What happens in plant stays in plant

Permann, May; Hammer, John; Rohde, Ken; Lee, Kathy
March 2007
InTech;Mar2007, Vol. 54 Issue 3, p14
The article explains the necessary steps required to secure a company's internal control systems. These systems are separated from the business local area network of the company using network isolation technologies such as firewalls. The first step in securing control system networks are sound and effective security policies and procedures. Second, is to strictly enforce password policies. Next, is to formulate response procedures or steps to undertake if a security breach occurs or is in progress. Other concerns are privileges, application access rights and security perimeter defense.


Related Articles

  • Self Acknowledgeable Intranet Mail System. Rajaprabha, M. N. // International Journal of Engineering Science & Technology;Feb2013, Vol. 5 Issue 2, p427 

    Intranet mail system allows members of an organization to send or receive mails among them. But the sender don't know whether the sent mail is viewed by the receiver in time or not, the response for the mail in the receiver side and so on, unless he receive a mail or message personally from the...

  • Deflect AD Attacks. De Clercq, Jan // Windows IT Pro;Mar2006, Vol. 12 Issue 3, p41 

    Presents information on common attacks faced by Active Directory of business enterprises. Process of password cracking based on local area network manager (LM); Default authentication protocol of Windows NT 4.0; Ways to mitigate the risks posed by LM password hashes; Information on Kerberos...

  • LAN switch security: what the hackers know.  // Network World;11/19/2007, Vol. 24 Issue 45, p8 

    The article discusses issues and topics related to local area network (LAN) switch security. Christopher Paggen stated that LAN-borne attacks are always performed locally by someone hooked up to a local network port. He added that the people performing the LAN attacks ranges from adventurous...

  • YENÄ° BÄ°R AÄž GÃœVENLİĞİ YAKLAÅžIMI: DÄ°NAMÄ°K ZEKÄ° GÃœVENLÄ°K DUVARI MÄ°MARÄ°SÄ°. ERDEM, O. Ayhan; KOCAOĞLU, Ramazan // Journal of the Faculty of Engineering & Architecture of Gazi Uni;2014, Vol. 29 Issue 4, p707 

    A new firewall architecture which is different from traditional firewalls has been developed in this article. The new firewall approach has been called as DIFA (Dynamic Intelligent Firewall Architecture). DIFA is based on self-configuration. It scans local area network and analyses incoming...

  • 'Hidden' IPv6 traffic poses risk. Marsan, Carolyn Duffy // Network World;7/13/2009, Vol. 26 Issue 23, p1 

    The article reports on the risks posed by hidden Internet Protocol version 6 (IPv6) traffic in computer networks in the U.S. She notes that network managers often cannot detect the presence of rogue IPv6 traffic because they do not have firewalls, network management tools or intrusion-detection...

  • Intrusion Detection Needs a Dose of Prevention. Erlanger, Leon // InfoWorld;3/15/2004, Vol. 26 Issue 11, p42 

    This article discusses the use of intrusion prevention systems (IPS) to address problems with intrusion detection systems (IDS). Firewalls are still a necessary first line of defense, but traditional stateful inspection firewalls are only adept at stopping network level attacks, and so are...

  • Make the Connection. Engebretson, David // SDM: Security Distributing & Marketing;Jun2009, Vol. 39 Issue 6, p95 

    The article presents the author's views on the problems related to remote Internet access to a security or access panel. The author says that the access can be used by both, clients and security installation companies. According to the author, when an Internet Protocol (IP) device is programmed...

  • THE YEAR IN REVIEWS.  // InfoWorld;12/22/2003-12/29/2003, Vol. 25 Issue 50, p19 

    Deals with the products being reviewed by "Infoworld" for 2003. Net development tools; Web services integration solutions; Wireless local area network gateways; Firewalls; J2EE application servers.

  • Securing broadcast networks. Prince, Jeff // Broadcast Engineering;May2009, Vol. 51 Issue 5, p48 

    The article discusses ways on how to secure broadcast networks as they transition to a digital platform. Media and entertainment organizations have security technologies like firewalls and intrusion prevention systems. It also discusses local area network (LAN)-focused security technologies to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics