Aurora vulnerability: origin, explanation and solutions
Posted on 26/09/2019, by
INCIBE (INCIBE)
Perhaps, given the many important cybersecurity leaks and intrusions in recent years involving everything from social media accounts to critical infrastructure and classified military secrets, the attention paid to the Aurora vulnerability has not been proportional to its seriousness and systems affected. This is because it affects almost every electrical system in the world, and potentially any rotating equipment, whether it generates energy or is essential for an industrial or commercial installation.
If the threat is so widespread, why isn’t the industry more worried and actively looking for solutions? From this article various possible reasons for this are given.
Etiquetas
My industrial devices support LDAP, now what?
Posted on 19/09/2019, by
INCIBE (INCIBE)
The main security standards and best practice guidelines in industrial cybersecurity include as a requirement the need for a user authentication system. The options involve implementations in each device of this system or being integrated into a centralised user authentication system. One of the most-used options is the use of the LDAP protocol, but there are a number of points to consider in the design phase, which are key when implementing a specific centralised user management system for industrial control systems, under LDAP.
Etiquetas
The improvement of IIoT in industrial environments
Posted on 12/09/2019, by
INCIBE (INCIBE)
In recent years there has been an increase in interconnectivity between devices thanks to the Internet of Things (IoT). This has affected all sectors, including industry, which has been involved in an era of connectivity of industrial devices. This concept is known as the Industrial Internet of Things (IIoT).
Etiquetas
Attacking a BusyBox, the small Gaulish village
Posted on 05/09/2019, by
INCIBE (INCIBE)
A BusyBox is software or a program that combines several functionalities in a small executable. This small tool was created for use in integrated operating systems with very limited resources, and they are usually used in control systems. But, as in all tools, you have to know what security level they have and if it can be improved.
Etiquetas
Radio frequencies in industrial environments
Posted on 29/08/2019, by
INCIBE (INCIBE)
In the industrial world there are many communications including radio communications. This article aims to inform the reader about these types of communications available and some concepts to consider. Also, about cases of cyberattacks that have been detected in order to prevent them in the future.
Etiquetas
The importance of the cybersecurity strategy for the industry
Posted on 22/08/2019, by
INCIBE (INCIBE)
The union of the IT and OT worlds is unstoppable, which means that the cybersecurity strategy, traditionally focused on the IT field, must now include aspects related to the industrial world. Having a good cybersecurity strategy is essential for IC systems to survive in this new era.
Etiquetas
Secure network architecture, things in order
Posted on 08/08/2019, by
INCIBE (INCIBE)
Control system networks have grown immensely in recent years, something similar to what happened with the explosion of IT networks in the 1980s. This growth is happening somewhat chaotically, promoted mainly by productive needs and by the lack of joint definition of network administration managers for IT and OT, instead of doing it by thinking of the future, scalability and security.
Etiquetas
Measuring the severity of vulnerabilities: changes in CVSS 3.1
Posted on 01/08/2019, by
Hugo Rodríguez Santos (INCIBE)
The open and most-widely-used framework for communication and vulnerability scoring, the CVSS (Common Vulnerability Scoring System), has been updated, incorporating improvements in its new version 3.1 with respect to the previous one. This standard assesses the severity of computer systems vulnerabilities and assigns them a score of 0 to 10.
Etiquetas