Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS

Blog

Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Industrial Control System
decorative image

Events and conferences on industrial security

Posted on 07/26/2018, by INCIBE
Over the past few years, and especially after the arrival of the 4.0 industry, conferences, events and summits on industrial cybersecurity, and in general, all other topics related to industrial security and the IoT environment have been growing year upon year. This article will look at the main conferences on industrial cybersecurity both at national and international level.
Problems in the industry

Mitigating availability problems in the industry

Posted on 07/19/2018, by INCIBE
Given that availability is always a critical point to take into account for within industrial environments, it is necessary to prevent the attacks that denial of services cause and that affect these environments. The means of giving way to a denial of service can be diverse, much like the means of mitigating these problems. This article will review all of these points, as well as the way in which the risks derived from these attacks can be reduced.
Trends in the industry, improvements in cybersecurity

Trends in the industry, improvements in cybersecurity

Posted on 07/12/2018, by INCIBE
Manufacturers have an essential role with regards improving the cybersecurity in their devices. These improvements will not only affect the devices, but rather they will also involve an improvement in the cybersecurity of industrial infrastructure where the new security provisions and functions that have the manufacturers' automation and control solutions (e.g. SCADA, PLC, etc.) are introduced.
decorative imageç

Monitoring Networks and Events in SCIs: more Information, more Security

Posted on 06/28/2018, by INCIBE
Advances in security within control systems have brought us many of the security tools and services offered in IT for this environment. Until now, protection was based on reactive measures, acting only where there was evidence of the attack, but this trend changed with deployment of monitoring and the proactive defensive actions that this can provide.
decorative image

Honeypot, a tool to know your enemy

Posted on 06/14/2018, by INCIBE
Honeypots and their implementation in a network, known as a honeynet, are a powerful tool for defending your system and safely monitoring the attacks carried out against it. In this article we will detail what honeypots are, their implementation in OT environments, the advantages and disadvantages of their implementation in the system and the latest honeypots developed for industrial control systems.
Understanding industrial network traffic, dissectors and Lua and Kaitai

Understanding industrial network traffic, dissectors and Lua and Kaitai

Posted on 06/07/2018, by INCIBE
Not only is the interpretation of network traffic crucial to analyse the safety and performance of a network structure, but also for other tasks, such as incident management, the optimisation of our network infrastructure or for didactic purposes. In order to do so, it is necessary to have dissectors that help separate each of the fields that make up a protocol, and allow them to be individually analysed.
Accessing Control Systems Securely

Accessing Control Systems Securely: Two-Factor Authentication and Remote Access

Posted on 05/31/2018, by INCIBE
From the point of view of cybersecurity, access to automation and industrial control systems is one of the most critical control points and that's why special care must be taken when it comes to applying access security and fortification policies. On occasions, it is necessary to carry out remote tasks such as, for example, maintenance, upgrading or device or application management work. Thus, external personnel outside our company may perform said tasks, including manufacturers, wholesalers or providers of services, making it necessary to protect these accesses from potential threats.

Pages