Graduate/Faculty Category: Engineering and Technology Degree ...

Report 4 Downloads 159 Views
Graduate/Faculty Category: Engineering and Technology Degree Level: Graduate Informa=on Systems Abstract ID #1456



Secure Cyber-Manufacturing

Abstract As Addi=ve Manufacturing is integrated into Logis=cs Engineering, the level of disrup=on within the Logis=cs Engineering Supply Chain will be monumental. As part of this monumental disrup=on, we have importantly and less visibly an underlying amalgam of exposed cyber-security surfaces. The key component of this discussion is to iden=fy contexts necessary for iden=fying cyber-security vulnerabili=es. Discussion focusing on security aOack vectors introduced as part of Addi=ve Manufacturing integra=on is the focus of this poster

Background The Digital Thread is not secure as it relates to Cyber-Manufacturing, and used within the general context defined by Na=onal Ins=tute of Standards and Technology (NIST) in rela=on with Smart Manufacturing. During a recent NIST symposium, security concerns were iden=fied and repeated =me-and-again within the various talks highligh=ng the off-the-chart number of aOack surfaces exposed within a cradle-to-table life cycle of Cyber-Manufactured products.

LogisBcs Engineering

Cybersecurity Secure Cyber-Manufacturing

Life Cycle Logis=cs is defined as the planning, development, implementa=on, and management of a comprehensive, affordable, and effec=ve systems support strategy. Life cycle logis=cs encompasses the en=re system’s life cycle including acquisi=on (design, develop, test, produce and deploy), sustainment (opera=ons and support), and disposal.

†  AOack Vectors †  At machine – open USB ports †  File Ini=aliza=on – start up of machine and sub-systems †  Common File Format (STL) – easily modifiable XML format †  Internal Voids – anomalies not visible but affect

Cyber

Manufacture

Product

Digital Vapors

Design

Build

Obsolescence

ProstheBcs

performance †  Crack Sites For any assessment of the applicability of new technology, we need to look at our past or current work that we have done/are doing †  In situ Monitoring †  Seasoned Operators (blinded by experience) †  O bsolescence / DMSMS MiBgaBon †  Case Study – Valida=on of STL file Reverse engineering of exis=ng part to create replacement via addi=ve †  Net fab – failed manufacturing †  One group no=ced by watching complete process †  Port Inspec=on † Front Line FabricaBon †  Banned Machines – unreported cyber aOack Subs=tu=on for parts delivered via costly & perilous supply lines †  Quality Control Techniques † ProstheBcs †  Ac=ve Vulnerabili=es Need for unique “design” good match for addi=ve manufacturing capability †  Passive Vulnerabili=es †  Exploring STL AOacks †  Improve SoXware Checks †  Alterna=ve File Hashing Techniques †  Process Monitoring †  Operator Training (machine inten=onally miscalibrated)

Design File Format

Front Line FabricaBon

Life Cycle LogisBcs



AddiBve Manufacturing

Sustain LogisBcs Life Cycle - Design

†  Influence Design

InformaBon Security

§  Engage Integrated Process Team §  Market Research & Inves=ga=on

Goal or Aim

Design

†  Materials Solu=on Phase

Provide context and examples which support the supposi=on of fundamentally insecure equipment. Design, crea=on of the Intellectual Property. During design, the opportunity to manipulate the end product begins. File Formats: Crea=on, transmission, consump=on provide many aOack vector surfaces and opportunity to introduce anomalies. Digital Vapors: Digital residue leX at the various transfer and storage points before Product is available for integra=on and/or consump=on.



Cyber Manufacture: The melding of Cyber and Manufacturing environments and processes. The number of aOack vectors where all types of anomalies can be introduced is mind-boggling. Imagine being able to “hack” a manufactured Build product as it is being manufactured. Introducing a Trojan horse which manifest only when the material used to watermark the product is exposed to the zero-day frequency. The results of imagined hack, the product self-disintegrates with poten=ally catastrophic consequences. Product: The environment and support structures where the useful intent of the end product is consumed and/or integrated. Sustain As a product realizes it’s useful life span, sustaining or providing maintenance is integral as part of Logis=cs Engineering.





§  Affordability Assessment §  Analysis of Alterna=ves

InformaBon security, some=mes shortened to InfoSec, is the prac=ce of defending informa=on from unauthorized access, use, disclosure, disrup=on, modifica=on, perusal, inspec=on, recording or destruc=on. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical)1

1Wikipidea Informa=on Security

LogisBcs Life Cycle - Sustainment

†  Sustainment of System §  Material Condi=on Status §  Sample Data Collec=on

ConfidenBality, Integrity, and Availability (CIA Triangle) is at the heart of InformaBon Security

†  Opera=ons and Support Phase

Secure Cyber-Manufacturing

Confiden=ality

§  Performance Based Logis=cs (PBL) Support

Conclusion

The following is a summary listing of focus areas which may be sign posts for best of breed cyber product and service

§  Monitor PBL Metrics

Availability

Integrity

†  †  †  †  † 

Standards Guides Tools Gaps Security Models “The time is now to build it in, not bolt it on” Cyber-Security for Direct Digital Manufacturing – NIST 02/2015

Charles W Miller DL/Gordon Engineering Fellow, [email protected], Master of Science Informa=on Systems, Northeastern University - College of Engineering Divyansh Srivastava Graduate Student, [email protected], Informa=on Systems, Northeastern University – College of Engineering Sagar Kamarthi Associate Professor, [email protected], Dept. of Mechanical and Industrial Engineering, Northeastern University – College of Engineering