ICS Insider | The Top 20 Cyber Attacks on Industrial Control Systems #1 | iSi
Автор: Waterfall Security Solutions
Загружено: 2020-11-29
Просмотров: 9962
DOWNLOAD THE ACCOMPANYING WHITE PAPER TO THIS SERIES
The Top 20 Attacks on Industrial Control Systems - https://hubs.ly/H0zjZpL0
WATCH MORE EPISODES
Find the playlist here: https://hubs.ly/H0BrWYM0
DISCOVER MORE RESOURCES
The Industrial Security Podcast: https://hubs.li/Q01ptZ5c0
Free book: Secure Operations Technology: https://hubs.li/Q01ptZ7S0
0:00 Welcome to the Industrial Security Institute
0:58 History of the Paper
3:25 Target of the Attacks
4:05 Security Postures: 2013 (software based) vs. Modern (Hardware enforced)
5:32 The Ruler
6:43 Attack #1 - ICS Insider
9:34 The Score Card
THE INDUSTRIAL SECURITY INSTITUTE
OT / industrial / ICS cybersecurity concepts from the perspective of the world’s most secure industrial sites. Truly secure sites ask different questions, and so get different answers. Subscribe to never miss an episode: https://hubs.ly/H0BBwr80
EPS. 1 - ICS Insider
A disgruntled control-system technician steals passwords by “shoulder surfing” other technicians, logs in to equipment controlling the physical process using the stolen passwords, and issues shut-down instructions to parts of the physical process, automatically triggering a partial plant shut-down.
THE TOP 20 CYBERATTACKS ON INDUSTRIAL CONTROL SYSTEMS
These Top 20 attacks have been selected to represent cyber threats to industrial sites across a wide range of circumstances, consequences and sophistication. No industrial operation is free of risk, and different industrial enterprises may legitimately have different “appetites” for certain types of risks. In this series we show how to use the Top 20 Cyberattacks to compare the strength of two security postures at a hypothetical water treatment plant: Defence in depth 2013 (software based security) vs. that same security posture plus a unidirectional security gateway device providing hardware-enfonced security). We ask the question, does either defensive posture reliably defeat each attack? Over the course of 20 episodes we build a score card that can be used to easily communicate risk reduction benefits to business decision-makers who are not familiar with cyber-security
ABOUT ANDERW GINTER
At Waterfall, Andrew leads a team of experts who work with the world’s most secure industrial sites. He is author of two books on industrial security, a co-author of the Industrial Internet Consortium’s Security Framework, and the co-host of the Industrial Security Podcast. Andrew spent 35 years designing SCADA system products for Hewlett Packard, IT/OT connectivity products for Agilent Technologies, and OT/ICS security products for Industrial Defender and Waterfall Security Solutions.
FOLLOW ANDREW GINTER
LinkedIn: https://hubs.ly/H0xHqst0
Twitter: https://hubs.ly/H0xHqTq0
FOLLOW WATERFALL SECURITY SOLUTIONS
Website: https://hubs.ly/H0xHqVP0
Twitter: https://hubs.ly/H0xHqZw0
LinkedIn: https://hubs.ly/H0xHr0g0
Facebook: https://hubs.ly/H0xHr340
#IndustrialSecurity #Cybersecurity #ICSinsider
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: