2022年2月22日星期二

How to Establishing an industrial automation and control system security program by iso iec 62443-2-1

 

Cyber security is an increasingly important topic in modern organizations. Many organizations involved in information technology (IT) and business have been concerned with cyber security for many years and have well-established cyber security management systems (CSMS) in place as defined by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) (see ISO/IEC 17799 [23][1] and ISO/IEC 27001 [24]). These management systems provide an organization with a well-established method for protecting its assets from cyber attacks.

 

Industrial automation and control system (IACS) organizations have begun using commercial off the shelf (COTS) technology developed for business systems in their everyday processes, which has provided an increased opportunity for cyber attack against the IACS equipment. These systems are not usually as robust, in the IACS environment, as are systems designed specifically as IACS at dealing with cyber attack for many reasons. This weakness may lead to health, safety and environmental (HSE) consequences.

 

Organizations may try to use the pre-existing IT and business cyber security solutions to address security for IACS without understanding the consequences. While many of these solutions can be applied to IACS, they need to be applied in the correct way to eliminate inadvertent consequences.


burner management system

system for the safe start-up, monitoring and shutdown of burner systems associated with boilers, flares, incinerators, gas turbines, thermal oxidizers, and other fired equipment.

燃燒器管理系統

用於安全啟動、監控和關閉與鍋爐、火炬、焚化爐、燃氣輪機、熱氧化器和其他燃燒設備相關的燃燒器系統的系統。






沒有留言:

發佈留言

歡迎留下寶貴意見

AI驅動的新一代釣魚郵件(最近攻擊我們公司的詐騙郵件)

比起戀愛詐騙,需大量的人工互動,電子郵件詐騙可以說是低成本、高回報的詐騙方式。只要從暗網外洩資料裡面取得大量使用中的電子郵件,就能廣發詐騙信。 如何識破?簡單的可以從發信者的電子郵件,只要看到不對,立即通告資安部門,另外,從超連結的位置可以判斷。 從下面三個案例,我們可以發現AI...