Day 2 Wed, September 16, 2015 2015
DOI: 10.2118/176779-ms
|View full text |Cite
|
Sign up to set email alerts
|

ICS and IT: Managing Cyber Security Across the Enterprise

Abstract: Industrial Control Systems (ICS) were originally built on proprietary technology and primarily focused on “up-time” and “safety”. Being isolated from the business environment they were independent islands of networked devices. However, ongoing advancements in business technology, brought with it new possibilities, such as the ability to access data and systems located inside of the previously isolated ICS environments. At this point many Industrial Control Systems (ICS) moved from proprietary technologies, to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…However, manufacturers may not offer updates for devices that have reached the end of their life-cycle, and in some cases, IIoT devices may not allow for updates or patches [23]. In that case, compensating measures capable of reducing system vulnerabilities, such as hardening [20], might be studied. -Use strong passwords: Passwords for HMIs (Human-Machine Interfaces) and workstations should be strong and unique, and they should never be the default ones [23].…”
Section: General Security Recommendationsmentioning
confidence: 99%
“…However, manufacturers may not offer updates for devices that have reached the end of their life-cycle, and in some cases, IIoT devices may not allow for updates or patches [23]. In that case, compensating measures capable of reducing system vulnerabilities, such as hardening [20], might be studied. -Use strong passwords: Passwords for HMIs (Human-Machine Interfaces) and workstations should be strong and unique, and they should never be the default ones [23].…”
Section: General Security Recommendationsmentioning
confidence: 99%