Interpretation of Industrial Control System Cybersecurity Protection Guidelines

Interpretation of Industrial Control System Cybersecurity Protection Guidelines

Introduction Overview Industrial control systems, as the cornerstone of industrial production operations, play an indispensable role in ensuring the stability of enterprise operations, facilitating the smoothness of the supply chain, promoting healthy economic and social development, and safeguarding national security. To guide industrial enterprises in strengthening control security protection, the Ministry of Industry and Information … Read more

Overview of Automatic Anomaly Detection Methods in Industrial Control Systems

Overview of Automatic Anomaly Detection Methods in Industrial Control Systems

Traditional industrial control systems differ from the open systems of the Internet, being individual and closed. However, with the application of industrial internet platforms, more and more devices are connected to enterprise networks, leading to an increasing number of cybersecurity issues. Traditional methods based on network traffic have encountered difficulties in anomaly detection, challenges in … Read more

Top Ten Security Issues Facing Industrial Control Systems

Top Ten Security Issues Facing Industrial Control Systems

Author | Green Alliance Technology With the continuous advancement of strategies such as Germany’s Industry 4.0, America’s Industrial Internet, and China’s Manufacturing 2025, along with the integrated development of new generation information technologies like the Internet of Things, cloud computing, big data, and 5G, industrial production networks are gradually interconnected with office networks, the Internet, … Read more

Information Security in Industrial Control Systems

Information Security in Industrial Control Systems

Quoted from: “Intelligent Manufacturing Information Security Technology” (Authors: Qin Zhiguang, Nie Xuyun, Qin Zhen) The book has been published, for details please see the end of this article~ 「 1. Overview of Industrial Control Systems」 Industrial Control Systems (ICS) refer to a collective term for various types of control systems including monitoring and data acquisition … Read more

Sensor Network Security: A Vulnerability Worse Than Log4j

Sensor Network Security: A Vulnerability Worse Than Log4j

Recently, Ankit Suthar, an ICS/OT network security expert, published an article titled “Are Your Smart Instruments Secure?” stating that over 3,000 smart instruments in a petrochemical facility were found to have no passwords set, even by default. Joe Weiss, a renowned automation expert and control system cybersecurity specialist, and managing partner of Applied Control Solutions, … Read more

Applications and Trends of Industrial IoT in Manufacturing

Applications and Trends of Industrial IoT in Manufacturing

PleaseFollowThe Video Account Learn More About Smart Manufacturing Information In the past few years, there has been a surge in the construction and application of Industrial Internet of Things (IIoT) in both traditional industries and emerging fields. Industrial IoT solutions integrate machines, cloud computing, analytics, and personnel to enhance the efficiency and productivity of manufacturing … Read more

Tesla Major Security Vulnerability: Keyless Car Unlocking via BLE Relay Attack

Tesla Major Security Vulnerability: Keyless Car Unlocking via BLE Relay Attack

In a recent cybersecurity study, Tesla’s keyless entry system revealed a major security vulnerability, allowing attackers to unlock a Tesla Model 3 or Model Y within 10 seconds through a BLE (Bluetooth Low Energy) relay attack. The method to execute this attack is not complicated. It merely requires placing a decoding sensing device near the … Read more

The Importance of Self-Reliance in Core Technologies for IPv6 Innovation

The Importance of Self-Reliance in Core Technologies for IPv6 Innovation

On July 7, at the Third China IPv6 Innovation Development Conference, Wu Jianping, Academician of Tsinghua University and Deputy Director of the Expert Committee for Promoting IPv6 Large-scale Deployment and Application, delivered a keynote speech titled “The Important Content of IPv6 Innovation Development: Self-Reliance in Core Technologies for the Next Generation Internet.” 2024 marks the … Read more

Fundamentals of Cybersecurity

Fundamentals of Cybersecurity

1. Overview of Cybersecurity 1.1 Definition Information Security: The technical and managerial security measures established and adopted for data processing systems, protecting computer hardware, software, and data from accidental and malicious destruction, alteration, and disclosure. Cybersecurity: Prevent unauthorized users from accessing information Prevent unauthorized attempts to destroy or modify information 1.2 Characteristics of Information Security … Read more

Introduction to Industrial Control Security: Modbus

Introduction to Industrial Control Security: Modbus

The field of industrial control security is relatively closed, with few public resources available. I read “Hacking Exposed Industrial Control Systems,” a book from 2016, and selected some chapters for translation as a starting point. MODBUS Modbus is a serial communication protocol created in the late 1970s by Modicon (now Schneider Electric) for use with … Read more