Displaying 1–25 of 41 results for Cybersecurity

Sort By Relevance Sort By Date
1 2

Technology Brief: Cybersecurity

(Whitepaper)

Cybersecurity is an Acknowledged and Growing Threat to the Operational Integrity of Process Manufacturing and other Critical Infrastructure Sectors

Cybersecurity Through Real-Time Distributed Control Systems

(Whitepaper)

Critical infrastructure sites and facilities are becoming increasingly dependent on interconnected physical and cyber-based real-time distributed control systems (RTDCSs). A mounting cybersecurity threat results from the nature of these ubiquitous and sometimes unrestrained communications ...

Bound to Fail: Why Cybersecurity Risk Cannot Simply Be Managed Away

(Whitepaper)

The approach that both government and business has taken to ICS cybersecurity of critical infrastructure assets over the last 10 years is systemically flawed and doomed to failure

Cybersecurity in Electrical Substations

(Whitepaper)

A good cybersecurity policy, however, is a simple first step to maintaining the reliability and the safety of substation and grid operations.

How to Defend Your Systems Against Dragonfly Cybersecurity Attacks

(Whitepaper)

By downloading this white paper, owners and operators of manufacturing companies can better understand the nature of advanced cybersecurity threats against ICS and SCADA systems. The report is divided into four parts: identifying targets, analyzing malware, assessing consequences, and defending ...

Cybersecurity Best Practices

(Whitepaper)

Here are 12 basic cybersecurity recommendations that can help reduce exploitable weaknesses and defend against avoidable data breaches and cyberattacks.

Securing the Modern Electric Grid from Physical and Cyber Attacks

(Whitepaper)

Statement for the Record, July 21, 2009 Hearing before the Subcommittee on Emerging Threats, Cybersecurity, Science and Technology.</p> <p>I appreciate the opportunity to provide the following statement for the record. I have spent more than thirty-five years working in the commercial power ...

Defending Against the Dragonfly Cybersecurity Attack Part B – Analyzing the ...

(Whitepaper)

The age of malware specifically targeting industrial control systems (ICS) began in 2010 when Stuxnet1 was revealed to be disrupting operations at one of Iran’s nuclear enrichment facilities. Recently, a sophisticated malware, known as Dragonfly by some and Energetic Bear by others, was ...

Can We Learn from Industrial Control Systems/SCADA Security Incidents?

(Whitepaper)

The EU's cybersecurity Agency ENISA released this white paper, giving recommendations regarding prevention and preparedness for an agile and integrated response to cybersecurity attacks and incidents against industrial control systems (ICS)/SCADA.

Best of ABB Automation &amp; Power World 2015

(Whitepaper)

Harnessing the Power of Change. From IoT and cybersecurity to robotics and managing change, here's the best conference content .

Highlights of ABB Automation & Power World 2013 - Connect, Learn, Succeed

(Whitepaper)

This year's ABB Automation & Power World, held March 25-28 in Orlando, Fla., included a broad range of need-to-know presentations for automation and power professionals on topics ranging from cybersecurity concerns to efficiency and reliability, and data power usage.

Defending Against the Dragonfly Cybersecurity Attacks Part A - Identifying ...

(Whitepaper)

The age of malware specifically targeting industrial control systems (ICS) began in 2010 when Stuxnet1 was revealed to be disrupting operations at one of Iran’s nuclear enrichment facilities. Recently, a sophisticated malware, known as Dragonfly by some and Energetic Bear by others, was ...

Who Controls the Off Switch?

(Whitepaper)

We're about to acquire a significant new cybervulnerability. The world's energy utilities are starting to install hundreds of millions of 'smart meters' which contain a remote off switch. Its main purpose is to ensure that customers who default on their payments can be switched remotely to a ...

Using Tofino to Control the Spread of Stuxnet Malware

(Whitepaper)

<p>This application note describes how to use the Tofino Industrial Security Solution to prevent the spread of the Stuxnet worm in both Siemens and non-Siemens network environments.</p> <p><b>What is Stuxnet?</b><br> Stuxnet is a computer worm designed to target one or more industrial systems ...

How Stuxnet Spreads - A Study of Infection Paths in Best Practice Systems

(Whitepaper)

The Stuxnet worm is a sophisticated piece of computer malware designed to sabotage industrial processes controlled by Siemens SIMATIC WinCC, S7 and PCS 7 control systems. The worm used both known and previously unknown vulnerabilities to spread, and was powerful enough to evade ...

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

(Whitepaper)

When adding, modifying or upgrading a system, many critical infrastructures conduct a Factory Acceptance Test (FAT). A FAT includes a customized testing procedure for systems and is executed before the final installation at the critical facility. Because it is difficult to predict the correct ...

Post-Stuxnet Industrial Security: How to Detect Industrial Malware on Day Zero

(Whitepaper)

Preventing the next Stuxnet-like attack on the control world might be impossible, but operators can mitigate the effects and contain worms and viruses through early detection.

Hacking the Industrial Network

(Whitepaper)

Industrial control networks are highly vulnerable to intelligent remote attacks, as well as non-intelligent viruses. With threats to these networks increasing in complexity and scope, decision makers need to take action before it's too late

2014 Cyberthreat Defense Report North America and Europe

(Whitepaper)

How are other IT security practitioners thinking differently about cyberthreats and their defenses, and should we adjust our perspective and plans to account for these differences?

Security incidents and trends in the SCADA and process industries

(Whitepaper)

This report presents evidence in support of a business case for improving security of Supervisory Control and Data Acquisition (SCADA), process control networks (PCN), and manufacturing and industrial automation systems based on an analysis of statistical trends in security incidents.

21 steps to improve security of SCADA networks

(Whitepaper)

The President’s Critical Infrastructure Protection Board, and the Department of Energy, have developed the steps outlined here to help any organization improve the security of its SCADA networks.

Security for critical infrastructure SCADA systems

(Whitepaper)

This White Paper provides a non-technical overview of critical infrastructure SCADA security and gives a background on SCADA systems and the history of critical infrastructure concern.

Security vulnerability assessment (SVA) revealed

(Whitepaper)

Many industrial processing plants have already screened their facilities and operations for security vulnerability potential and are conducing SVA on the high priority concerns. So where do they go from here?

Wireless security on the plant floor

(Whitepaper)

Most papers written on wireless security concerns address corporate LAN access. This paper discusses both corporate and industrial wireless concerns but places an emphasis on the industrial automation wireless security aspects.

IT security in industrial plants

(Whitepaper)

This article serves as a tutorial on IT security for industrial systems. Security objectives are explained, attack types are illustrated, and available and suggested countermeasures and general good practices are described.

Sort By Relevance Sort By Date
1 2