Industrial control system safety knowledge inventory

ICS (Industrial Control System) security issues have attracted more and more attention from relevant units because the major ICS security incidents that have occurred in recent years have entered the public's field of vision. ICS was born with the key to security. It is inherently isolated from the Internet, allowing any attacks on external networks to stop abruptly at the last step. However, the method is always more difficult than the difficulty. ICS is difficult to master, which does not mean that it is absolutely impossible. It is a catastrophe. This is a characteristic of traditional ICS. It is absolutely free from outside and inside. It thinks that it is safe to invade, so it is very ignorant of intranet security. The most famous ICS security incident in these years is none other than Stuxnet. The U.S. national team spent huge sums of money to build an intricate Stuxnet (Stuxnet), which chased and intercepted Iran’s first nuclear power plant, brought it into the factory with a USB flash drive and infected ICS. Accelerating the speed of the centrifuge caused its damage, which delayed the production of enriched uranium, and finally delayed Iran's nuclear program for 2 years. Some people speculate that an engineer was infected with a computer by a phishing attack and then brought the U disk into the factory; others speculated that the engineer was bought off because the Stuxnet virus destroys not only the centrifuge but also other parts, so it must To upgrade and update, someone needs to take the new version of Stuxnet's U disk and plug it into ICS soon.

The difference between information technology (IT) and operational technology (OT)/industrial control system security, coupled with the continuous emergence of security issues in industrial control systems and the proliferation of industrial Internet of Things (IIoT), has promoted a new round of consensus.

NIST, ANSSI, ARC, Garter Group, etc. have all realized that for factories to maintain safe and reliable operations, it is necessary to put the prevention of system misoperations in the first place. At the same time, the top priority of IT networks is still data protection. .

Priority difference between IT and OT

IT network security has always been defined as a set of measures to protect the confidentiality, integrity and availability of data. The network security of industrial control systems is gradually defined as a set of measures that can ensure the safe and reliable operation of physical industrial control processes and flow control computers.

NIST 800-82r2 Recommendation: Ensuring the network security of industrial control systems is very important for the safe and reliable operation of modern industrial processes.

The ARC advisory team pointed out that the safe and reliable operation of industrial processes is of utmost importance. This is why industrial network security is different from other IT network security projects.

Gartner found that from the perspective of safety planning and operation, the primary factors in the design of operational technology are safety and reliability. Compared with information technology, the latter focuses more on the confidentiality, integrity and availability of data. This difference in priority has led to differences in information technology (IT) and operational technology (OT) security plans. When focusing on reliability and security of the network, the information technology risk assessment method is not suitable, and the information technology security plan is usually not suitable.

For example, in the article "Seven Cybersecurity Myths of Operational Technology and the Industrial Internet of Things" published by Garter in 2017, it is wrong to use IT risk assessment methods to assess OT risks, and companies should not expect a company to protect information from the beginning. The security architecture and design can address the specific needs of the physical system.

Industrial control system security is different

When designing industrial control security plans, intrusion prevention is paid much more attention to than the detection, response and recovery of sudden security incidents. A preventive OT-centric security program should include the following elements:

Perimeter security-important factories usually have strong physical and network perimeter protection. These places do not allow the public to access their sensitive physical equipment. They also do not allow anyone to test their systems from the external network to find zero-day vulnerabilities.

Function-based design-Industrial websites with well-protected measures will carefully design their own security plans to resist various attacks, rather than trying to perceive the motives of specific attackers.

And Gartner pointed out in the report that the reason for focusing on the defensive nature of industrial control systems is-"Many operational technical security failures will have a direct impact on the physical environment, which can potentially cause casualties, environmental damage, or large-scale service interruptions. Although IT is safe to travel The consequences of the problem are serious and threaten the business, but the failure of IT security rarely endangers life safety or property loss." Detection, response and recovery are still important in industrial control system networks, but the first thing is prevention-after all, personal safety , Environmental disasters and damaged physical equipment cannot be restored from backups.

One-way gateway technology

Regarding the connection of industrial control system network firewalls, various experts, standards and guidelines that have been documented recommend the use of one-way gateways and related technologies in industrial environment firewalls. The ANSSI standard for industrial network security allows the use of firewalls on IT networks, but it is strongly recommended to use a one-way gateway on the IT/OT interface, and to completely disable the firewall on the interface that connects to the most sensitive industrial network.

One-way gateways can greatly promote the deployment of the Industrial Internet of Things. A one-way gateway is different from a firewall. It can directly connect industrial networks to IT, Internet and cloud systems, but there is no need to worry about hacker attacks penetrating into the protected industrial network.

8 Inches Tablet PC

The 8-inch tablet will have a big impact on the 7-inch and 10-inch tablet market. Because the portability of an 8-inch tablet is stronger than that of a 10-inch tablet, and the usable area is larger than that of a 7-inch tablet. The most important thing is that the price is more moderate, which is much cheaper than a 10-inch tablet. It can be said that the 8-inch tablet computer has a good balance between portability and screen display area, and is more likely to be favored by the majority of users.


8 Inches Tablet Pc,Tablet Computer,8 Inch Android Tablets,8 Inch Tablet

Jingjiang Gisen Technology Co.,Ltd , https://www.jsgisentec.com