Find Us On Social Media
Tag CloudAccidents ANPR Brake Cameras CIS cycling Distracted Driving Drink Driving Driver Behaviour Driver Monitoring Driver Training Emergency Services Enforcement Events Fleet Management Government GPS HGV Highway Maintenance IAM Insurance ITS Legislation LPR Motorcycles NHTSA Pedestrians Police PSV reports road construction Russia security Speeding Statistics Surveillance Telematics Traffic Management Tyres UK USA Vehicle Operation Vehicle Technology Vehicle Testing World News
White Paper On Steps To Security SCADA Systems
Seven steps explained on securing ICS and SCADA systems used on critical infrastructure projects.
Access the white paper directly or read the review below. Another link is provided at the end of the article to download the white paper.
Securing critical infrastructure against computer based attacks (commonly referred to as cyber-attacks) is becoming increasingly important as these once-isolated networks are becoming more interconnected with vulnerable network elements such as microsoft PC equipment, smartphones and Cat 5 IP network cabling.
Recent trends for critical infrastructure objects such as waterworks and electric energy grids to be attacked by such malicious code as Stuxnet and Flame have signalled the need to logically isolate networks from the sources of such attacks.
Transport systems are forecast to be a prime target for such attacks as well as water networks and energy grids. Given the structure of such networks, the chances of an attack being successful are reasonably high.
To help understand the mechanism of these attacks and advise on how to protect against them, Tofino Security and Exida have produced a white paper called “7 Steps to ICS and SCADA Security”.
The seven steps include network assessment, policy creation, personnel training, system segregation, access control, locking down network elements and system maintenance.
Each of these seven steps is explained in detail with clear diagrams to assist in visualising the security process.
Download the 7 Steps to ICS and SCADA Security white paper.