Security Information and Event Management) used for log monitoring, event correlation and analytics and security alerts. Data backup is stored in encrypted form. Communication of IT system and OT system is unidirectional. Emails are encrypted using SHA & RSA cryptography. Use of Steganography