Critical infrastructure

Critical infrastructure
Target Audience As I have come in contact with those new to industrial control systems – whether they be supervisor control and data acquisition (SCADA) syst

January 24, 2017
Jim Acord
Critical infrastructure
Introduction A cyber-attack against critical infrastructure could cause the paralysis of critical operations with serious consequences for a country and its

October 14, 2016
Pierluigi Paganini
Critical infrastructure
1. Introduction Since the invention of the steam locomotive, there have been continuous technological developments in the field of railway transport. For ex

April 25, 2016
Daniel Dimov
Critical infrastructure
Recently, I've published a post in the form of Interview about Oil and Gas Cyber Security, and it received a lot of attention. It seems that nowadays researc

March 07, 2016
Alexander Polyakov
Critical infrastructure
In the recent presentation at BlackHat, you mentioned that oil and gas is one of the industries most plagued by cyber-attacks. What makes oil and gas an attr

December 15, 2015
Alexander Polyakov
Critical infrastructure
Critical infrastructure under attack The protection of critical infrastructure is a pillar of the cyber security strategy of any government. Cybercriminal, h

October 12, 2015
Pierluigi Paganini
Critical infrastructure
The Incidents Imagine that one day you wake up and trading is halted on the New York Stock Exchange (NYSE) floor; meanwhile systems at United Airlines and th

July 27, 2015
Pierluigi Paganini
Critical infrastructure
Cyber attacks on the aviation industry are becoming a sensitive issue. Considering that cyberspace provides a low-cost haven for carrying out a broad range o

February 26, 2015
Dan Virgillito
Critical infrastructure
SCADA (supervisory control and data acquisition) is a type of software application and hardware control that defines the way data and real-time processing is

February 01, 2015
Infosec
Critical infrastructure
US critical infrastructure under attack US authorities are warning companies operating in every industry of a significant increase in the number of cyber att

November 25, 2014
Pierluigi PaganiniLearn ICS/SCADA Security
Build your critical infrastructure security skills with hands-on training in Infosec Skills. Train how you learn best:- Practice realistic scenarios
- Build hands-on skills
- Learn live or on-demand
- Get certified
In this series
- Securing operational technology: Safeguard infrastructure from cyberattack
- Operation technology sees rise in targeted remote access Trojans and ransomware
- Vehicle hacking: A history of connected car vulnerabilities and exploits
- Operational technology compromises: Low sophistication, high-frequency
- ICS/SCADA threats and threat actors
- Incident response and recovery best practices for industrial control systems
- BPCS & SIS
- Security Technologies for ICS/SCADA environments
- Data Loss Protection (DLP) for ICS/SCADA
- ICS/SCADA Wireless Attacks
- Security controls for ICS/SCADA environments
- SCADA & security of critical infrastructures [updated 2020]
- CIP (Common Industrial Protocol): CIP messages, device types, implementation and security in CIP
- Open vs proprietary protocols
- Critical security concerns facing the energy & utility industry
- ICS/SCADA Social Engineering Attacks
- ICS/SCADA Malware Threats
- Biggest threats to ICS/SCADA systems
- SIEM for ICS/SCADA environments
- Intrusion Detection and Prevention for ICS/SCADA Environments
- Firewalls for ICS/SCADA environments
- ICS/SCADA Security Technologies and Tools
- The state of threats to electric entities: 4 key findings from the 2020 Dragos report
- Modbus, DNP3 and HART
- RS-232 and RS-485
- BACnet
- TASE 2.0 and ICCP
- FOUNDATION Fieldbus
- Account Management Concepts for ICS/SCADA environments
- PROFIBUS and PROFINET
- ICS Strengths and Weaknesses (from security perspective)
- Access Control Implementation in ICS
- ICS Components
- Access Control Models for ICS/SCADA environments
- ICS/SCADA Security Specialist/Technician Role
- Credential Management and Enforcement for ICS/SCADA environments
- IT vs ICS
- Process control network (PCN) evolution
- ICS protocols
- Saving lives with ICS and critical infrastructure security
- ICS/SCADA Access Controls
- Types of ICS
- Physical security for ICS/SCADA environments
- Introduction to SCADA security
- ICS/SCADA security overview
- Who Is Targeting Industrial Facilities and ICS Equipment, and How?
- Configuration of Anti-Virus and Anti-Malware Software within an ICS Environment
- MyPublicWiFi – A Windows Utility to manage ICS
- Situational awareness and ICS Using GRASS MARLIN
- Cyber risks for Industrial environments continue to increase
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!