Главная
Study mode:
on
1
Intro
2
Overview
3
Common Apps
4
Purdue Model
5
Air Gap
6
The Reality
7
Sliding Scale of Cybersecurity
8
Midpoint Sensors
9
Example
10
ICS NSM
11
The Cyber Kill Chain
12
The ICS Kill Chain
13
Power Grid
14
Monitoring Impacts
15
Remote Control Access
16
Safety Systems
17
Case Study
18
Remote Sites
19
Nordic Wind Farm
20
Dragonfly
21
Recap
Description:
Explore advanced network security monitoring techniques for Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) environments in challenging scenarios. Delve into a comprehensive 38-minute conference talk from the Security Onion Conference 2016, presented by Robert M. Lee and Jon Lavender. Gain insights into common applications, the Purdue Model, and the reality of air-gapped systems. Examine the sliding scale of cybersecurity, midpoint sensors, and ICS-specific network security monitoring approaches. Analyze the Cyber Kill Chain and its ICS counterpart, with a focus on power grid vulnerabilities, remote control access, and safety systems. Investigate real-world case studies, including remote sites and Nordic wind farms, and learn from the Dragonfly attack. Enhance your understanding of ICS/SCADA security challenges and develop strategies to protect critical infrastructure against evolving cyber threats.

ICS - SCADA Network Security Monitoring in Difficult Scenarios

Security Onion
Add to list
0:00 / 0:00