Network Threats
Picture this scenario:
-
An employee has a company laptop on the internet at his home office, connected to the control network through a VPN (Virtual Private Network)
-
A hacker from overseas infects the laptop with a virus over the Internet
-
The virus then propagates over the VPN connection into the control network and infects another Windows PC located right in the heart of the control system
Is this just a hypothetical situation? It couldn't happen to you? The bad news is that this is a real incident that actually happened to the water supply system in Harrisburg, Pennsylvania in 2006.
Control networks are highly vulnerable to cyber incidents. The growing complexity of modern control systems means that they need security now more than ever. The Harrisburg incident is just one of many Security Incidents you can read about.
The following table provides a summary of types of Network Threats and links to Case Profiles that document real world examples.
Threat: Poor Network Segmentation | Real World Examples |
Many control systems have evolved over time from simple, stand-alone systems to complex interconnected networks. These networks are typically wide-open with no isolation between different sub-systems, so if a problem occurs in one area it can quickly spread throughout the network. Even worse, your staff typically have very few tools to isolate and identify the source of a problem, leading to lengthy shutdowns and overtime costs when problems do occur. How are you isolating the sub-systems in your network? |
|
Tofino Solution | Featured Products |
Tofino is the ideal solution for segmenting a control network into security zones. It can be installed into an existing system with no changes to the network, forming 'conduits' of communications between the zones. The control engineer can define rules that specify which network devices are allowed to communicate and what protocols they may use. Any network traffic that does not fit the rules is automatically blocked by Tofino and reported to operations personnel as a security alert. |
Threat: Multiple Network Entry Points | Real World Examples |
Even if your control network doesn’t connect to the internet, you’re still at risk. Studies show that the vast majority of cyber security incidents originate from a variety of secondary points of entry into the network, including
A single infected USB storage device can be enough to shut down an entire plant. |
|
Tofino Solution | Featured Products |
A security risk assessment, combined with Tofino's Zone-Level Security strategy, identifies potential threat sources and entry points and isolates those points. If an attack does originate from a transient entry point, the potential damage is contained only to the zone in which the attack originated. |
Tofino offers exceptional value
Even simple network issues can result in significant financial losses due to plant down time:
- Daimler Chrysler: Estimated $14M loss
- TVA/Browns Ferry: Estimated $600K loss
Tofino is a proactive solution that will help you reduce or eliminate production losses caused by these cyber security incidents.