Engineers as well as IT staff in the process control and SCADA industries have varying levels of knowledge about industrial cyber security. We come across this regularly when talking to people at industry events or speaking with customers or partners. To help you, no matter where you are in the learning curve, we have recently released a five-part video series.
This article summarizes the videos and provides you with direct access to them.
As industrial networks have become more complex, more connected to business systems and make more use of Commercial-Off-The-Shelf (COTS) technologies, cyber security has become more important for their continued safe and reliable operation.
Our first video examines the current state of cyber security in SCADA and industrial control networks. It also talks about how we got to this point, and lays the foundation for discussing how to improve the security of these systems.
Many companies already use firewalls to isolate the plant and enterprise networks. What's so bad about this approach? Aren't these networks already protected?
Our second video explores the types of cyber security issues often seen in plant networks and explains how these issues can impact plant operations in spite of these firewalls.
Video 2 showed that a firewall on the plant network could not protect against many cyber security threats. But if that doesn't work, then what ARE you supposed to do to protect your plant?
This video explains Defense in Depth, the ISA99 Zones and Conduits model (now known as ISA IEC 62443 standard) and how industrial firewalls protect industrial networks.
IT engineers have been dealing successfully with cyber security issues for years, and there are many security products in daily use in enterprise networks. Why is cyber security such a challenge on control networks? Why can't the same tools and techniques be used to secure these systems?
The answer to these questions lie in understanding the unique requirements of control and SCADA networks, and applying cyber security strategies in ways that are appropriate to these applications.
(Full disclosure: This video highlights the Tofino Industrial Security Solution, our own product, and obviously we are biased in favor of it.)
The preceding videos discussed how Defense in Depth can be an effective strategy to secure control networks. How exactly does Tofino implement Defense in Depth? And what makes it the best solution?
This video takes a deeper dive into the components of the Tofino Industrial Security Solution, and examines how they work together to implement cyber security on the plant floor.
If you watch all of the videos above it will take just under 32 minutes and hopefully provide you with a good understanding of the fundamentals of ICS and SCADA Security.
Thanks to our Technical Sales Manager, Scott Howard, for creating these videos.
Do these videos provide useful information? Let us know your feedback.
© Tofino Security 2012 | All Rights Reserved | Tofino Security is part of Hirschmann, a Belden Brand