IT security in the secondary systems.

MICHAEL CONRAD, RALF THOMAS |

article image
The extensive use of automation systems for monitoring / controlling hundreds of thousands of devices for the production, transport and distribution of energy is a result of the growth of the renewable energy sector in Germany. Exchange of data between field units and central control centers will be carried out on IP-based infrastructure. Those units are a new part of the critical infrastructure in terms of IT security.This paper provides a practical insight into the implementation of IT security mechanisms for remote terminal units and SCADA systems (secondary equipment) in accordance with the BDEW white paper "Requirements for Secure Control and Telecommunication Systems" . It also presents an evaluation of a variety of tools, protocols and procedures in terms of technical and organizational feasibility.

Spotlight

HCL Technologies

"Over the past decade, HCL has been one of the fastest growing technology companies not only in India but in the world – even during the depths of the economic downturn. What has been the source of HCL’s success during this period of economic turmoil? A combination of unparalleled technical expertise and a unique management philosophy called Employees First. At HCL, employees at all levels of the organization are “ideapreneurs,” empowered – indeed, expected – to develop innovative solutions to operational and customer challenges."

OTHER ARTICLES

Zyxel Helps Service Providers Deliver Solutions with Cyber Security

Article | April 1, 2020

The COVID-19 pandemic brings heightened awareness to the importance of a robust and stable communications network. Zyxel Communications is helping service providers across the globe ensure that their networks provide the necessary connectivity and cyber security for their communities to function during these difficult times. As more people are forced to work and study from home, the impact on the network is quite profound. OpenVault reports a 41% increase in bandwidth consumption during normal business hours. This health crisis points to the importance of good network connectivity wherever you live. COVID-19 brings the true nature of the digital divide into real context.

Read More

A Closer Look at the Microsoft Exchange Server Cyberattacks

Article | April 1, 2020

We recently posted an article that highlighted the high-profile Microsoft Exchange hack that impacted hundreds of thousands of organizations across the globe. (This article offered some recommendations on how this could have been avoided as well as a special three-month offer to help any company who may have been affected.) Since this cyber attack, even more details are emerging. For example, the White House recently urged victims to quickly patch applications and systems and pushed for them to do it as quickly as possible. One senior administration official emphasized that the window to update these systems could be measured in hours, not even days.

Read More

Malicious coronavirus map hides AZORult info-stealing malware

Article | April 1, 2020

Cyberattackers continue to seize on the dire need for information surrounding the novel coronavirus. In one of the latest examples, adversaries have created a weaponized coronavirus map app that infects victims with a variant of the information-stealing AZORult malware. The malicious online map, found at www.Corona-Virus-Map[.]com, appears very polished and convincing, showing an image of the world that depicts viral outbreaks with red dots of various sizes, depending on the number of infections. The map appears to offer a tally of confirmed cases, total deaths and total recoveries, by country, and cites Johns Hopkins University’s Center for Systems Science and Engineering as its supposed data source. Malwarebytes issued a warning about the map last week, and Reason Cybersecurity this week has followed up with its own blog post, reporting additional details on the scam, gathered by Reason Labs researcher Shai Alfasi.

Read More

How much do behavioural biometrics improve cyber security?

Article | April 1, 2020

Experts often consider biometrics security the next big thing in cyber security. It encompasses a broad category that includes verifying a person's fingerprint, iris, gait and other factors that should be unique to the person checked. However, various tests proved that some biometric-based security has substantial room for improvement For example, researchers have hacked into smartphones that have fingerprint scanners by pressing the print of the rightful owner into a piece of Play-Doh and holding that impression against the reader. What those results indicate is that people should not assume that biometrics options are a foolproof choice for cyber security needs.

Read More

Spotlight

HCL Technologies

"Over the past decade, HCL has been one of the fastest growing technology companies not only in India but in the world – even during the depths of the economic downturn. What has been the source of HCL’s success during this period of economic turmoil? A combination of unparalleled technical expertise and a unique management philosophy called Employees First. At HCL, employees at all levels of the organization are “ideapreneurs,” empowered – indeed, expected – to develop innovative solutions to operational and customer challenges."

Events