TITLE

New Tofino Event Logger Module Reliably Records SCADA Security Events and Alarms

PUB. DATE
February 2010
SOURCE
Remote Site & Equipment Management;Feb/Mar2010, Vol. 10 Issue 1, p4
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article previews the Tofino Event Logger loadable security module (LSM) of the Tofino Industrial security solution from Byres Security.
ACCESSION #
52486361

 

Related Articles

  • New Security Breakthrough for OPC-based Industrial Automation Systems.  // Remote Site & Equipment Management;Dec2010/Jan2011, Vol. 10 Issue 6, p6 

    The article previews the new Tofino OPC Enforcer firewall from Byres Security, Inc.

  • SCADA security system for Modbus TCP announced at ISA Expo.  // Plant Engineering;Nov2008, Vol. 62 Issue 11, p75 

    The article reports that Byres Security Inc. chief technical officer Eric Byres has announced the introduction of the Tofino Modbus TCP Enforcer Loadable Security Module during the International Society of Automation (ISA) Exposition in Houston, Texas. The module performs detailed analysis and...

  • Digest.  // Process Engineering;Dec2011 Supplement, p10 

    The article focuses on the new Tofino SCADA Security Simulator from Byres Security Inc.

  • Cyber security in a box.  // Process Engineering;Dec2011 Supplement, p43 

    The article presents information about the Tofino SCADA Security Simulator (TSSS) from Byres Security Inc.

  • CONCURRENCY CONTROL IN DBMS WITH TIMESTAMPS. GEETIKA // International Journal of Research in Computer Application & Mana;Dec2013, Vol. 2 Issue 12, p119 

    In this paper I have discussed the why Time stamping technique is used in concurrency control in DBMS and how it can be implemented. Here, as in locking technique problem of deadlock is found which is very important to resolve. So time stamping can resolve this issue to some extent. It can be...

  • The missing piece of cloud security? Antonopoulos, Andreas // Network World;9/27/2010, Vol. 27 Issue 18, p14 

    The article discusses the lack of visibility and control of a public cloud infrastructure in the U.S. It states that public cloud lacks the key services including centralized, secure, and authentic logging that have made it hard to employ the security controls, monitoring, audit and assurance....

  • Ensuring Distributed Accountability for Data Sharing in Cloud. Karthick, K.; Jennifer, P.; Muthukumaravel, A. // Middle East Journal of Scientific Research;2/11/2014, Vol. 20 Issue 6, p702 

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by...

  • Assessing and addressing cyber threats to control systems. Bartels, Andrew // Power;Jun2008, Vol. 152 Issue 6, p40 

    The article focuses on the control system that utilities and other operators of industrial infrastructure in the U.S. rely on an Internet connection. It states that in North America and the rest of the developed world, control systems are unprotected by commonly accepted cyber security...

  • Pointer Analysis Based Vulnerability Detection for Browser Extension. Junjie Wang; Xiaohong Li; Bobo Yan; Zhiyong Feng // International Journal of Digital Content Technology & its Applic;Jan2012, Vol. 6 Issue 1, p488 

    As security issue caused by browser extensions is getting serious increasingly, this paper proposes a pointer analysis based approach to detect vulnerabilities from browser extensions. We convert extensions' source code into facts in Datalog, and define several rules to describe vulnerabilities'...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics