Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Network Architecture | SANS ICS Concepts

Автор: SANS ICS Security

Загружено: 2021-03-18

Просмотров: 15155

Описание:

This SANS ICS concept overview covers considerations for using well-planned network architectures to improve the security of ICS environments. The design of a process control network and its connection to the business network and internet are critical considerations for ensuring the availability and resiliency of the process. Following the principles outlined by the Purdue Enterprise Reference Architecture (PERA) model, aka Purdue model, and improvements specified in ISA/IEC 62443 will help organizations with these efforts.

Script by Don C. Weber (@cutaway), Certified SANS Instructor and Cutaway Security, LLC

Don C. Weber is the Principal Consultant and Founder at Cutaway Security, LLC, an information security consulting company based in Texas. Don's previous experiences include large-scale incident response efforts for organizations with international assets and interests, the certification and accreditation of classified federal and military systems, assessment and penetration testing of worldwide commercial assets, and, as a Navy contractor, the management of a team of distributed security professionals responsible for the security of mission-critical Navy assets. Don has achieved his master's degree in network security, the Certified Information Systems Security Professional (CISSP) certification, and many GIAC certifications. Don was a founding member of the GIAC Ethics Council of which he was the GIAC EC Chair in 2009. Don regularly contributes to a wide variety of open source projects involving information security and incident response. Learn more about Don at https://www.sans.org/profiles/don-c-w...

References:

CISA Alerts

Alert (TA15-120A) Securing End-to-End Communications - https://us-cert.cisa.gov/ncas/alerts/...

Alert (TA17-075A) HTTPS Interception Weakens TLS Security - https://us-cert.cisa.gov/ncas/alerts/...

PERA Model - https://en.wikipedia.org/wiki/Purdue_...

ISA / IEC 62443 - https://en.wikipedia.org/wiki/IEC_62443

SANS ICS410 Posters - https://www.sans.org/security-resourc...

SANS ICS410 Reference Model Poster - https://www.sans.org/security-resourc...

SANS ICS Training:

ICS410: ICS/SCADA Security Essentials - https://www.sans.org/cyber-security-c...

ICS456: Essentials for NERC Critical Infrastructure Protection - https://www.sans.org/cyber-security-c...

ICS515: ICS Active Defense and Incident Response - https://www.sans.org/cyber-security-c...

ICS612: ICS Cybersecurity In-Depth - https://www.sans.org/cyber-security-c...

Network Architecture | SANS ICS Concepts

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Modbus Enumeration | SANS ICS Concepts

Modbus Enumeration | SANS ICS Concepts

Building a Secure OT Network | SANS ICS Concepts

Building a Secure OT Network | SANS ICS Concepts

Промышленные системы управления — понимание архитектуры ICS

Промышленные системы управления — понимание архитектуры ICS

The Five ICS Cybersecurity Critical Controls Webcast

The Five ICS Cybersecurity Critical Controls Webcast

A Tale Of Two (Very Different) Secure ICS Architectures

A Tale Of Two (Very Different) Secure ICS Architectures

Modbus Traffic Analysis | SANS ICS Concepts

Modbus Traffic Analysis | SANS ICS Concepts

Designing Industrial Networks the Right Way | Real-World IT OT Architecture Explained

Designing Industrial Networks the Right Way | Real-World IT OT Architecture Explained

How to Implement Network Segmentation in OT | Verve is now Rockwell Automation SecureOT

How to Implement Network Segmentation in OT | Verve is now Rockwell Automation SecureOT

The Purdue Model in OT security

The Purdue Model in OT security

Leveraging IEC 62443 Security Level SL Requirements to Define IACS Cybersecurity Metrics

Leveraging IEC 62443 Security Level SL Requirements to Define IACS Cybersecurity Metrics

Explaining RISC-V: An x86 & ARM Alternative

Explaining RISC-V: An x86 & ARM Alternative

Modbus Man-In-The-Middle | SANS ICS Concepts

Modbus Man-In-The-Middle | SANS ICS Concepts

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is  ICS and SCADA

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is ICS and SCADA

ПЛК против SCADA против DCS

ПЛК против SCADA против DCS

Master OT/ICS Cybersecurity Before It’s Too Late — Part 1: ISA/IEC 62443 Made Simple

Master OT/ICS Cybersecurity Before It’s Too Late — Part 1: ISA/IEC 62443 Made Simple

Stand-Alone Windows Hardening (SAWH) | SANS ICS Concepts

Stand-Alone Windows Hardening (SAWH) | SANS ICS Concepts

Webinar: OT Cybersecurity for IT Professionals

Webinar: OT Cybersecurity for IT Professionals

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Как сжимаются изображения? [46 МБ ↘↘ 4,07 МБ] JPEG в деталях

Как сжимаются изображения? [46 МБ ↘↘ 4,07 МБ] JPEG в деталях

Review of the Purdue Network Model | SANS ICS Security Brief

Review of the Purdue Network Model | SANS ICS Security Brief

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com