PROTECTING INDUSTRIAL CONTROL SYSTEMS AND SCADA NETWORKS

January 18, 2019

Starting with the Industrial Revolution in 18th-Century Manchester, the manufacturing industry has typically undergone a revolution every hundred years. In an age of ever increasing technological advancement, though, times are changing at a faster pace, as we see the era of controller-based automation gradually replaced by the ‘Smart Factory’, otherwise known as Industry 4.0 or Smart Grid in the Energy market. While this progress aims to streamline manufacturing processes, these changes also bring new cyber risks and threats to Industrial Control Systems (ICS) that are vulnerable from exploits that are now freely available on the Internet. The vulnerabilities vary from basic issues like systems without passwords or with hard-coded passwords to configuration issues, software bugs and hardware vulnerabilities. Once an attacker is able to run software on a host that has access to a controller, the likelihood of a successful attack is very high.

Spotlight

DSA

Founded in 1963, Data Systems Analysts, Inc. (DSA) has been providing Defense and Federal Government customers’ mission-driven Information Technology and consulting solutions and services for more than 50 years. DSA's people excel in helping our customers achieve sensitive, mission-critical business goals and objectives. DSA is a 100 percent employee-owned company: every employee has a stake in the success of our company and our customers.

OTHER WHITEPAPERS
news image

Building a Successful Cloud Infrastructure Security and Compliance Practice

whitePaper | December 28, 2022

Cloud security truly is a team sport that requires strong collaboration between security, IT and line of business teams. The dynamic nature of cloud is forcing information security teams to rethink how they operate and partner with other groups to address emerging security and compliance challenges their organizations face.

Read More
news image

Cybersecurity - for safe and secure mobility

whitePaper | June 6, 2022

In a world that is increasingly connected and digital, cybersecurity is no longer simply an operational requirement – it is an economic necessity that is vital to the ongoing health of any business.

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More
news image

Adobe Primetime Advertising Security Overview

whitePaper | December 30, 2022

At Adobe®, we take the security of your digital experience and assets seriously. Security practices are integrated into our internal software development processes, operations, and tools. Our cross-functional incident response teams are proactive and nimble in preventing, detecting, and responding to incidents. Furthermore, our collaborative work with partners, leading researchers, and other industry organizations helps us stay updated with the latest threats, vulnerabilities, and security best practices; thereby enabling us to continually build security into the products and services we offer and regularly incorporate advanced security techniques into our product and service offerings.

Read More
news image

The State of ICS/OT Cybersecurity in 2022 and Beyond

whitePaper | October 26, 2022

The industrial control system (ICS)/operational technology (OT) security community is seeing attacks that go beyond traditional attacks on enterprise networks. Given the impacts to ICS/OT, fighting these attacks requires a different set of security skills, technologies, processes, and methods to manage the different risks and risk surfaces, setting ICS apart from traditional IT enterprise networks.

Read More
news image

Fujitsu PRIMERGY Server Security Overview

whitePaper | May 22, 2023

During the last few years server security has become a key building block for end-to-end security. We see strongly increasing cyber-attacks on server infrastructure, which results in an intense need for server security. This whitepaper presents an overview of the security features which are available for PRIMERGY server.

Read More

Spotlight

DSA

Founded in 1963, Data Systems Analysts, Inc. (DSA) has been providing Defense and Federal Government customers’ mission-driven Information Technology and consulting solutions and services for more than 50 years. DSA's people excel in helping our customers achieve sensitive, mission-critical business goals and objectives. DSA is a 100 percent employee-owned company: every employee has a stake in the success of our company and our customers.

Events