首页> 外文期刊>American Journal of Artificial Intelligence >Implementation of Defense in Depth Strategy to Secure Industrial Control System in Critical Infrastructures
【24h】

Implementation of Defense in Depth Strategy to Secure Industrial Control System in Critical Infrastructures

机译:深入策略实施防守,以保护产业控制系统在关键基础设施中

获取原文
       

摘要

The goal of this communication is to examine the implementation of defense in depth strategy to secure the industrial control systems (ICS) from threats, hackers, vandals and other ones that can damage the critical infrastructures (gas transportation network, power transmission network, power generation, power distribution grids, air traffic, petrochemical industries, rail traffic, military industries) and others big infrastructures that affect large number of persons and security of nations [1]. The defense in depth concept ensures the physical access protection of the infrastructure, using network access control system (NAC) and traditional security measures, and implements policies and procedures that deal training and cybersecurity awareness programs, risk assessment (analyzing and documenting), and the plan of security. The philosophy of defense in depth uses also the IT technologies in order to ensure separation and segmentations of the networks to the VLANs, demilitarized zones, VPN, using firewalls, switch and routers. The hardening of different systems installed like routers, firewalls, switches and other devices on the network such as SCADA servers is a very sensitive operation of defense in depth. The last important operations are monitoring and maintenance, the monitoring serve to detect and stop intrusions attempts before they can damage the control system with using detection and protection system (IDS/IPS), and the maintenance operations control system (soft and hard), schedule updating of anti-virus software on different devices installed in the network like (computers, SCADA servers, routers, switch and other devices). The defense-in-depth recommendations described in this document can decrease the risk of attacks can target industrial network architectures, like VLAN hopping, SQL injection on SCADA, IP spoofing and DoS (denies of service) and others ones. The risk of attacks can use a common point of access as point of failures (RTU, corporate VPNs, database links, wireless communication, and IT controlled communication equipment). The implementation strict of the defense in depth concept can avoid important damage of critical infrastructures such as loss of production, damage to plant, impact on reputation, impact of health, impact of safety, impact of environment and impact on nation's security.
机译:这种沟通的目标是审查深度战略的防御,以保护工业控制系统(ICS)从威胁,黑客,破坏者和其他可能损坏关键基础设施(煤气运输网络,电力传输网络,发电,配电电网,空中交通,石化产业,铁路交通,军事行业)和其他影响大量人物和国家安全性的大型基础设施[1]。深度概念的防御确保了基础设施的物理访问保护,使用网络访问控制系统(NAC)和传统的安全措施,并实施培训和网络安全意识计划,风险评估(分析和记录)的政策和程序,以及安全计划。深入防御哲学也使用IT技术,以确保网络与VLAN,非军事区,VPN的分离和分割,使用防火墙,开关和路由器。不同系统的硬化,如路由器,防火墙,交换机和其他设备上的其他设备,如SCADA服务器,是深度防御的非常敏感的操作。最后一个重要的操作是监控和维护,监控有用于检测和停止入侵的尝试,然后使用检测和保护系统(IDS / IPS)和维护操作控制系统(软和硬)损坏控制系统,然后在网络中安装的不同设备上更新防病毒软件(计算机,SCADA服务器,路由器,交换机和其他设备)。本文档中描述的深度建议可以降低攻击的风险可以针对工业网络架构,如VLAN跳跃,SCADA的SQL注射,IP欺骗和DOS(拒绝服务)和其他人。攻击的风险可以使用常见的访问点作为故障点(RTU,公司VPN,数据库链路,无线通信和IT控制的通信设备)。深度概念防御的实施可以避免损失生产,植物损失,对声誉影响,健康影响,安全影响,环境影响以及对国家安全影响的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号