Post related to: Industrial control systems
The concept of defence in industrial environments is changing. Just as the attacks are increasingly more sophisticated, the protection systems tend to be more flexible and more evolved. Being able to strengthen the upper levels, such as active defence and intelligence, is essential, whilst always maintaining a solid base of the lower levels (passive defence and secure architecture).
Over the past few years, and especially after the arrival of the 4.0 industry, conferences, events and summits on industrial cybersecurity, and in general, all other topics related to industrial security and the IoT environment have been growing year upon year. This article will look at the main conferences on industrial cybersecurity both at national and international level.
Given that availability is always a critical point to take into account for within industrial environments, it is necessary to prevent the attacks that denial of services cause and that affect these environments. The means of giving way to a denial of service can be diverse, much like the means of mitigating these problems. This article will review all of these points, as well as the way in which the risks derived from these attacks can be reduced.
Manufacturers have an essential role with regards improving the cybersecurity in their devices. These improvements will not only affect the devices, but rather they will also involve an improvement in the cybersecurity of industrial infrastructure where the new security provisions and functions that have the manufacturers' automation and control solutions (e.g. SCADA, PLC, etc.) are introduced.
The wireless protocols used in industrial environments for communication between devices are numerous are extensive, therefore ensuring these communications is vital for industrial process to function correctly. In this article, we'll look at the advantages of wireless communication audits and the disadvantages of not performing them.
Advances in security within control systems have brought us many of the security tools and services offered in IT for this environment. Until now, protection was based on reactive measures, acting only where there was evidence of the attack, but this trend changed with deployment of monitoring and the proactive defensive actions that this can provide.
The defence in depth and, especially, the definition of Zones and Conduits is a subject considered by many experts as a "theoretical" matter. However, with the help of this article, the user will understand its applicability by explaining the keys to approach the creation of Zones and Conduits, as well as the elements that come into play.
Honeypots and their implementation in a network, known as a honeynet, are a powerful tool for defending your system and safely monitoring the attacks carried out against it. In this article we will detail what honeypots are, their implementation in OT environments, the advantages and disadvantages of their implementation in the system and the latest honeypots developed for industrial control systems.