TITLE

SCADA security system for Modbus TCP announced at ISA Expo

PUB. DATE
November 2008
SOURCE
Plant Engineering;Nov2008, Vol. 62 Issue 11, p75
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports that Byres Security Inc. chief technical officer Eric Byres has announced the introduction of the Tofino Modbus TCP Enforcer Loadable Security Module during the International Society of Automation (ISA) Exposition in Houston, Texas. The module performs detailed analysis and filtering of all Modbus TCP messages. Byres mentions that the module allows owners of control and supervisory control and data acquisition (SCADA) systems to regulate Modbus network traffic.
ACCESSION #
35430324

 

Related Articles

  • Security module addresses government SCADA concerns.  // Control Engineering;Nov2008, Vol. 55 Issue 11, p30 

    The article introduces the Tofino Modbus TCP Enforcer Loadable Security Module (LSM) presented by a joint effort of Byres Security Inc. and MTL Instruments to solve Supervisory Control and Data Acquisition (SCADA) concerns. Such problems of filtering SCADA systems, as addressed by the U.S....

  • Hands On, From Afar. NOLAND, RANDY // Machine Control Magazine;2013, Vol. 3 Issue 2, p8 

    The article offers the author's opinion on the success of an industry trade show in the U.S. He reflects on the success of Comdex computer show and mentions the 30th annual Bauma trade show. He believes that construction and mining industries are hands-on profession and not limited virtually via...

  • Circuit Level Gateway/Firewall.  // Network Dictionary;2007, p99 

    A definition of the term "circuit level gateway/firewall" is presented. It is sometimes described as a second generation firewall. A circuit level gateway is a fast unrestricted passage through the firewall based on predefined rules maintained in the Transmission Control Protocol/Internet...

  • Enterprise Security Policy and Standards. Ali Pabrai, Uday O. // Certification Magazine;Jan2003, Vol. 5 Issue 1, p31 

    Presents information on enterprise Transmission Control Protocol/Internet Protocol (TCP/IP) security policy and standards. Sections included in the enterprise security document; Core elements of an enterprise TCP/IP security policy; Considerations when creating the TCP/IP security policy.

  • ON LINE.  // Process & Control Engineering (PACE);Sep2005, Vol. 58 Issue 8, p15 

    Reports on Profibus International's publishing of a guideline on network security, in response to automation systems having moved rapidly towards highly interconnected applications employing widely-used technology such as MS Windows operating system and TCP/IP computer network protocol.

  • Trustworthy Mobile Network Architecture Based on Locator/Identity Split. Haoxue Wang; Ke Zhu; Yuxiang Hu; Dongnian Cheng // Journal of Systems Science & Information;Mar2008, Vol. 6 Issue 1, p71 

    Today's Internet architecture faces many challenges, from poor support for mobility to security threats. By analyzing the drawbacks of current TCP/IP protocol, we propose a new network architecture model LISNA. LISNA defines a kind of network architecture with mobility and trustworthiness, based...

  • FIRST GLANCE: AN INTRODUCTORY ANALYSIS OF NETWORK FORENSICS OF TOR. Hansen, Raymond // Journal of Digital Forensics, Security & Law;2013 Conference Supplement, p105 

    The Tor network is a low-latency overlay network for TCP flows that is designed to provide privacy and anonymity to its users. It is currently in use by many as a means to avoid censorship of both information to be shared and information to be retrieved. This paper details the architecture of...

  • TCP Based Storage Outsourcing with Secure Accessibility in Mobile Cloud Comp. Waghmare, Monika; Chavan, T. A. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p2745 

    Now a day a mobile device like a smart phone is becoming one of the major information processing devices for users. On the other hand, a mobile device is still resource constrained. To overcome this, a mobile device should get resources from an external source. One of such sources present is...

  • Analyzing EAP TLS & ERP Protocol with Varying Processor Speed.  // International Journal of Computer Applications;Sep2010, Vol. 7, p50 

    The article evaluates the security cost of Extensible Authentication Protocol (EAP) Transport Layer Security (TLS) protocol with increased processor speed. It assesses the efficiency of the re-authentication protocol (ERP). It reveals the reduction of the security cost of ERP & EAP TLS with...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics