Control system security: Difference between revisions

Content deleted Content added
Vulnerability of control systems: Add Security Through Obscurity
Line 13:
* Enterprise integration (using plant, corporate and even public networks) means that process control systems (legacy) are now being subjected to stresses they were not designed for
* Demand for Remote Access - 24/7 access for engineering, operations or technical support means more insecure or rogue connections to control system
* Public[[ InformationSecurity_through_obscurity -| ManualsSecurity onThrough howObscurity]] to- useUsing control system arenot publicly available toprotocols wouldor bestandards attackersis as well asdetrimental to legitimatesystem userssecurity
 
The cyber threats and attack strategies on automation systems are changing rapidly. Fortunately, regulation of control system security is rare as regulation is a slow moving process. The United States, for example, only does so for the [[nuclear power in the United States|nuclear power]] and the [[chemical industry|chemical industries]].<ref name="gross201104">{{cite web|url=http://www.vanityfair.com/culture/features/2011/04/stuxnet-201104|title=A Declaration of Cyber-War|author=Gross, Michael Joseph|first=|date=2011-04-01|work=Vanity Fair|publisher=Condé Nast|archiveurl=https://web.archive.org/web/20140713082739/http://www.vanityfair.com/culture/features/2011/04/stuxnet-201104|archivedate=2017-11-29|accessdate=2017-11-29|df=}}</ref>