Archive for January, 2013

The Myth of Rip and Replace in SCADA and Industrial Control Systems #cybersecurity #pauto #SCADA @tofino @digitalbond

Recently, Eugene Kaspersky made headlines about designing an operating system for industrial control systems. It doesn’t seem to have gone anywhere, as you might expect.read more

Loss of Control (LOC) and Loss of View (LOV) incidents are very dangerous and not uncommon

In the IT environment a denial-of-service is one of the worst case scenarios. In this case, data can no longer move and the system comes to a stop. In the ICS environment, the worst case scenario is loss of control (LOC) and/or loss of view (LOV). That…

Loss of Control (LOC) and Loss of View (LOV) incidents are very dangerous and not uncommon

In the IT environment a denial-of-service is one of the worst case scenarios. In this case, data can no longer move and the system comes to a stop. In the ICS environment, the worst case scenario is loss of control (LOC) and/or loss of view (LOV). That…

Why are unintentional ICS cyber incidents important to address

NIST defines a cyber incident to be communications between systems (or people and systems) that affect confidentiality, integrity, or availability. The NIST definition does not require an incident to be malicious to be defined as a cyber incident. Ther…

When should an industrial facility be shutdown because of malware

Recently, ICS-CERT disclosed that in October 2012 a computer malware virus invaded a turbine control system at a US power plant when a technician "unknowingly" inserted an infected USB computer drive into the network, keeping the plant off li…

@Belden @Tofino tested by @DigitalBond: It works!

Recently, several ICS end users in the Middle East and Asia have been exposed to attacks directly on the control systems through firewalls that have been misconfigured, or not configured correctly, for Modbus and OPC data. These attacks have caused wee…

@Belden @Tofino tested by @DigitalBond: It works!

Recently, several ICS end users in the Middle East and Asia have been exposed to attacks directly on the control systems through firewalls that have been misconfigured, or not configured correctly, for Modbus and OPC data. These attacks have caused wee…

The need to isolate control systems from corporate networks

The November/December 2012 issue of ISA’s Intech magazine has an article "Selecting temperature measurement and control systems". The article states: "Network connectivity ties everything together. The goal of any DAS (data acquisition …

The need to isolate control systems from corporate networks

The November/December 2012 issue of ISA’s Intech magazine has an article "Selecting temperature measurement and control systems". The article states: "Network connectivity ties everything together. The goal of any DAS (data acquisition …

The need to isolate control systems from corporate networks

The November/December 2012 issue of ISA’s Intech magazine has an article "Selecting temperature measurement and control systems". The article states: "Network connectivity ties everything together. The goal of any DAS (data acquisition …