Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Industrial Computer System Protection From Stuxnet

Norman Security : 18 October, 2010  (Technical Article)
Infection of Siemens SCADA System drives Norman to issue advice and free webinar on protection of industrial systems from malware attacks
The recent Stuxnet worm that infected Siemens SCADA systems was created to target infrastructure and any business operating PLCs. It is estimated that the worm has infected up to 100,000 industrial computers across sites in UK, Germany, North America, Korea and Iran. Stuxnet, and other worms and malware, known and unknown are showing that there is a new target, and most SCADA systems are at great risk of infection.

This free webinar from Norman Data Defense will:

* Outline the risks of Stuxnet and its predecessors to engineering and infrastructure companies.
* Demonstrate the likely path of development for Stuxnet and its successors.
* Give practical examples of how to put in place simple protocols to reduce vulnerability.
* Assess the source and reasoning for the targeting of industry PLCs.
* Highlight the impact that a security breach can really have, and look beyond the immediate security impact at the potential cost in environmental, financial, social and reputational terms.
* Counsel regarding what can be done to minimise exposure to such attacks

"This is just the beginning" says David Robinson, an automation security expert from Norman Data Defense. "The high profile nature of these attacks may well spur on the creators of this malicious software to wreak havoc on PLCs running in infrastructure and engineering. It's important we take action to lock down PLC security before it's too late".
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo