October 2014

Misc

What to do about ICS cyber security threats?

Stuxnet, Shamoon, Heartbleed, Energetic Bear, and other cyber-security attacks keep coming with no end in sight. No one wants their industrial control system (ICS) to be the next target. So, what are ..

Neitzel, L., Mixer, R., Emerson Process Management

Stuxnet, Shamoon, Heartbleed, Energetic Bear, and other cyber-security attacks keep coming with no end in sight. No one wants their industrial control system (ICS) to be the next target. So, what are the biggest threats to ICSs (Fig. 1) and what can be done about them? One such ICS threat is allowing access from the Internet. Attacks from the Internet generally follow a common pattern. First, the attacker probes Internet facing access points of the plant’s IT system to find a bug that it can exploit to download executable code (malware). Using the downloaded code, this process is repeated, with the attacker hopping from node to node until the desired target, which may be an ICS node, i

Log in to view this article.

Not Yet A Subscriber? Here are Your Options.

1) Start a FREE TRIAL SUBSCRIPTION and gain access to all articles in the current issue of Hydrocarbon Processing magazine.

2) SUBSCRIBE to Hydrocarbon Processing magazine in print or digital format and gain ACCESS to the current issue as well as to 3 articles from the HP archives per month. $409 for an annual subscription*.

3) Start a FULL ACCESS PLAN SUBSCRIPTION and regain ACCESS to this article, the current issue, all past issues in the HP Archive, the HP Process Handbooks, HP Market Data, and more. $1,995 for an annual subscription.  For information about group rates or multi-year terms, contact J'Nette Davis-Nichols at Jnette.Davis-Nichols@GulfEnergyInfo.com or +1 713.520.4426*.

*Access will be granted the next business day.

Related Articles

From the Archive

Comments

Comments

{{ error }}
{{ comment.comment.Name }} • {{ comment.timeAgo }}
{{ comment.comment.Text }}