![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2023-11/Portada_Recuperar_v2.jpg)
When a security incident occurs in an ICS (Industrial Control System), depending on its severity, it can generate a serious problem, both at a productive and economic level, as well as in the security of the people working in the industrial system.
Therefore, in this first article of a series on this subject, we will explain precisely the recovery plans, some general guidelines for their development and some conclusions on the use and applicability of these plans.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2023-11/Portada_reportes_v2.png)
Technical reporting is one of the most important parts of the completion of a task, as it reflects the results of all the work done. Moreover, it does not only constitute a final deliverable for a customer, or for the decision-makers within an organization, but also acts as the link between the person or team that has carried out the task and the decision-makers, based on the findings.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2023-11/Portada_Red_team_SCI2.jpg)
The proliferation of cybersecurity incidents in industrial environments has given rise to a huge concern in the various existing sectors. Some of them, such us the energy sector, are choosing the path taking in the banking sector with the TIBER-EU framework. In addition, many governments are allocating large sums of money to their government agencies to develop strategic plans in which that exercises are included
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/2023-11/Portada_industroyer2.jpg)
Confrontations between countries no longer only take place in the physical world, in this new decade, these confrontations also move to the cyber world. The conflict between Russia and Ukraine is one of the clearest examples. Among the events that have taken place is the security incident known as Industroyer2, which affected an electrical supplier in Ukraine. The Industroyer2 is the evolution of its predecessor, the malware known as Industroyer, which was able to affect multiple protocols of industrial control systems during its execution. This new variant of the malware focuses on a particular communications protocol, IEC-104, which is widely used in Europe and the Middle East to monitor and control the power system via the TCP/IP communications protocol.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/contexto_ciberresiliencia.jpg)
Organisations are exposed to the consequences of cyber threats, and may be ill-prepared to face and manage cyber incidents, whether provoked or unprovoked. For this reason, in 2014 INCIBE launched its Indicators for the Improvement of Cyber Resilience (IMC) model, with the aim of improving and understanding the state of cyber resilience in organisations.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/portada_drdos_ard_0.jpg)
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the ARD protocol, describing in detail the prevention, identification and response phases to follow.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/iec_62443-4-2.jpg)
The security of control systems can be threatened from different aspects, with the end device being the most important attack vector. With this in mind, the IEC, within the 62443 standard, wanted to emphasise devices by preparing a document exclusively concerning their security: IEC62443-4-2. This document contains different technical requirements to improve the security of the types of assets that can be found in a control system.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/portada_drdos_snmp.jpg)
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the SNMP protocol, describing in detail the prevention, identification and response phases to follow.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/contenidos/blog/log4shell.jpg)
This post will analyse the vulnerabilities associated with Log4Shell, detected in the library Log4j, which is found in infinite software products both in technical and industrial fields. Although there have been other instances of more sophisticated vulnerabilities, the problem with this one is area of exposure.
![Imagen de Avisos Imagen decorativa Avisos](/sites/default/files/blog/2023/Evolucionar/imc_evolucionar_portada.jpg)
All organisations must be prepared so that, after the impact of a cyberattack, it may change, improve and adapt its processes and services. For this reason, it is necessary to protect the main business processes using a set of tasks that allow the organisation to evolve after a serious incident to redesign its strategies and minimise the possible impact of future cyberattacks