NIST updates security guide to industrial control systems SegInfo Blog - Information Security - Technology - News, Articles and News
Home | Videos and Tips | Articles | Recommended Books | Challenges | Strips | Columnists | About | Contact | Media Kit Test | SegInfocast | Workshop | SegInfo Lectures | War Project Driving Day | War Project Trashing Day | Press
Bruno Filipe Salgado Villar Henrique Soares Mariano Sumrell Rafael Soares Ferreira Machado Raphael Ricardo Kleber potential Tulio Alvarez Victor Santos Walter Capanema History April 2015 (2) March 2015 (5) February 2015 (7) January 2015 (10) December 2014 (7) November 2014 ( 14) October 2014 (14) September 2014 (18) August 2014 (12) July 2014 (16) June 2014 (23) May 2014 (30) April 2014 (15) June 2014 (14) February 2014 (22) January 2014 ( 17) December 2013 (11) November 2013 (8) October 2013 (8) September 2013 (11) August 2013 (21) July 2013 (26) June 2013 (17) May 2013 (21) April 2013 (38) March 2013 ( 37) February 2013 (20) January 2013 (27) December 2012 (15) November 2012 (18) October 2012 (21) September 2012 (16) August 2012 (23) July 2012 (23) June 2012 (22) May 2012 ( 27) April 2012 (21) June 2012 (22) February 2012 (15) January 2012 (19) December 2011 (22) November 2011 (29) October 2011 (31) September 2011 (33) August 2011 (44) July 2011 ( 39) June 2011 (36) May 2011 (54) April 2011 (34) June 2011 (71) February 2011 (99) January 2011 (94) December 2010 (103) November 2010 (72) October 2010 (97) September 2010 ( 97) August potential 2010 (114) July 2010 (100) June 2010 (55) May 2010 (13)
0-day adobe android apple botnet Brazil cellular chrome cisco encryption united states statistical study SegInfo Event exploit firefox flash fraud google government internet explorer iOS iphone potential java justice law linux malware metasploit microsoft mozilla office oracle research release smartphone privacy police reader report spam virus vulnerability windows xss
The National Institute of Standards and Technology (NIST) issued for review and public comment potential a great proposal for updating its Safety Guide to Industrial Control Systems (ICS - Industrial Control Systems), which can be seen here.
Most industrial control systems constituted up until recently on proprietary technologies. True hardware and software collections running stand-alone way, isolated from most external threats. Today, there is a wide availability of integration with applications, enabled devices to the Internet and other IT offerings, and data used increasingly potential to support business decisions through connections with management systems. potential
Although this increased connectivity has brought potential great benefits, potential both in operational and managerial framework, it also provided an increase in exposure of these systems, malicious attacks; equipment failures; errors and other threats related software - these vulnerabilities caused by insufficient protection against malware, improper operation, maintenance of outdated systems; among other factors.
Downloaded over 2.5 million times since its initial potential release in 2006, the NIST guide advises on how to reduce potential the vulnerability of ICS used by industrial plants, potential utilities and other large infrastructure operations, such as the distribution sector energy. The new project - second guide review - includes sections updates on threats and vulnerabilities in ICS, risk management, best practices, architectures and security potential features, and tools to ICS, and a new appendix that had been detailed in NIST SP 800-53 Revision 4, offering personalized guidance on how to adapt and apply security controls and improvements in them.
Home | About | Event 2012 | Challenges | Articles | Columnists potential | Strips | Tips | Contact Us Home | SegInfocast | Videos and Tips | Workshop potential | Articles | Challenges | Strips | Columnists | About | Contact Phone: +55 (21) 2561-0867 and +55 (21) 2210-6061 Mobile: +55 (21) 97270-3503 2010 SegInfo Blog - Information Security - Technology - News, Articles and News - Events, News, Articles and News Technology and Information Security Under License Creative Commons - Some rights reserved
Home | Videos and Tips | Articles | Recommended Books | Challenges | Strips | Columnists | About | Contact | Media Kit Test | SegInfocast | Workshop | SegInfo Lectures | War Project Driving Day | War Project Trashing Day | Press
Bruno Filipe Salgado Villar Henrique Soares Mariano Sumrell Rafael Soares Ferreira Machado Raphael Ricardo Kleber potential Tulio Alvarez Victor Santos Walter Capanema History April 2015 (2) March 2015 (5) February 2015 (7) January 2015 (10) December 2014 (7) November 2014 ( 14) October 2014 (14) September 2014 (18) August 2014 (12) July 2014 (16) June 2014 (23) May 2014 (30) April 2014 (15) June 2014 (14) February 2014 (22) January 2014 ( 17) December 2013 (11) November 2013 (8) October 2013 (8) September 2013 (11) August 2013 (21) July 2013 (26) June 2013 (17) May 2013 (21) April 2013 (38) March 2013 ( 37) February 2013 (20) January 2013 (27) December 2012 (15) November 2012 (18) October 2012 (21) September 2012 (16) August 2012 (23) July 2012 (23) June 2012 (22) May 2012 ( 27) April 2012 (21) June 2012 (22) February 2012 (15) January 2012 (19) December 2011 (22) November 2011 (29) October 2011 (31) September 2011 (33) August 2011 (44) July 2011 ( 39) June 2011 (36) May 2011 (54) April 2011 (34) June 2011 (71) February 2011 (99) January 2011 (94) December 2010 (103) November 2010 (72) October 2010 (97) September 2010 ( 97) August potential 2010 (114) July 2010 (100) June 2010 (55) May 2010 (13)
0-day adobe android apple botnet Brazil cellular chrome cisco encryption united states statistical study SegInfo Event exploit firefox flash fraud google government internet explorer iOS iphone potential java justice law linux malware metasploit microsoft mozilla office oracle research release smartphone privacy police reader report spam virus vulnerability windows xss
The National Institute of Standards and Technology (NIST) issued for review and public comment potential a great proposal for updating its Safety Guide to Industrial Control Systems (ICS - Industrial Control Systems), which can be seen here.
Most industrial control systems constituted up until recently on proprietary technologies. True hardware and software collections running stand-alone way, isolated from most external threats. Today, there is a wide availability of integration with applications, enabled devices to the Internet and other IT offerings, and data used increasingly potential to support business decisions through connections with management systems. potential
Although this increased connectivity has brought potential great benefits, potential both in operational and managerial framework, it also provided an increase in exposure of these systems, malicious attacks; equipment failures; errors and other threats related software - these vulnerabilities caused by insufficient protection against malware, improper operation, maintenance of outdated systems; among other factors.
Downloaded over 2.5 million times since its initial potential release in 2006, the NIST guide advises on how to reduce potential the vulnerability of ICS used by industrial plants, potential utilities and other large infrastructure operations, such as the distribution sector energy. The new project - second guide review - includes sections updates on threats and vulnerabilities in ICS, risk management, best practices, architectures and security potential features, and tools to ICS, and a new appendix that had been detailed in NIST SP 800-53 Revision 4, offering personalized guidance on how to adapt and apply security controls and improvements in them.
Home | About | Event 2012 | Challenges | Articles | Columnists potential | Strips | Tips | Contact Us Home | SegInfocast | Videos and Tips | Workshop potential | Articles | Challenges | Strips | Columnists | About | Contact Phone: +55 (21) 2561-0867 and +55 (21) 2210-6061 Mobile: +55 (21) 97270-3503 2010 SegInfo Blog - Information Security - Technology - News, Articles and News - Events, News, Articles and News Technology and Information Security Under License Creative Commons - Some rights reserved
No comments:
Post a Comment