Neurosoft
  • HOME
  • SOLUTIONS
    • CYBER SECURITY OPERATIONS
    • INFRASTRUCTURE & CLOUD OPERATIONS
    • FIELD SERVICES OPERATIONS
  • INVESTOR RELATIONS
  • CAREERS
  • NEWS
  • CONTACT
  • Menu Menu
  • LinkedIn
  • Twitter
Case studies

Industrial Control Systems-A new target?

pt-isim
Industrial Control Systems- A new target?

Industrial Control Systems (ICS) used for monitoring and controlling equipment and processes used in oil, gas and energy plants, are a critical component of the plant infrastructure. ICS solutions were purpose-built and isolated pieces of hardware and software. Their purpose-built design philosophy in tandem with the apparent lack of interaction with other systems and technologies led to their development without Information Security principles in mind. Unlike the past however, most ICS vendors nowadays use market-standard IT technologies in their solutions. Moreover ICS components like SCADA are today interconnected with corporate networks. While this convergence of technologies can improve productivity and profitability, it unavoidably exposes ICS components to cyber-attacks.

Facts:

  • 32% of Operators indicated their control system assets / networks had been infiltrated or infected
  • 34% of Operators believe their systems have been breached more than twice in the past 12 month
  • 15% of Operators reported needing more than a month to detect a breach
  • 44% were unable to identify the source of the infiltration

(Source: SANS Institute Survey – June 2015)

Stuxnet, Shaman and Havex are widely known examples of threats targeting Industrial Control Systems reaching to them over market standard IT tools and interconnections. Although securing industrial control systems is of paramount importance, it poses many unique challenges. Maintenance windows can take months or even years to plan and execute for applying patches and updates. Performing even minor changes outside maintenance windows could prove catastrophic by bringing a system down even for a few minutes. Industrial control systems are not isolated any longer. Undocumented or poorly updated documentation of interconnections with corporate networks can make complex and otherwise thorough Risk Assessments a fairytale to an attacker.

Our approach

Neurosoft together with our partner Positive Technologies can offer a new approach to critical systems security.  The approach includes all layers (defense in depth) such as Perimeter Infrastructure, Policies-Procedures-People and Cyber Security layers.

The solution that is proposed is related to four main areas:

  1. Research
  • To understand threat landscape
  • To discover security vulnerabilities and related risks
  • To offer extensive security expertise in the field
  1. Consulting
  • To apply our research in the real world – Intelligence
  • To adopt Information Security best practices for ICS
  • Develop guidelines, controls and procedures for secure implementation of ICS
  • Training and Security Awareness Programs
  1. Products
  • To build safe and secure ICS protection solutions
  • Block malicious activities by protecting the SCADA protocols
  • Monitor and detect attacks or malicious actions
  • To automate security processes and controls
  1. Verifications of ICS security level
  • Verification of organization effectiveness protecting business measures
  • See into all networked systems for audits/compliance – periodically

Our credentials
Technology brief in attached Gartner Report. Major references on ICS Security solutions include:

  • ENEL – Italy (Multinational Power Company)
  • Ferrovie Trenitalia – Italy (Italian Railways)
  • KOSPO – South Korea (Energy Generation, KEPCO Subsidiary)
  • SONELGAZ – Algeria (State Owned Electricity & Gas Distribution)
  • LUCOIL – Russia (Oil & Gas Producer)

About Neurosoft

Neurosoft S.A. is an ICT company (AIM Milan Listed) with in-house Software Development and System Integration capabilities. The company’s headquarters are in Athens with subsidiaries/rep offices in Cyprus and UAE. The main competences within the System Integration Directorate lie within three main focuses areas: Telecommunications Infrastructure projects, Information Technology infrastructure projects and Information Security projects. Neurosoft System Integration mixes product offerings from world-leading hardware and software vendors with in-house expertise and research to formulate turnkey customer-specific solutions. In all cases the company-wide mentality has been built around complex, large-scale implementations and strict Service Level Agreements. For more information please visit our website www.neurosoft.gr

About Positive Technologies

Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. PT solutions work seamlessly across business networks, securing applications in development; assessing network and application vulnerabilities; assuring compliance with regulatory requirements; and blocking real-time attacks. Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on SCADA. For more information please visit our website www.ptsecurity.com

Athens, November 19th 2015

November 19, 2015/by neurouser
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail
0 0 neurouser https://neurosoft.gr/wp-content/uploads/2021/12/2LogoNeurosoft2021.png neurouser2015-11-19 11:29:392015-11-19 11:29:39Industrial Control Systems-A new target?

Recent News

  • Webinar: A Walkthrough to Security Awareness – 7/6/2023May 19, 2023 - 4:54 pm
  • Neurosoft’s first Cybersecurity DayMarch 8, 2023 - 4:49 pm
  • “Built for full visibility and Zero Trust” EventOctober 21, 2022 - 3:50 pm
  • Η Sparkle και η Neurosoft διασυνδεουν τα εργοστασια της Πλαστικα Κρητης σε ολον τον κοσμοJuly 27, 2022 - 11:28 am
  • 1st International Cybersecurity ChallengeJune 20, 2022 - 5:03 pm

Archives

  • May 2023
  • March 2023
  • October 2022
  • July 2022
  • June 2022
  • March 2022
  • November 2021
  • September 2021
  • March 2021
  • November 2020
  • October 2020
  • August 2020
  • May 2020
  • April 2020
  • March 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • June 2019
  • May 2019
  • April 2019
  • February 2019
  • December 2018
  • November 2018
  • October 2018
  • June 2018
  • May 2018
  • February 2018
  • December 2017
  • October 2017
  • September 2017
  • June 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • September 2016
  • November 2015

Corporate Responsibility.  Careers.   Certified Quality.  Privacy Policy. 

© Copyright 2023 - Neurosoft S.A.
  • LinkedIn
  • Twitter
New International Contract in Receivables Finance A Hacker Wisdom Experience!
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OKLearn more

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, you cannot refuse them without impacting how our site functions. You can block or delete them by changing your browser settings and force blocking all cookies on this website.

Google Analytics Cookies

These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.

If you do not want that we track your visist to our site you can disable tracking in your browser here:

Other external services

We also use different external services like Google Webfonts, Google Maps and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our
Privacy Policy.

Accept settingsHide notification only