1769-IQ6XOW4  Future industrial outlook

Future industrial outlook With the rapid development of industry, emerging technologies such as Big Data Analysis, Cloud Computing, edge computing, 5G network, Internet of Things technology, AI and 3D printing technology will also be widely used in the industrial field. In the traditional industrial system architecture, OT and IT equipment are independent, and information is…

1756-IRT6I  Security strategy and compliance

Security strategy and compliance Security strategy planning: from the enterprise’s own business strategy and IT strategy, planning industrial control security strategy and objectives; Security compliance: According to the industry and region of the enterprise, sort out the corresponding regulatory requirements and track the updates, carry out gap analysis, and rectify the problem discovery to meet…

PXle-8133 Industrial control system security risks and protection

04 Industrial control system security risks and protection Industrial control system security vulnerability According to the “Information Security technology Network security level protection Basic Requirements” (GB/T 22239-2019), the industrial control system is divided into production management layer, process monitoring layer, field control layer and field equipment layer, involving a variety of components, applications and communication…

2711P-PR8DK  Global industrial control safety standards and compliance

In May 2015, the National Institute of Standards and Technology (NIST), at the request of the Federal Information Security Modernization Act, Published the Guide to Industrial Control Systems Security (NIST SP 800-82) for industrial control systems and their components (Supervisory Control and Data Acquisition System SCADA, Distributed control System DCS, Programmable logic controllers (PLCS), as…

1768-PA3 Network and communication threats

3. Network and communication threats Like other industrial control systems, the Guri hydropower plant in Venezuela may also use different communication protocols and media. An example is the ModuleBus communication protocol, which is used to communicate directly with local I/O clusters via plastic fiber optic cables. An attacker can analyze ModuleBus packets, intercept control protocol…

NI-9266 Analysis of power outage in Venezuela

Analysis of power outage in Venezuela In this paper, the power outage in Venezuela is selected for analysis, and its potential causes are analyzed in depth. Event review According to Xinhua News Agency, starting at 5:00 PM on March 7, 2019 (local time), most parts of Venezuela, including the capital Caracas, had a power outage…