End-to-end, lifecycle cyber protection for industrial systems: A guide

CADA networks in any factory or critical infrastructure application require protection against increasingly sophisticated and well-funded cyber threats. As emerging security standards such as IEC 62443 help marshal the industry’s response, effective protection calls for an end-to-end, lifecycle approach to device security, extending from the underlying hardware to top-level applications and back into the supply chain. Introduction: Industrial networks at risk Cyber attacks against industrial assets and infrastructures such as power grids aim to steal trade secrets, disrupt services, and damage economies. Tampering with industrial systems can also compromise safety and potentially cause injury or fatalities among workers or members of the public. Attackers can be lone wolves, terrorist or criminal organisations, or government-backed teams with a wide range of technical capabilities, funding resources, and motivations.

Spotlight

Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Spotlight

Resources