Home / Segmented / OT/ICS systems and networks administration

OT/ICS systems and networks administration

This section provides content of interest to professionals in OT environments involved in managing and maintaining applications, systems, network equipment, managing users, access and services, technical support and OT incident response.

The tasks of these professionals are often similar to those of IT professionals, except that they deal with systems where availability is often more critical than confidentiality.

dangers of drones in industrial settings

Dangers of drones in industrial settings

Posted on 01/21/2021, by INCIBE
The attacks on the Saudi Aramco oil refinery have highlighted the vulnerabilities of these plants against physical attacks using drones. There’s a wide variety of physical and cyber attacks that use drones, from launching explosives, to capturing images, invasion of privacy or taking screenshots of Wi-Fi traffic, so companies should take new defense measures in order to protect their assets
Sweyntooth: Bluetooth in the spotlight

SweynTooth: Bluetooth in the spotlight

Posted on 12/17/2020, by INCIBE
Wireless communications encompass a set of protocols that are widely used in some industrial sectors. In particular, building automation is based on these protocols, mainly using the BACNET and Lontalks protocols, but also making use of new ZigBee and Bluetooth based devices for IIoT. This article will provide information on SweynTooth, a set of vulnerabilities that affect Bluetooth technology.
cyberchallenges to security in industrial robotics

Cyberchallenges to security in industrial robotics

Posted on 11/19/2020, by INCIBE
Around 4 million robots are expected to be introduced in the area of industry over the next five years. This is on top of the evolution towards industry 4.0, in which industrial robotics is crucial, and which is now consolidated in any industrial process, from the manufacturing industry to any large-area warehouse. In that industrial transformation, barriers must be applied to ensure the integrity of the components and to prevent incidents in plants.
GOOSE

Security in the GOOSE protocol

Posted on 08/06/2020, by INCIBE
After the articles “IEC 61850 Standard, all for one and one for all” and “Multicast security in IEC 61850”, it is useful to add more information about the cybersecurity guidelines set out in the IEC 62351 standard with respect to the GOOSE protocol. An explanation will be made of the operation of the protocol, the weaknesses it presents and the appropriate security measures to protect it against possible attackers.
Preventing the leaking of information in ICS

Preventing the leaking of information in ICS

Posted on 05/28/2020, by INCIBE
Exfiltration of data, or information leakage, poses a threat to all companies throughout the world. It is important to know the possible ways information can get out to control them and avoid a loss of information in our organisation. Since in industry the most important factor is availability, this threat has to be put into perspective.
Cyber-resilience

Cyber-resilience: the key to overcoming incidents

Posted on 05/14/2020, by INCIBE
The goal of cyber-resilience for an organization, whether or not it belongs to a strategic sector, whether or not it provides one of these digital services, is to maintain its primary purpose and integrity in the face of a cybersecurity threat or attack to an ideal level. Continuous detection processes must be established given that total prevention will never be guaranteed.

Pages