
File | |
---|---|
PenTest_AUDITING__STANDARDS_01_2013_teasers.pdf |
Dear Readers,
In upcoming week we will release the new PenTest Auditing&Standsards dedicated to Supervisory Control and Data Acquisition. However, on today you can read in our Teaser one full article from that issue!
SCADA Device Security – Threats, Hackers and How to Protect Against Them
By Alan Grau from Icon Labs
SCADA protocols themselves are often inherently insecure. They may lack basic security measures. Instead they often rely on “security by obscurity” or on isolation from public networks for security. Without security measures such as authentication and encryption, the underlying protocols provide an easy avenue for hackers wishing to attack SCADA devices. Firewalls provide a simple and effective layer of security and have long been used to protect home and enterprise networks. A small, SCADA aware firewall can be used to protect devices in SCADA devices from a wide range of cyber-attacks. Learn how by controlling who the SCADA device talks to, most attacks can be blocked before a connection is even established.
What more you will find in the issue:
- SCADA, New Processes Require New Cyber Security Solutions by Larry Karisny from ProjectSafety.org
- Pentesting SCADA by Rob Hulsebos
- Defending Industrial Control Systems with Data Diodes by Austin Scott from Synergist SCADA Inc.
- The Interview with Dan Brabec, business manager, SCADA Products, Motorola Solutions by PenTest Team
- How Hackers Get Caught: the True Story by AB Consultancy Software SRL
File | |
---|---|
PenTest_AUDITING__STANDARDS_01_2013_teasers.pdf |