Blog

Contenido Blog

PRP and HSR: Redundancy protocols

Posted on 03/08/2017, by
INCIBE (INCIBE)
PRP and HSR: Redundancy protocols
The evolution of industrial systems towards an almost complete automation entails new challenges in communications. New functionalities acquired by the process, such as the use of digital relays to manage emergency interruptions, are transmitted by the communications network and this cannot fail. Given this need for zero tolerance to any failure, the redundancy offered by the HSR and PRP protocols can be a key factor.
Etiquetas

Robots and drones in the Industry 4.0

Posted on 20/07/2017, by
INCIBE (INCIBE)
Robots and drones
Industry 4.0 integrates a large amount of devices used to provide the industrial processes with more intelligence. Among said devices we can find many different types of equipment such as drones or robots that perform specific tasks or tasks requiring precision. The use of these devices –quite well known nowadays– has certain implications for the security of control systems.

Hardware Hacking in Industrial Control Systems

Posted on 29/06/2017, by
INCIBE (INCIBE)
Hardware Hacking
Remote accesses to control devices from networks outside the company are a major problem but, what about direct accesses made thanks to the accessibility of the device? This article explains the concept of hardware hacking and the hazards for the industry.
Etiquetas

CrashOverride: The malware for ICS is back again

Posted on 23/06/2017, by
INCIBE (INCIBE)
CrashOverride: The malware for ICS is back again
Alarm bells ringing again –a new malware threats industrial networks. After the attack suffered in Ukraine with BlackEnergy and the failures occurred at the beginning of the year, other new malware is added to the list of attackers of industrial control systems started by Stuxnet
Etiquetas

Analysing Security without Risk: Testbeds

Posted on 01/06/2017, by
INCIBE (INCIBE)
Analysing Security without Risk: Testbeds
Carrying out an intrusion test or vulnerability analysis in a control system can prove complex due to availability. This is where testbeds come into play. They reproduce production environments and can be of great assistance to researchers and security analysts

Ensuring the virtualization of your control systems

Posted on 15/05/2017, by
INCIBE (INCIBE)
Ensuring the virtualization of your control systems
Virtualization is a technology that sooner or later will settle in the control systems, as was the case with corporate systems. The moment the impact that it may cause on the process is minimum and a proper security level may be guaranteed, it will be time to implement the virtualization of control systems.

Credential management in Control Systems

Posted on 27/04/2017, by
INCIBE (INCIBE)
Credential management in Control Systems
Credentials can be described as the basic information required to access any device. Sharing and using privileged credentials within control systems is a common task that must be controlled to minimise potential exposure or leakage of information.
Etiquetas

Intrusion prevention and management of events for control systems

Posted on 27/04/2017, by
INCIBE (INCIBE)
Intrusion prevention and management of events for control systems
The installation of security tools may be complex sometimes due to different reasons: the complexity of the tool itself, the environment in which it is installed, the necessary settings, etc. This post shows how to implement an IDS solution and how to manage events in a centralised manner by means of an event manager for industrial control systems.
Etiquetas

Security in Protocols for Building Automation

Posted on 20/04/2017, by
INCIBE (INCIBE)
La seguridad en los protocolos de control de edificios
Smart buildings, either intended for housing, for offices or for industries, are fitted with communications systems for control of all elements such as lighting, heating and air conditioning, blinds, etc. Such communications are mainly carried out by means of two protocols or technologies: BACnet and LonWorks. In this article, the security capabilities of each protocol for operating in as a secure manner as possible shall be described.
Etiquetas