A brief history of statistics

A systematic collection of data on the population and the economy was begun in the Italian city-states of Venice and Florence during the Renaissance. The term statistics, derived from the word state…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




Tesla Breach Demonstrates the Importance of Industrial Cyber Security

According to the email, Tesla has not determined if the employee acted alone or in conjunction with other disgruntled insiders or outside hackers.

For many years, air-gapping worked. Industrial networks enjoyed “security by isolation” and “security by obscurity.” Many industrial organizations, especially utility companies, employ equipment that is literally decades old; it was built before the internet as we know it today existed and was developed for reliability and safety, not cyber security.

However, the advent of the internet and the convergence of IT and OT have negated both security by isolation and security by obscurity. While OT systems once ran on simple, isolated, point-to-point networks with proprietary communication tools, they are now connected to enterprise networks, with open protocols such as the Ethernet and Internet protocol (IP). Additionally, OT networks are frequently connected to each other and, at least to some extent, to enterprise IT systems. Even allegedly “air-gapped” OT systems are accessible via USB drives or Bluetooth.

Some organizations attempt to apply the same cyber security principles that they use on their IT systems to their industrial equipment. This is entirely wrong. While there are some similarities, securing industrial networks is quite different than securing IT networks. OT and IT employees are often siloed from each other; many IT employees, even those with many years of experience, are wholly unfamiliar with the highly specialized equipment and procedures on the OT side. The two sides also have different concerns, especially regarding reliability and safety.

Realizing the unique requirements of industrial cyber security, NIST developed SP 800–82, Guide to Industrial Control Systems (ICS) Security. SP 800–82 is “intended to help pipeline operators, power producers, manufacturers, air traffic control centers and other managers of critical infrastructures to secure their systems while addressing their unique performance, reliability, and safety requirements.” It references ISA/IEC-62443, a common set of standards for industrial control systems.

The threats to industrial cyber security are real and growing. It is imperative that organizations put the proper technologies and processes in place to protect their equipment, employees, and the public at large.

Add a comment

Related posts:

Importance of lesson planning

This topic is very interesting to me and during all classes with Dr. Berry, readings and activities. I have been able to learn about lesson planning and also to know about the importance of this in…

Can INSERT YOUR NAME HERE Come Out and Play?

The author recalls living his best life and playing silly, invented games with friends.