From Ukraine Power Grid to German Steel Plant: Five Real Cases of Attacking Industrial Control Systems

From Ukraine Power Grid to German Steel Plant: Five Real Cases of Attacking Industrial Control Systems

70% of IT and operational technology professionals are concerned that cyber attacks could cause physical damage to computer and industrial systems, which not only requires significant financial resources for disaster recovery but can also threaten lives in severe cases. In March of this year, U.S. agencies warned that Russian government entities were conducting extensive attack … Read more

Introduction to Industrial Control System Cybersecurity

Introduction to Industrial Control System Cybersecurity

Grade protection is an important policy for national information security construction, which focuses on constructing, managing, and supervising information systems according to their grade and standards. For industrial control security construction, it should center around moderate security and prioritize key protection, focusing on important business systems from a business perspective. The following principles should be … Read more

Industrial Control System Information Security: Safeguarding the Invisible Line in the Smart Era

Industrial Control System Information Security: Safeguarding the Invisible Line in the Smart Era

Industrial Control Systems (ICS), as the “nerve center” of national critical infrastructure, directly relate to national economic security, social stability, and the safety of people’s lives and property. However, with the acceleration of digital transformation, the information security threats faced by ICS are becoming increasingly severe. Today, we will delve into the key standards of … Read more

First ATT&CK Knowledge Base for Industrial Control Systems (ICS)

First ATT&CK Knowledge Base for Industrial Control Systems (ICS)

On January 7, MITRE released the ATT&CK for ICS knowledge base, which mainly introduces the strategies and techniques used by cyber attackers when targeting industrial control systems (ICS), providing a reference for critical infrastructure and other organizations using industrial control systems to assess network risks. Why ICS? First, what is an industrial control system? It … Read more

How to Reduce Threats to Industrial Control System Networks

How to Reduce Threats to Industrial Control System Networks

Abstract Due to aging infrastructure, lack of security planning and design, and insufficient focus on protecting Industrial Control System (ICS) assets, the threats facing ICS networks remain high. The threats facing the infrastructure of Industrial Control System (ICS) networks are continuously increasing, and their complexity is greater than ever before. The increase in both the … Read more

Cybersecurity Issues of Sensors in Industrial Systems

Cybersecurity Issues of Sensors in Industrial Systems

Author | Antai Technology 【Abstract】Methods used in industry to protect instruments from unauthorized modifications include hardware write protection switches on instruments, software write protection passwords on instruments, passwords for remotely managing instruments’ IMS/AMS, and various unique protections provided by SIS solutions. Utilizing these protective measures, Project 12, aided by the U.S. Department of Homeland Security, … Read more

5 Major Challenges in Implementing Industrial IoT

5 Major Challenges in Implementing Industrial IoT

Translator | Julian Chen Reviewer | Sun Shujuan This article will explain the basic concepts of Industrial IoT while discussing the 5 major challenges associated with it. It is well known that if enterprises can successfully implement Industrial IoT (IIoT), they will benefit immensely and significantly improve production efficiency. However, we must not only focus … Read more

Essential Knowledge for Beginners in Cybersecurity: Understanding HTTP Packets

Essential Knowledge for Beginners in Cybersecurity: Understanding HTTP Packets

1. What is an HTTP Packet What is HTTP HTTP: (HyperText Transfer Protocol) is the protocol used for transferring hypertext from World Wide Web (WWW) servers to local browsers. HTTP is a protocol based on the TCP/IP communication protocol for transmitting data (HTML files, image files, query results, etc.). HTTP is an application layer protocol, … Read more

Research on Network Attack Prediction Technology in Industrial Control Systems

Research on Network Attack Prediction Technology in Industrial Control Systems

Authors: Ding Chaohui, Zhang Wei, Yang Guoyu, Liu Teng Affiliations: 1.China Datang Corporation Science and Technology Research Institute Co., Ltd., Beijing 100043. Abstract: In the face of complex network security situations, attackers often employ extensive information reconnaissance, vulnerability exploitation, and obfuscation techniques to conduct malicious activities or destructive actions on the network. Although current network … Read more

Essential Bluetooth Security Knowledge You Must Know

Essential Bluetooth Security Knowledge You Must Know

The DHS 4300A series manual, released by the U.S. Department of Homeland Security, aims to guide the secure use of wireless technologies in sensitive systems. The manual includes usage specifications for various wireless technologies such as RFID and Bluetooth. Next, we will analyze the guidance requirements for Bluetooth technology in this manual. DHS 4300A –Q6 … Read more