Professional Documents
Culture Documents
From the Smart Grid to industrial controls,machine-to-machine networks to the "Internet ofThings", networked
intelligence is gainingexciting, new ground. But the more connected the world of utilities and industrial applications
becomes, the more vulnerable it is to hackers, malware and security intrusionsand the more cybersecurity matters.
1 Million pieces of
malware per day
The prevalence of
malware increased 26% in
2014 with more than 317
million new pieces of malware
created that year.1
THE THREAT
59% of cyber
incidents
affect critical
manufacturing
and energy
In 2014, 27% of cybersecurity
incidents were reported by
companies in critical
manufacturing. The energy
industry accounted for 32%.4
THE CHALLENGE
The disappearing line between IT and ICS networks.
Traditional control systems use serial devices connected through dedicated modems
with industry proprietary protocols, which amounts to security by obscurity.
Today, ICS is increasingly connected to enterprise networksand utilities are integrating
field devices into enterprise-wide information systems. But IT and ICS networks are
architected for very different purposes.
ICS networks
IT networks
Main focus: ensure the
confidentiality and the
integrity of data using
rigorous access control and
data encryption
Enterprise security
protects server data
from attack
THE SOLUTION
Cybersecurity is now a fundamental business requirement that should be treated
with the same importance as quality and safety in meeting business objectives.
Defense in depth
Eaton is helping customers address cybersecurity
challenges by developing defense in depth strategies
that integrate technology, people and operational
capabilities to establish different types of cybersecurity
barriers across multiple layers of an organization.
Firewalls
Firewalls provide the capability to add
stringent and multifaceted rules for
communication between various network
segments and zones in an ICS network.
Demilitarized zones (DMZ)
Network segmentation helps establish secure
control networks, grouping critical
components and isolating them via firewalls
from the business IT network.
Network Information
Security & Technology News
Institute of Electrical
and Electronics Engineers
nerc.com
nist.org
ieee.org
International
Electrotechnical Commission
Department of
Homeland Security
iec.ch
dhs.gov
1. Source: http://www.symantec.com/connect/blogs/2015-internet-security-threat-report-attackers-are-bigger-bolder-and-faster
2. Source: Symantec ISTR 20, April 2015, Pg 62 http://www.symantec.com/security_response/publications/threatreport.jsp
3. Source: Symantec ISTR 20, April 2015, Pg 63 http://www.symantec.com/security_response/publications/threatreport.jsp
4. Source: ICS CERT Monitor, September 2014 February 2015