Securing current and future process control systems
Critical Infrastructure Protection 1, 2008•Springer
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation
of many critical infrastructure components. However, PCSs increasingly employ commodity
information technology (IT) elements and are being connected to the Internet. As a result,
they have inherited IT cyber risks, threats and attacks that could affect the safe and reliable
operation of infrastructure components, adversely affecting human safety and the economy.
This paper focuses on the problem of securing current and future PCSs, and describes tools …
of many critical infrastructure components. However, PCSs increasingly employ commodity
information technology (IT) elements and are being connected to the Internet. As a result,
they have inherited IT cyber risks, threats and attacks that could affect the safe and reliable
operation of infrastructure components, adversely affecting human safety and the economy.
This paper focuses on the problem of securing current and future PCSs, and describes tools …
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodity information technology (IT) elements and are being connected to the Internet. As a result, they have inherited IT cyber risks, threats and attacks that could affect the safe and reliable operation of infrastructure components, adversely affecting human safety and the economy. This paper focuses on the problem of securing current and future PCSs, and describes tools that automate the task. For current systems, we advocate specifying a policy that restricts control network access and verifying its implementation. We further advocate monitoring the control network to ensure policy implementation and verify that network use matches the design specifications. For future process control networks, we advocate hosting critical PCS software on platforms that tolerate malicious activity and protect PCS processes, and testing software with specialized tools to ensure that certain classes of vulnerabilities are absent prior to shipping.
Keywords: Process control systems, access control, intrusion detection, secure platforms, vulnerability testing
Springer
Showing the best result for this search. See all results