Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

ICS Insider | The Top 20 Cyber Attacks on Industrial Control Systems #1 | iSi

Автор: Waterfall Security Solutions

Загружено: 2020-11-29

Просмотров: 9962

Описание:

DOWNLOAD THE ACCOMPANYING WHITE PAPER TO THIS SERIES
The Top 20 Attacks on Industrial Control Systems - https://hubs.ly/H0zjZpL0

WATCH MORE EPISODES
Find the playlist here: https://hubs.ly/H0BrWYM0

DISCOVER MORE RESOURCES
The Industrial Security Podcast: https://hubs.li/Q01ptZ5c0
Free book: Secure Operations Technology: https://hubs.li/Q01ptZ7S0

0:00 Welcome to the Industrial Security Institute
0:58 History of the Paper
3:25 Target of the Attacks
4:05 Security Postures: 2013 (software based) vs. Modern (Hardware enforced)
5:32 The Ruler
6:43 Attack #1 - ICS Insider
9:34 The Score Card

THE INDUSTRIAL SECURITY INSTITUTE
OT / industrial / ICS cybersecurity concepts from the perspective of the world’s most secure industrial sites. Truly secure sites ask different questions, and so get different answers. Subscribe to never miss an episode: https://hubs.ly/H0BBwr80

EPS. 1 - ICS Insider
A disgruntled control-system technician steals passwords by “shoulder surfing” other technicians, logs in to equipment controlling the physical process using the stolen passwords, and issues shut-down instructions to parts of the physical process, automatically triggering a partial plant shut-down.

THE TOP 20 CYBERATTACKS ON INDUSTRIAL CONTROL SYSTEMS
These Top 20 attacks have been selected to represent cyber threats to industrial sites across a wide range of circumstances, consequences and sophistication. No industrial operation is free of risk, and different industrial enterprises may legitimately have different “appetites” for certain types of risks. In this series we show how to use the Top 20 Cyberattacks to compare the strength of two security postures at a hypothetical water treatment plant: Defence in depth 2013 (software based security) vs. that same security posture plus a unidirectional security gateway device providing hardware-enfonced security). We ask the question, does either defensive posture reliably defeat each attack? Over the course of 20 episodes we build a score card that can be used to easily communicate risk reduction benefits to business decision-makers who are not familiar with cyber-security

ABOUT ANDERW GINTER
At Waterfall, Andrew leads a team of experts who work with the world’s most secure industrial sites. He is author of two books on industrial security, a co-author of the Industrial Internet Consortium’s Security Framework, and the co-host of the Industrial Security Podcast. Andrew spent 35 years designing SCADA system products for Hewlett Packard, IT/OT connectivity products for Agilent Technologies, and OT/ICS security products for Industrial Defender and Waterfall Security Solutions.

FOLLOW ANDREW GINTER
LinkedIn: https://hubs.ly/H0xHqst0
Twitter: https://hubs.ly/H0xHqTq0

FOLLOW WATERFALL SECURITY SOLUTIONS
Website: https://hubs.ly/H0xHqVP0
Twitter: https://hubs.ly/H0xHqZw0
LinkedIn: https://hubs.ly/H0xHr0g0
Facebook: https://hubs.ly/H0xHr340

#IndustrialSecurity #Cybersecurity #ICSinsider

ICS Insider | The Top 20 Cyber Attacks on Industrial Control Systems #1 | iSi

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

IT Insider | The Top 20 Cyber Attacks on Industrial Control Systems #2 | iSi

IT Insider | The Top 20 Cyber Attacks on Industrial Control Systems #2 | iSi

Промышленные системы управления — понимание архитектуры ICS

Промышленные системы управления — понимание архитектуры ICS

Top 10 OT Cyber Attacks of 2025

Top 10 OT Cyber Attacks of 2025

Cybersecurity for Industrial Control Systems: Why It Matters and How To Stay Protected

Cybersecurity for Industrial Control Systems: Why It Matters and How To Stay Protected

DEF CON 30  - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs

DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs

ICS/SCADA Fundamentals | Industrial Control Systems | Cybersecurity

ICS/SCADA Fundamentals | Industrial Control Systems | Cybersecurity

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Хакеры взломали разработчика электронных повесток

Хакеры взломали разработчика электронных повесток

Карьерный путь в сфере безопасности ОТ | Как подготовиться к работе в сфере кибербезопасности ОТ

Карьерный путь в сфере безопасности ОТ | Как подготовиться к работе в сфере кибербезопасности ОТ

Это должно было умереть, но стало стратегией

Это должно было умереть, но стало стратегией

Cyber Physical Systems Security (5: Attacking SCADA and Modbus Communications)

Cyber Physical Systems Security (5: Attacking SCADA and Modbus Communications)

SCADA Hacking | Operational Technology (OT) Attacks

SCADA Hacking | Operational Technology (OT) Attacks

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is  ICS and SCADA

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is ICS and SCADA

A Tale Of Two (Very Different) Secure ICS Architectures

A Tale Of Two (Very Different) Secure ICS Architectures

Как в 1С не остаться на уровне новичка в 2026 году?

Как в 1С не остаться на уровне новичка в 2026 году?

Webinar: OT Cybersecurity for IT Professionals

Webinar: OT Cybersecurity for IT Professionals

OT Security 101 Training: How to Get Started

OT Security 101 Training: How to Get Started

ICS Security Assessment Methodology, Tools & Tips

ICS Security Assessment Methodology, Tools & Tips

Крупнейшая кибератака на критически важную инфраструктуру США: атака вируса-вымогателя Colonial P...

Крупнейшая кибератака на критически важную инфраструктуру США: атака вируса-вымогателя Colonial P...

Anatomy of an ICS Network Attack - Security Awareness Video

Anatomy of an ICS Network Attack - Security Awareness Video

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]