process control security myths

Post on 07-Dec-2014

5.799 Views

Category:

Technology

4 Downloads

Preview:

Click to see full reader

DESCRIPTION

Process Control Security Myths - www.amorgroup.com/energy

TRANSCRIPT

FOUR

FOUR

FOUR MYTHS

MYTH �ONE:

MYTH �ONE:

INVESTIGATIONS SHOW �

INVESTIGATIONS SHOW �That even systems which are claimed to not be connected to the internet…

INVESTIGATIONS SHOW �That even systems which are claimed to not be connected to the internet…

...ARE �

MYTH �TWO:

MYTH �TWO:

WE HAVE �FOUND�

WE HAVE �FOUND� VIRUSES�

WE HAVE �FOUND� VIRUSES�

at �

WE HAVE �FOUND� VIRUSES�

at �EVERY �

WE HAVE �FOUND�

location that we have been checking systems…

VIRUSES�at �EVERY �

That’s a�

That’s a�

100%�

That’s a�

100%�hit rate!

MYTH �THREE:

MYTH �THREE:

WE HAVE �

SEEN �

WE HAVE �

SEEN � VIRUSES�

WE HAVE �

SEEN �transmitted via infected USB sticks, hard-drives and laptops

VIRUSES�

WE HAVE �

SEEN �transmitted via infected USB sticks, hard-drives and laptops

VIRUSES�even from vendors �

WE HAVE �

SEEN �transmitted via infected USB sticks, hard-drives and laptops

VIRUSES�even from vendors �

that should have been fine �

MYTH �FOUR:

MYTH �FOUR:

50%�

50%� of the incidents �investigated �by the US ICS-CERT�!

50%�are found to be attacks specifically aimed at control systems

of the incidents �investigated �by the US ICS-CERT�!

50%�are found to be attacks specifically aimed at control systems

of the incidents �investigated �by the US ICS-CERT�!

With the average time between attack and discovery coming in at

50%�are found to be attacks specifically aimed at control systems

EIGHTEEN MONTHS�

of the incidents �investigated �by the US ICS-CERT�!

With the average time between attack and discovery coming in at

Still believe these process security myths?

It’s up to you to ensure that your systems are safe.

It’s up to you to ensure that your systems are safe.

It’s up to you to ensure that your systems are safe.

Amor Energy here

top related