TITLE

Are you under cyber attack?

AUTHOR(S)
Lowe, Justin; Hayes, Rob
PUB. DATE
October 2006
SOURCE
ICIS Chemical Business;10/30/2006, Vol. 1 Issue 41, p20
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on a study that most control systems are vulnerable to attack by hackers through the corporate network. While some companies have installed a firewall between the control system and the corporate network, there are numerous reported incidents where hackers and worms have got through or around this protection to the vulnerable control system inside. There are however no effective industry standards for control system security in the chemical sector.
ACCESSION #
23132821

 

Related Articles

  • Adding features brings unpredictable performance.  // NetworkWorld Asia;Jan/Feb2008, Vol. 4 Issue 1, p37 

    The article discusses the effect of adding unified threat-management (UTM) features in computer networks of companies in the U.S. It is stated that adding UTM features like intrusion-prevention systems (IPS) and antivirus scanning brings unpredictable impact on total system performance. In...

  • Network Firewall Basics--Part 1. Kabachinski, Jeff // Biomedical Instrumentation & Technology;Sep/Oct2004, Vol. 38 Issue 5, p375 

    Provides information on computer network firewalls. Computer-related problems prevented through network firewalls; Definition of firewall; Application of the open systems interconnection to determine firewall depth; Types of firewalls. INSETS: Firewall Tips;Acronyms & Glossary.

  • Vendors to link directory to Web services. Connor, Deni // Network World;5/27/2002, Vol. 19 Issue 21, p11 

    Focuses on the plans of companies for the standardization of security, management and distribution of information in a corporate firewall in the U.S. Proposal for the use of directory technologies for building and improving Web services; Draft submitted by Novell to the Internet Engineering...

  • Boxed in. Liebmann, Lenny // Communications News;Nov2001, Vol. 38 Issue 11, p78 

    Comments on the capability of multifunction devices that combine load balancing, encryption accelerators and firewalling to help network managers cope with the growing complexity of infrastructures. Advantages and disadvantages of multifunction devices.

  • A better mousetrap. Venezia, Paul // InfoWorld;4/7/2003, Vol. 25 Issue 14, p21 

    Reviews the StormWatch 3.2 network and application firewall. Platforms; Cost; Pros and cons of the application.

  • Secure in cyber space.  // Management Services;Oct2004, Vol. 48 Issue 10, p30 

    This article presents information on Total Stream Protection (TSP) family of firewall and virtual product network appliances from CyberGuard. Built on a new Linux-based secure operating environment (OE), the TSP family consists of the 1000, 3000, and 5000 series. TSP appliances enable user and...

  • Belkin F5D7633au4A.  // APC (Bauer Media Group);Jul2005, Vol. 25 Issue 7, p74 

    Evaluates the ADSL2/2+ modem F5D7633au4A. Inclusion of routing hardware, a four-port switch and wireless fidelity; Lack of firewall features such as filtering for ActiveX, Java and cookies. Performance of the modem at 1km during ADSL2 testing.

  • NETGEAR INTRODUCES WIRELESS FIREWALL ROUTER.  // Modem Users News;Nov2003, pN.PAG 

    Reports on the release of the FWG114P ProSafe 802.11g Wireless Firewall with USB Print Server from Santa Clara, California-based Netgear Inc. Features of the networking solution; Benefits of the networking solution; Background of Netgear.

  • June tech tips -- firewalls, routers and switches. Stewart, John // Enterprise/Salt Lake City;6/6/2011, Vol. 40 Issue 45, p8 

    The article explains the functions of firewalls, routers and switches in Internet applications and whether they are necessary to one's business.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics