Credentials can be described as the basic information required to access any device. Sharing and using privileged credentials within control systems is a common task that must be controlled to minimise potential exposure or leakage of information.
Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Industrial Control System
The installation of security tools may be complex sometimes due to different reasons: the complexity of the tool itself, the environment in which it is installed, the necessary settings, etc. This post shows how to implement an IDS solution and how to manage events in a centralised manner by means of an event manager for industrial control systems.
Smart buildings, either intended for housing, for offices or for industries, are fitted with communications systems for control of all elements such as lighting, heating and air conditioning, blinds, etc. Such communications are mainly carried out by means of two protocols or technologies: BACnet and LonWorks. In this article, the security capabilities of each protocol for operating in as a secure manner as possible shall be described.
Last year ransomware became the threat most widely used by attackers to monetise their actions. This fact has also affected industrial sectors which, to a greater or lesser extent, have suffered this type of malware.
The increasing number of attacks to industrial networks forces us to analyse their behaviour so that we can implement measures to mitigate said attacks. One of the options used to learn about the behaviour of attacks is the deployment of honeypots. This article deals with the advantages and challenges of this technology when used in industrial environments.
New control methods of energy distribution needs have required new communication ways, which have been many tines solved with new protocols. A security review to avoid unauthorized Access to private information is one task of main power companies.
Although in industrial environments, availability is king, integrity is also a factor to be taken into account as data must be transferred in unaltered form. The use of mechanisms such as digital signatures helps with integrity, although it is not so simple to implement in all environments.
The security of a system is fundamentally based on knowledge of the communications developed therein. For this reason, network analyzers are indispensable elements that allow us to identify the information exchanged between elements and discover relevant information, such as erroneous implementations of the stack of some protocols, possible information leaks, non-defined communications, etc.
Sometimes it is necessary to make some adjustments to control system devices, which leads to a reprogramming of PLC, RTU and similar devices. Reprogramming is a complicated step in terms of security and if the process is not adequately executed, the entire process of which the device is a part may be at risk.