Cyber Security: A Perfect Storm
As companies and industries increasingly rely on technology, security risks become greater. With growing numbers of Windows machines and increased scarcity of skilled technical resources, a “perfect storm” of cyber threats in production facilities is looming.
Control System Security: Interacting with IT
Operations staff and plant engineers also have a keen interest in the security of control networks. They are responsible for the reliability, availability, safety and integrity of the process. Their facilities are the ones producing products and earning revenues, so their concerns, priorities and knowledge must also be considered when determining security options.
Chemical Processing Special Report: Secure plan(t)
In the decade before Stuxnet attacked process control systems in Iran, there were just five known supervisory control and data acquisition (SCADA) vulnerabilities for all control systems in the world, according to the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). In 2011, the year after Stuxnet, that vulnerability count jumped to more than 215. Last year, it reached 248 (Figure 1). No surprise then that Chemical makers are increasingly focusing on protecting their process control systems from intrusion both from the inside and outside. In this Chemical Processing Special Report: Secure plan(t), we take a look at:
How to better protect your control system - “Defense in depth” is crucial, and new and maturing technologies may help
Cyber Security Challenges – learn about countermeasures to protect control systems
Case Study: A vulnerability assessment reveals critical gaps in the security of a natural gas pipeline
How to mitigate security risks in legacy process control systems - several steps can help protect against threats and extend the life of legacy equipment
Learn how to secure your process control systems – and your plant. Download your copy of this Chemical Processing Special Report: Secure plan(t) now.
Chemical Processing Special Report: Cyber Security
The technology advances in control systems and open systems have afforded us improved efficiency, productivity and the ability to advance our operations. However, these improved technology advances have also come with risks that threaten these efficiencies. Viruses; an increased dependency on uptime, availability and reliability; operator errors and increased regulations are just some of the threats today's manufacturers need to contend with when managing their operations. In this Putman Media Special Report, we take a look at the cyber security issues today's manufacturers need to contend with; identify control systems vulnerabilities and offer a three-step approach for building better cyber security at your operations.
Honeywell Process Solutions
Application Whitelisting: Extend Your Security Arsenal
As the security threat landscape continues to evolve, so must your response. With increasing numbers of attempted intrusions, cautionary tales of security breaches and the potential for resulting damages at your site, application whitelisting can be an important addition to your security arsenal.
Application of Fingerprints to Increase Security
This 9-page paper summarizes the various applications and benefits of the use of fingerprints to restrict access to information and transactions. It covers access via the Internet and other networks as well as physical access.