Strong Point - male

Job #5792

Job Posting Details

Job # 5792 Strong Point - male

Posted Date
Jan 3, 2008 @ 00:34
Respond By
Jan 4, 2008
Word Count
1821
Language
English (North American)
Gender
Male
Age Range
-
Category
Business

Job Description

Voiceover is needed for a corporate video. Full script included below.

SCRIPT



StrongPoint. Secure the field.

____________________________________________________________

Everything is moving toward the Internet, and open standards…

____________________________________________________________

…including modern Supervisory Control and Data Acquisition, or “SCADA”, and process control system design. According to the US Department of Energy:
“SCADA system development is moving away from the older hierarchical SCADA systems.”
“The current trend is the development of open standard operating systems and distributed network-based control systems.”
“Another trend is the use of open, web-based architectures to monitor and control systems.”

____________________________________________________________

According to the US National Research Council, in today’s SCADA system designs:
“Data are often sent ‘in the clear.’”
“Protocols for accepting commands are open.”
“Control channels are often wireless or leased lines.”
“The Internet itself is increasingly used as a primary command pathway.”

____________________________________________________________

As a result, the vulnerability of these critical control systems to cyber attacks has multiplied. Returning to the US Dept. of Energy:
“Industry is not well prepared to address the security issues associated with these new open-standards-based control systems, and the new vulnerability they create.”
“Open, web-based architectures open these systems up to attack.”

____________________________________________________________

The US National Research Council goes on to say:
“Such control paths present obvious vulnerabilities.”
“Today’s SCADA systems are built from off-the-shelf components and are based on operating systems that are known to be insecure.”
“Compounding the difficulty is the fact that information about these vulnerabilities is so readily available.”

____________________________________________________________

In the words of Federal Computer Week: “It’s open season on SCADA networks”.

[Headlines not read by narrator]

____________________________________________________________

As expected, the number of cyber attacks affecting critical infrastructure is growing.
A large number of these incidents are directed acts of sabotage.

____________________________________________________________

As predicted, threat sources are shifting, from internal to external.

____________________________________________________________

Transportation control infrastructure is at the center of this growing storm…already well underway in embracing open standards like NTCIP, SNMP, Windows, Ethernet, TCP/IP and web services.

____________________________________________________________


The result is a virtual smorgasbord for would-be attackers of transportation systems.

____________________________________________________________

The cost of a successful transportation control network attack is potentially staggering.

____________________________________________________________

Econolite StrongPoint, developed in partnership with Uniloc, is specifically designed to securely protect transportation field control systems from cyber attacks.
StrongPoint provides a point-to-point, extraordinarily hack resistant “secure private network” between the Traffic Management Center, or “TMC”, and each field cabinet.

____________________________________________________________

StrongPoint provides…
Protection of field traffic control systems from the effects of cyber attacks.
Unprecedented hack-resistance – significantly improving upon traditional router, switch and firewall security.
Uncompromising security on any infrastructure – including open standards, wireless and public Internet.
Cross-platform compatibility with any and all operating systems and field control hardware.
Field network intrusion detection, location and notification.

____________________________________________________________

StrongPoint. Secure the field.

Secured by Uniloc.

____________________________________________________________

Hello. I am a hacker. I’m planning to penetrate your so-called “private network”, take control of your field traffic controls, and create some big problems. Your evolving infrastructure is making this easier and easier to do. I will even tell you how I’m going to do it…

I will get access using one or more increasingly common network security weaknesses…

Method 1: You give traffic control devices in the field IP addresses to facilitate maintenance and minimize cost. I can access them directly from the Internet.

Method 2: You are adopting many open standards in your system designs to make your lives easier. I have many forms of malicious code which I can now use to create significant problems on your network.

Method 3: I can defeat a poorly executed security solution implemented by another organization sharing your network. Unfortunately for you, you can’t be everywhere at once.

Method 4: Do you use wireless on your network? With enough time I can break any wireless security.

Method 5: One of your recently fired IT staff is active in the black hat community. He claims your security is wide open to him.

So, it is quite safe to say I will get access to your traffic control network. Once I’m in, here’s what I will do… I’ll start with a simple ARP attack at rush hour to overload many of your traffic controllers, and corrupt your ability to manage traffic flow. Then I’ll take control of your busiest intersections using the SNMP commands your government was kind enough to publish on the Internet. Then, I will execute a denial of service attack on your media and firewall servers. I dare you to stop me.

____________________________________________________________
m m
You’re familiar with the increasingly common control network vulnerabilities putting transportation field controls at risk…

____________________________________________________________

StrongPoint provides unsurpassed protection for transportation field controls from the effects of cyber attack. How does it work?

____________________________________________________________

StrongPoint uses Uniloc device recognition to create “device locked” secure private networks between the StrongPoint Server and StrongPoint Field Security Appliances placed in the
cabinets.

____________________________________________________________

Uniloc is a leading provider of device authentication solutions for protecting networks and intellectual property.
Uniloc licenses its security technologies in several markets, including
Identity Management and Access Control
Software Copy Control, and
Entertainment Anti-piracy.
Uniloc invented and patented device recognition to deliver strong authentication for network devices. Security and network reliability is created one device at a time. Our technology starts with the power of one and scales to the most complex network implementations.
Know the machines accessing your network.

