Many companies already use firewalls to isolate the plant and enterprise networks. What's so bad about this approach? Aren't these networks already protected?
In this video, we'll explore the types of cyber security issues we often see in plant networks and explains how these issues can impact plant operations in spite of these firewalls.
Today operators and engineers are under pressure to isolate automation systems at the same time as management is asking for greater interconnectedness.
This White Paper explains how the “zone and conduit” model included in the ANSI/ISA-99 security standards provides a framework for helping deal with network security threats that arise from both the “push for productivity” and the fear of the next “Son-of-Stuxnet” worm.
Article from: Industrial Ethernet Book, February 2012
Today, operators are being asked to isolate automation systems just as ever greater interconnectedness is demanded. Adding to these pressures is the growing fear of cyber attacks such as the infamous Stuxnet.
In this article Eric Byres explains how the ‘zone and conduit’ model included in the ANSI/ISA-99 security standards provides a framework for dealing with network security concerns, including fears of the " Son-of-Stuxnet".
Cyber security threats, from sophisticated malware like Stuxnet, Night Dragon and Duqu, or from the publishing of an unprecedented number of security vulnerabilities, are causing a major disruption in the industrial automation market.
If you are a process control engineer, an IT professional in a company with an automation division, or a business manager responsible for safety or security, you may be wondering how your organization can get moving on more robust cyber security practices.
Two industry veterans, Eric Byres and John Cusimano, combine industry standards, best practice materials, and their real-world experience to provide an easy-to-follow 7-step process for improved ICS and SCADA security.
Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon
March 2011 (10:41)
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose.
An infographic dissecting the nature and ramifications of Stuxnet, the first weapon made entirely out of code. This was produced for Australian TV program HungryBeast on Australia's ABC1.
Article from: arabianOilandGas.com, Utilities-me.com, January 2012
The protection of critical national infrastructure has long been a serious concern to governments in the Middle East. Achieving this is no longer to limited to physical security; it now includes the very real and growing need to enhance cyber security.