Recently a very complex worm called Flame has been discovered attacking companies in the Middle East, and it is an excellent example of what security experts call an Advanced Persistent Threat (APT). Figuring out how to defend against APTs is a major focus in the IT security world.
Practical SCADA Security
Control System Security Threats, Security / Reliability Incidents, Useful Industrial Cyber Security Tips
- 4 comments
- Add new comment
The discovery of the Flame malware last week focused the cyber security world on the sophisticated strikes targeting energy companies in the Middle East. Although Flame’s goal was espionage rather than damaging operations as Stuxnet did, it has been seen as one more indication that the industrial world is now in the bull’s eye of clever attackers.
Over the weekend a new super worm exploded onto the cyber security landscape. Known as Flame or sKyWIper, it appears to be targeting sites in the Middle East, just like the Stuxnet and Duqu worms did. But what does it have to do with SCADA or ICS security? At this stage the answer appears to be nothing and…everything.
Note from Eric Byres: Oliver Kleineberg makes his debut today as a blogger for Practical SCADA Security and we welcome his expertise in the areas of fault tolerance and redundant networking. He has recently joined Tofino Security from Hirschmann, our sister company, based in Germany (and both of our groups are part of Belden).
Recently I wrote about one of the fundamentals of industrial cyber security, which is the concept of Defense in Depth.
Today I am going to write about another foundation concept, which goes hand-in-hand with Defense in Depth, and that is using ANSI/ISA-99 Standards to improve control system security.
Factors that have degraded Control Network Security
There are two opposing trends impacting control network design today:
- ‹ newer posts
- 14 of 33
- older posts ›