Critical infrastructure

Critical infrastructure
Introduction An Industrial Control System (ICS) is any technology used to control and monitor industrial activities. Supervisory control and data acquisitio

July 29, 2020
Tyra Appleby
Critical infrastructure
Current Scenario Industrial control systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems are critical components for the operation of

July 15, 2020
Pierluigi Paganini
Critical infrastructure
Common Industrial Protocol (CIP) was created by Open DeviceNet Vendors Association Company (ODVA) specifically for automating industrial processes for sharin

May 29, 2020
Nitesh Malviya
Critical infrastructure
To understand ICS/SCADA networks and how various components communicate with each other, we need to understand the underlying protocols that are being used b

May 27, 2020
Nitesh Malviya
Critical infrastructure
A perfect storm of technical & human vulnerabilities The global dependency and wide use of utility companies makes the system highly vulnerable to both n

May 18, 2020
Susan Morrow
Critical infrastructure
Introduction ICS/SCADA systems are essential to the daily operations of utility companies and industrial manufacturers. Due to their importance, these vulner

April 29, 2020
Christine McKenzie
Critical infrastructure
ICS systems at risk Historically, malware threats for Industrial Control Systems (ICS) have been largely hypothetical, as incidents involving malware designe

April 28, 2020
Rodika Tollefson
Critical infrastructure
Imagine a scenario where two nations are at war. One nation has the capability to attack the other's industrial infrastructure, like the electrical grid, oil

April 28, 2020
Satyam Singh
Critical infrastructure
Security Information and Event Management (SIEM) solutions are the traditional IT go-to for organizations looking to get the most out of their vast informati

April 28, 2020
Greg Belding
Critical infrastructure
Introduction Although the target audience for this writing is information security professionals such as ICS & SCADA or automation managers and engineers

April 28, 2020
Dimitar KostadinovLearn ICS/SCADA Security
Build your critical infrastructure security skills with hands-on training in Infosec Skills. Train how you learn best:- Practice realistic scenarios
- Build hands-on skills
- Learn live or on-demand
- Get certified
In this series
- Securing operational technology: Safeguard infrastructure from cyberattack
- Operation technology sees rise in targeted remote access Trojans and ransomware
- Vehicle hacking: A history of connected car vulnerabilities and exploits
- Operational technology compromises: Low sophistication, high-frequency
- ICS/SCADA threats and threat actors
- Incident response and recovery best practices for industrial control systems
- BPCS & SIS
- Security Technologies for ICS/SCADA environments
- Data Loss Protection (DLP) for ICS/SCADA
- ICS/SCADA Wireless Attacks
- Security controls for ICS/SCADA environments
- SCADA & security of critical infrastructures [updated 2020]
- CIP (Common Industrial Protocol): CIP messages, device types, implementation and security in CIP
- Open vs proprietary protocols
- Critical security concerns facing the energy & utility industry
- ICS/SCADA Social Engineering Attacks
- ICS/SCADA Malware Threats
- Biggest threats to ICS/SCADA systems
- SIEM for ICS/SCADA environments
- Intrusion Detection and Prevention for ICS/SCADA Environments
- Firewalls for ICS/SCADA environments
- ICS/SCADA Security Technologies and Tools
- The state of threats to electric entities: 4 key findings from the 2020 Dragos report
- Modbus, DNP3 and HART
- RS-232 and RS-485
- BACnet
- TASE 2.0 and ICCP
- FOUNDATION Fieldbus
- Account Management Concepts for ICS/SCADA environments
- PROFIBUS and PROFINET
- ICS Strengths and Weaknesses (from security perspective)
- Access Control Implementation in ICS
- ICS Components
- Access Control Models for ICS/SCADA environments
- ICS/SCADA Security Specialist/Technician Role
- Credential Management and Enforcement for ICS/SCADA environments
- IT vs ICS
- Process control network (PCN) evolution
- ICS protocols
- Saving lives with ICS and critical infrastructure security
- ICS/SCADA Access Controls
- Types of ICS
- Physical security for ICS/SCADA environments
- Introduction to SCADA security
- ICS/SCADA security overview
- Who Is Targeting Industrial Facilities and ICS Equipment, and How?
- Configuration of Anti-Virus and Anti-Malware Software within an ICS Environment
- MyPublicWiFi – A Windows Utility to manage ICS
- Situational awareness and ICS Using GRASS MARLIN
- Cyber risks for Industrial environments continue to increase
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!