ICS Case Study

881 Words2 Pages

B. Strategies to Defend ICS: Apart from penetration tests there are several strategies that ICS can implement to reduce the vulnerability and make the system. (“Seven steps to effectively defend ICS,” n.d.) Below are the strategies:
1. Implementation of Application Whitelisting (AWL): Detecting ICS cyber-attack is difficult; hence we need Application Whitelisting (AWL). In one of the cyber-attack a malware having 0 percent detection rate compromised 80 percent of the assets of ICS, the antivirus seemed to be not useful in this case. Use of AWL becomes essential since it detects and prevents malware executions. Successful AWL implementation are very few. Systems such as human-machine interface (HMI) computers and database servers, are ideal candidates to run AWL. Operators and vendors must …show more content…

The need to provide trusted storage and exe-cution for high-security applications have led to the evolution of HSMs. HSMs are:
 Purpose-built highly secure appliances or stand-alone processors that implement trusted storage.
 Buffer overflow resistant.
 Trusted Execution Environment (TEE)
HSMs are most commonly used in encryption applications, for secure key generation, trust-ed encryption/decryption and secure certificate operations in certificate authorities used to generate and manage public-key certificates. (Prescatore, September 2015).
5. Authentication management: ICS can follow distributed or centralized approach.
Distributed access management: In Small ICS organizations, each system can use separate set of user credentials, accounts and roles.
Centralized account management: Large ICS organizations require central authentication systems since managing each system is not possible. These organizations should enforce the below

More about ICS Case Study

Open Document