Sistema de Bibliotecas Universidad de América | SISTEMA DE BIBLIOTECAS

ACERCA DE NOSOTROS

Minimize industrial cyber security risk in plants in 12 steps Tom Ayral, Joe O´Donnell

By: Ayral, Tom
Contributor(s): O´Donnell, Joe
Subject(s): Control e instrumentación | Seguridad industrial | Seguridad informática In: Hydrocarbon processing Vol.95, No.7, 2016: páginas 55-58Abstract: Most companies and plants have taken steps to implement some degree of industrial cyber security control. However, new industrial cyber security threats and vulnerabilities appear on a daily basis and can quickly undermine the effectiveness of established cyber security countermeasures. Companies cannot predict when or how a facility might be attacked, but they can assess the risk of different threat scenarios. By implementing the 12 steps described in this article, plant managers can take a proactive approach to staying ahead in this dynamic and perilous environment. An industrial process control system (PCS) typically includes routers, switches, controllers and Windows-based servers.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Holdings: Hydrocarbon processing Vol.95, No.7, 2016: páginas 55-58

Most companies and plants have taken steps to implement some degree of industrial cyber security control. However, new industrial cyber security threats and vulnerabilities appear on a daily basis and can quickly undermine the effectiveness of established cyber security countermeasures. Companies cannot predict when or how a facility might be attacked, but they can assess the risk of different threat scenarios. By implementing the 12 steps described in this article, plant managers can take a proactive approach to staying ahead in this dynamic and perilous environment. An industrial process control system (PCS) typically includes routers, switches, controllers and Windows-based servers.

There are no comments for this item.

to post a comment.

Click on an image to view it in the image viewer

Powered by Koha