4 Essential Layers of ICS Security

4 Essential Layers of ICS Security

Dean Ferrando, Lead Systems Engineer (EMEA) at Tripwire, offers four foundational principles of cyber security which may sound almost too obvious, but are the groundwork on which any other security measure should be built on.
Some organizations spend lots of time focusing on physical security, especially those with industrial control systems (ICS). Others are small organizations worried about their personal data being stolen. And then there’s everything in between the two.
While the end security goal is usually the same for each entity, problems of understanding often arise in security conversations that boil down to differences in industry-specific language phrasing.
A good example of that would be someone from the ICS world referring to their log management solution as the historian, whereas someone in the commercial vertical knows it as a SIEM. Fundamentally, they do the same thing in gathering up all the activity or log data from devices to be forensically stored and analyzed at a later date.
One of the best ways to overcome this is using analogies in security conversations when the need arises. Below are four examples that all ICS organizations should maintain or at least adhere to (at a minimum).
Also of interest: A guide to DNS Search Suffix Wi-Fi attacks

Copyright Lyonsdown Limited 2020

Top Articles

North Korean hackers indicted for cyber attacks and financial crimes worldwide

Three North Korean hackers were indicted for carrying out a wide range of cyber crimes and stealing more than $1.3 billion in cryptocurrency.

Popular Trends With Ties to Bitcoin

Love it or hate it, Bitcoin is one of the biggest trends around the globe right now.

Why Bitcoin Has the Highest Market Cap?

Not only is Bitcoin the first cryptocurrency ever invented, but it has managed to remain the most successful one, even as the competition grew, namely, today, there are over 2,000…

Related Articles