Explain industrial control system

Page 1

Explain Industrial Control System For describing the integration of hardware and software, Industrial Control System (ICS) is a general term to be used along with network connectivity for aiding critical infrastructure. ICS technology is not only just for supervisory control and data acquisition (SCADA) and distributed control systems (DCS), Industrial Automation and Control Systems (IACS), (PACs), remote terminal units (RTUs), intelligent electronic devices (IEDs) and sensors. Most engineering components and machinery used in operation and production of a power plant, wastewater plants, and water, transport industries etc were used in ancient days. From the outside world, it is covered and the networks are positioned in an air-gapped way. This fashion has changed over the years and today’s ICSs are often linked directly or indirectly to the Internet. In wireless networking and smart sensor technology, they have made the operational technology blend, especially in the modern world. Irrespective of the benefits of increased speed, better responsiveness, and enhanced trust that IT/OT convergence had brought however there are disadvantages in security terms. There are many nations around the world that face the threat from the terrorists with their targeted attacks against ICSs. For input change with respect to remote telemetry units has more capacity for controlling the locals and as the Internet Of Things (IoT) and Industrial IoT seems to grow, it becomes enchantingly significant for securing the ICSs from security threats at the top of the mind.

These are the recommendations for protecting industrial control systems that have been offered in the United States, the Department of Homeland Security (DHS): •For securing the infrastructure from potentially harmful programming use application white listing. •For controlling the patch management and configuration management will help in keeping the controls secure. •By separating networks it can lead to reduce attack surface areas into logical parts and limit host to host communication paths. •For enforcing the principle of least privilege (POLP) it needs multi-factor authentication. •For operation control and limited time, there is a need for remote access. •Inside control network traffic is monitored on ICS perimeters. •Verify all anomalies and analyze access logs


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Explain industrial control system by deepika - Issuu