IT security in industrial plants - an introduction
نویسندگان
چکیده
topic of IT security is becoming increasingly relevant in modern automated industrial plants. Modern automation systems provide high levels of inter-connectivity. Implementations are based on commercial IT platforms , many of which are known to be vulnerable to electronic attacks. This article is part 1 of a three part tutorial on IT security for industrial systems. Security objectives are explained, attack types are illustrated, and available and suggested countermeasures and general good practices are briefly described. Part 2 of this series will address best practices in protecting against certain types of attacks, and Part 3 will survey emerging standards for automation system security.
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملIntroduction to the E-government Secure Cyberspace in 21st Century Government Minitrack
The cybersecurity aspects of critical infrastructure systems have become a hot topic for countries all across the globe. Information Technology has become pervasive in all aspects of our lives and this includes elements referred to as critical infrastructures. This minitrack examines aspects associated with the security of information technology used by governments and critical infrastructures ...
متن کاملCyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants
Digital technologies have been applied recently to the I&C systems of nuclear power plants. According to this application, cyber security concerns are increasing in nuclear facilities as in IT industries and other process industries. Many reports and standards are issued for cyber security in industrial control systems. Nuclear regulatory requirements based on the standards for industrial contr...
متن کاملEmployee Trust Based Industrial Device Deployment and Initial Key Establishment
An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005