____________________________________________________________

Here’s how Uniloc device recognition works.
Any network computing device…be it a desktop PC…a laptop…or a StrongPoint Field Security Appliance…

____________________________________________________________

…can be “device fingerprinted” using Uniloc technology.

____________________________________________________________

Uniloc device fingerprints are extremely unique - more unique, in fact, than human DNA. Two seemingly identical computing devices will have very different Uniloc device fingerprints.

____________________________________________________________

Due to their extraordinary uniqueness, Uniloc device fingerprints provide a revolutionary level of network authentication security.

____________________________________________________________

Using Uniloc, StrongPoint creates an extraordinarily secure ‘device locked’ private network between the StrongPoint Server at the TMC and the StrongPoint Field Security Appliances placed in each field cabinet.

____________________________________________________________

Deploying StrongPoint is a plug-and-play process. When the preconfigured StrongPoint Appliance is plugged into a field cabinet, it automatically “phones home” to the StrongPoint Server, identifying itself by it’s Uniloc device fingerprint.

____________________________________________________________

In response, the StrongPoint Server designates itself as the only device the StrongPoint Appliance is allowed to talk to.

____________________________________________________________

With this Uniloc “device handshake” completed, the StrongPoint secure private network is in place.

____________________________________________________________

Communication encryption is now based upon the unique Uniloc device fingerprints of the two devices. On a regular basis, the device fingerprints of the Server and Appliance are randomly sampled and exchanged to maintain the security of the connection.

____________________________________________________________

With StrongPoint, the computing device itself is the password. The efficiency of Uniloc device-based security means virtually no latency is introduced to the network – an essential requirement when securing highly sensitive SCADA systems.

____________________________________________________________

Configuration, monitoring and management of StrongPoint Appliances are done conveniently from the StrongPoint Server at the TMC.

____________________________________________________________

Installing one StrongPoint Appliance in each field control cabinet protects all components in the cabinet from cyber attack.

____________________________________________________________

StrongPoint is “point-to-multipoint” field network security.

____________________________________________________________

StrongPoint also uses Uniloc device recognition to restrict field control access to designated terminals at the TMC…

____________________________________________________________

…and to extend security to designated computers used by field engineering staff logging in remotely to the TMC’s VPN. With an effective “cabinet access policy” and StrongPoint in place, there is no other way to break into the traffic cabinet.

____________________________________________________________

With StrongPoint, a hacker must be on an authorized PC to impersonate an authorized user.
StrongPoint also provides intrusion detection, location and notification throughout the StrongPoint secure private network.

____________________________________________________________

StrongPoint was designed specifically to meet the growing need for security and hack resistance in the rapidly evolving world of SCADA and process control systems:
Secure yourself with state-of-the-art network “device recognition” from Uniloc.
Shield field control systems against DOS and ARP attacks and other malicious code threats.
Restrict access to designated PCs.
Insure against network vulnerabilities outside your control.
Monitor field security status conveniently from the TMC.

____________________________________________________________

StrongPoint field deployment is a plug-and-play process...
Zero device configuration required from the field.
No field PC is needed.
No passwords or keys to manage.
Deployment is monitored and managed at the TMC.

____________________________________________________________

StrongPoint provides a simple and secure way to protect field control networks.
However, one might ask: “Can’t I do the same thing using secure switches, routers and firewalls?”
Answer? Not even close.

____________________________________________________________

Let’s look at a real world example. Let’s say you have 100 cabinets on your field control network that you want to secure against cyber attack.

____________________________________________________________

To secure these cabinets using secure switches, routers and firewalls, an obvious implementation would be to install a secure switch in each cabinet, and then link these switches in groups of eight or less to secure routers in the field, which would in turn be linked in groups of eight or less to secure routers at the TMC. Such a solution faces several critical viability challenges…

____________________________________________________________

The devices are not field-tested to the required temperature range.

The security configuration complexity is very high.

There is no ability to verify and manage proper security configuration from TMC.

There are existing hacks on all the devices used.

All like devices will be assigned the same access key.

There is a potentially significant impact on network performance.

Management of future expansion will be highly complex

Will this solution support all legacy field hardware and operating systems?

Troubleshooting and repairing device failures will be difficult.

There is no capability for intrusion detection, location and notification.

This implementation scenario faces several critical, most likely insurmountable, challenges.

Now let’s look at a comparable StrongPoint deployment to secure 100 cabinets in your field control network.

____________________________________________________________

A StrongPoint Server is dropped at the TMC. The serial numbers and intersection locations for 100 StrongPoint Appliances are added to the device list, and the StrongPoint Appliances are configured with the StrongPoint Server IP routing. The StrongPoint Appliances are plugged one by one into field cabinets. As each Appliance is connected, it phones home to the StrongPoint Server and establishes its own device locked point-to-point secure private network.

____________________________________________________________

The StrongPoint system, by design, fully addresses the myriad of technical and logistical issues faced when trying to accomplish the same objective using secure routers, switches or firewalls.

____________________________________________________________

StrongPoint provides…
Protection of field traffic control systems from the effects of cyber attacks.
Unprecedented hack-resistance – significantly improving upon traditional router, switch and firewall security.
Uncompromising security on any infrastructure – including open standards, wireless and public Internet.
Cross-platform compatibility with any and all operating systems and field control hardware.
Field network intrusion detection, location and notification.

____________________________________________________________

StrongPoint. Secure the Field.

Ready to get started?

Join the #1 marketplace for voice-over talent

Need Some Help?
Contact us for help with your voice over project.