Control system security: Difference between revisions

Content deleted Content added
fix linter error (1x missing end tag)
Tags: Mobile edit Mobile web edit Advanced mobile edit
Line 1:
'''Industrial Control System (ICS) Cybersecurity''' is the prevention of (intentional or unintentional) interference with the proper operation of [[automation|industrial automation]] and [[industrial control systems|control systems]]. These control systems manage essential services including electricity, petroleum production, water, transportation, manufacturing, and communications. They rely on computers, networks, operating systems, applications, and [[programmable logic controller|programmable controllers]], each of which could contain [[vulnerability (computing)|security vulnerabilities]]. The 2010 discovery of the [[Stuxnet|Stuxnet worm]] demonstrated the vulnerability of these systems to cyber incidents.<ref name="tofinoexida201202">{{cite web | url=http://www.exida.com/index.php/News/new_whitepaper_the_7_steps_to_ics_and_scada_security/ | title=The 7 Steps to ICS Security | accessdate=March 3, 2011 | author1=Byres, Eric | author2=Cusimano, John | date=February 2012 | publisher=Tofino Security and exida Consulting LLC | url-status=dead | archiveurl=https://web.archive.org/web/20130123141949/http://www.exida.com/index.php/News/new_whitepaper_the_7_steps_to_ics_and_scada_security/ | archivedate=January 23, 2013 }}</ref> The United States and other governments have passed [[cyber-security regulation]]s requiring enhanced protection for control systems operating critical infrastructure.
 
Control system security is known by several other names such as ''[[SCADA]] security'', ''PCN security'', ''Industrial [[network security]]'', ''[[Industrial control system]] (ICS) Cybersecurity'', ''[[Operational Technology]] (OT) Security'' and ''Control System Cyber Security''.
 
== Risks ==