Items Tagged with "ICS"
November 16, 2011 Added by:Joel Langill
First, you need to expand your concept of an “embedded web server” beyond something that a user would use when launching a browser and entering a URL for the device. Vendors actually use embedded web servers for a number of reasons, and many of these vendors are leaders in the industry...
November 16, 2011 Added by:Headlines
"Utility cyber security is in a state of near chaos. After years of vendors selling point solutions, utilities investing in compliance minimums rather than full security, and attackers having nearly free rein, the attackers clearly have the upper hand..."
November 15, 2011 Added by:Brent Huston
One of the largest identified issues among the conversations at the symposium was the idea that cooperation and coordination between control network operators and engineers and their peers on the traditional business-oriented IT staff is difficult, if not nearly impossible...
October 19, 2011 Added by:Headlines
“Duqu’s purpose is to gather intelligence data and assets from entities such as industrial control system manufacturers in order to more easily conduct a future attack against another third party. The attackers are looking for information such as design documents..."
October 18, 2011 Added by:Headlines
“Unfortunately, one thing has not changed. Cyber security is still way behind the attackers. Even where strong countermeasures exist, they are not consistently deployed, and most sophisticated attackers look at smart grids from a systemic perspective..."
June 07, 2011 Added by:Chris Blask
Once you get your head around the idea that you cannot trust your cyber devices you find it fits with existing industrial ideology quite well. The answer is to do your best to build a reliable cyber system - just as you do with the physical assets - then monitor it like a convicted criminal...
May 10, 2011 Added by:Headlines
The Index of Cyber Security is a measure of the risk to the corporate, industrial, and governmental information infrastructure. It is sentiment-based in recognition of the rapid change in cybersecurity threats and the state of cybersecurity metrics as a practical art...