Energy and Industrial Controls
- Eliminates risk of cyber attack on critical infrastructure, nation state or otherwise
- Helps ensure safe operation of industrial control systems, including SCADA
- Ensures only trusted assets communicate throughout critical infrastructure
- Protects critical business assets
- Secures the supply chain
Today’s complex manufacturing and energy environments are often highly connected systems performing complex tasks while being remotely monitored and controlled by Supervisory Control and Data Systems (SCADA) systems. In these types of systems, operators can have direct access, visibility, and control of the sensors and actuators through some type of human-machine interface. Industrial control systems such as manufacturing robots, farming combine systems, letter handling systems, material sorting machines, nuclear power plants, hydroelectric dams, and package handling systems are capable of being remotely controlled through both wired and wireless communications.
However, as important as these systems are, the fact is that many, if not most, industrial control systems in the field today were designed and constructed long before the term "cyber threat" even existed. Many of these systems are based on old technology and antiquated operating systems and most do not have even rudimentary security controls. In fact many of the companies that produce these systems "publish" their passwords for their computer-based controls like "admin", or "1234", so anyone can access them. Unfortunately these potentially critical industrial control systems are highly susceptible to cyber attack. This is especially true in the new and evolving smart grid, which ironically is intended to provide efficiency and resiliency to the power grid.
Why Hackers are Interested in Industrial Control Systems
Control systems must be secured to protect design and manufacturing processes and data
Planning an Effective Response is Not Sufficient
Effective response mechanisms are insufficient and frankly, too late
Standards - To the Rescue? That is Just a Start
A major step forward is the thought process where security is built in from the ground up. The National Institute of Standards and Technologies (NIST) has published NIST 8008-82, A Guide to Industrial Control Systems Security which aims to reduce the vulnerabilities in industrial control systems such as SCADA, programmable logic controllers, and distributed control systems. This guide lays out a number of mechanisms for industrial control system manufacturers to follow in order to reduce their cyber security risk. This guide offers a number of advanced processes, activities, and methods to minimize risk.
StealthPath: ensures only StealthPath Trusted™ actors and data participate in industrial Control Systems functions
- Operates autonomously
- Requires no human intervention
- Is simple to install
- Is not detectable by cyber attackers
Contact Us To Learn More
Find out how StealthPath can help your company operate securely.