Matches in SemOpenAlex for { <https://semopenalex.org/work/W1965622020> ?p ?o ?g. }
Showing items 1 to 52 of
52
with 100 items per page.
- W1965622020 endingPage "125" @default.
- W1965622020 startingPage "122" @default.
- W1965622020 abstract "This article, written by Special Publications Editor Adam Wilson, contains highlights of paper OTC 24393, ’Control-System Cybersecurity: Staying Ahead of the Evolving Threats,’ by C. DeWitt, ABS Consulting, and J. Ellis, Neodigm Press, prepared for the 2013 Offshore Technology Conference Brasil, Rio de Janiero, 29-31 October. The paper has not been peer reviewed. The benefits of modern industrial control systems have never been greater. However, as these systems have evolved, the threats to their safe and secure operation have grown. While the return on investment for a complete control-system security audit may be difficult to calculate, the cost of not having a complete plan in place may, if a worst-case condition arises, be impossible to comprehend. A baseline system security image, as a start, allows a vessel owner or operator to understand the security risks. Introduction A diver-support-vessel control system suddenly loses position control and begins to drift while the divers below are put in harm’s way. A programmable-logic controller on the vessel’s dynamic-positioning system had entered an error state and flooded the primary and backup control networks with erroneous data, knocking all connected systems offline. Before control is restored, the vessel is 200 m from its station and one diver has been left unconscious on the template bailout and the other is stranded in the diving bell. The unconscious diver is rescued by his companion from the diving bell once the vessel arrives back on station. Is this a scene from a movie? Unfortunately not; it was a recent, real-world failure. Just as unsettling is the fact that the root cause of the network jamming was never identified. While viruses, Trojans, worms, and backdoors have been generally associated with Web servers, personal computers, and phones with access to the Internet, serious concerns about cyberphysical attacks on industrial control systems have also been raised—attacks that could result in conditions similar to the loss of positional control just described. Offshore assets with complex operational capabilities, such as floating production, storage, and offloading vessels; drillships; and semisubmersibles, while not necessarily targets for national-security- based malicious attacks, are nevertheless high-value targets whose compromise may have high-consequence results. Control systems onboard the vessel demand real-time operation, interference with which may result in costly and even life-threatening situations. Problem With more and more industrial control systems exposed to external, uncontrolled access for remote upgrades, remote monitoring, and ease of access, these systems are often visible to hackers as well. Combine this access with the increased use of highly targeted and often outdated or unpatched operating systems, and there is good reason for concern. Solution The following six, high-payoff steps or practices should be implemented even before a security-baseline and gap assessment has been performed: Network design and implementation—Perform a survey of the control network to ensure there are no undocumented bridges or devices that have been attached. Host configuration—Validate proper user and password control on each system. Validate that all unused ports and services are turned off. Virus and malware protection— Ensure virus and malware scanners are installed and properly configured to detect new and updated files, yet not interfere with real-time operation. USB access—Insertion of USB flash drives is a common avenue for the spread of malicious software. Ensure there is not a means for unauthorized physical access to the USB ports on each system. If this is not possible, ensure USB ports have been disabled by operating-system configuration. Extraneous-program removal— Adobe Acrobat, while seemingly a common and benign standard program, has been the avenue for many recent attacks. Ensure all unneeded programs have been removed from the system. Recovery plan—Develop a detailed recovery plan for the network and each device attached." @default.
- W1965622020 created "2016-06-24" @default.
- W1965622020 creator A5019670635 @default.
- W1965622020 date "2014-08-01" @default.
- W1965622020 modified "2023-09-25" @default.
- W1965622020 title "Control-System Cybersecurity: Staying Ahead of Evolving Threats" @default.
- W1965622020 doi "https://doi.org/10.2118/0814-0122-jpt" @default.
- W1965622020 hasPublicationYear "2014" @default.
- W1965622020 type Work @default.
- W1965622020 sameAs 1965622020 @default.
- W1965622020 citedByCount "0" @default.
- W1965622020 crossrefType "journal-article" @default.
- W1965622020 hasAuthorship W1965622020A5019670635 @default.
- W1965622020 hasConcept C154945302 @default.
- W1965622020 hasConcept C17744445 @default.
- W1965622020 hasConcept C199539241 @default.
- W1965622020 hasConcept C2775924081 @default.
- W1965622020 hasConcept C2777363581 @default.
- W1965622020 hasConcept C2780945871 @default.
- W1965622020 hasConcept C38652104 @default.
- W1965622020 hasConcept C41008148 @default.
- W1965622020 hasConcept C77088390 @default.
- W1965622020 hasConceptScore W1965622020C154945302 @default.
- W1965622020 hasConceptScore W1965622020C17744445 @default.
- W1965622020 hasConceptScore W1965622020C199539241 @default.
- W1965622020 hasConceptScore W1965622020C2775924081 @default.
- W1965622020 hasConceptScore W1965622020C2777363581 @default.
- W1965622020 hasConceptScore W1965622020C2780945871 @default.
- W1965622020 hasConceptScore W1965622020C38652104 @default.
- W1965622020 hasConceptScore W1965622020C41008148 @default.
- W1965622020 hasConceptScore W1965622020C77088390 @default.
- W1965622020 hasIssue "08" @default.
- W1965622020 hasLocation W19656220201 @default.
- W1965622020 hasOpenAccess W1965622020 @default.
- W1965622020 hasPrimaryLocation W19656220201 @default.
- W1965622020 hasRelatedWork W1505619784 @default.
- W1965622020 hasRelatedWork W1554186893 @default.
- W1965622020 hasRelatedWork W1834047479 @default.
- W1965622020 hasRelatedWork W2075106593 @default.
- W1965622020 hasRelatedWork W2352125166 @default.
- W1965622020 hasRelatedWork W2360700496 @default.
- W1965622020 hasRelatedWork W2476651607 @default.
- W1965622020 hasRelatedWork W2725924760 @default.
- W1965622020 hasRelatedWork W2803916005 @default.
- W1965622020 hasRelatedWork W4318832445 @default.
- W1965622020 hasVolume "66" @default.
- W1965622020 isParatext "false" @default.
- W1965622020 isRetracted "false" @default.
- W1965622020 magId "1965622020" @default.
- W1965622020 workType "article" @default.