scada

The threat of electronic or physical attacks on SCADA systems could come from a number of different sources. Following are some examples of threat sources:

 

• insider attack from employees or ex-employees who are disgruntled or for any other reason are a possible security threat

• organized crime may be driven by financial incentive to penetrate SCADA systems

• genuine mistakes made as a result of lack of training, carelessness or an oversight

• terrorists who may be seeking to add electronic attack to their existing capabilities

• generic Internet threats such as worms, trojans and viruses that infect systems on the Internet can also affect SCADA systems when they use the same software and protocols. This may not be the result of a deliberate attack, SCADA systems may be infected merely because they can be

• recreational hackers, crackers and virus writers motivated primarily by the challenge and a fascination with technology

• script kiddies who are primarily untrained and yet have hostile or thrill-seeking intentions towards almost anything connected to the Internet

• activists conducting publicity-seeking attacks

• corporate attackers that spy on competitors to gain a competitive advantage.

 

Ethanol-bio-fuel.com has designed a security offering for the ethanol process control environment. Our offer includes Risk Assessment Services and Risk Mitigation Technology.

 

Penetration Testing - Is your network secure? How do you know? The only way to know for sure how your network will perform under attack is to actually attack it. An ethanol-bio-fuel.com team of certified security experts will launch controlled non intrusive attacks against your network and prepare a report detailing what holes were found, how they were exploited, how much of a threat they are, and suggestions on how to fix them.

 

External Penetration Testing - An External Penetration Test aims to simulate an attacker outside your organization, who is also usually in a remote location. Such attackers may be malicious hackers from a few miles away, or a few continents away. Ethanol-bio-fuel.com External Penetration Test is performed exclusively from our secure facility, by our certified security experts.

 

Custom Penetration Testing - If your needs are more specific, we would still like to help. Ethanol-bio-fuel.com will work with you to test a specific system or set of systems. A good example of this is a new installation of IDS/IPS systems. In order to be useful, they need to be tuned, and tuning these systems can be difficult. It’s even more difficult without controlled attack traffic to reference. Ethanol-bio-fuel.com can assist in this and many other situations.

 

Vulnerability Assessment - Attaining a good security stance is never easy, but it is much more difficult when you don’t know where you currently are. A Vulnerability Assessment will help nail down exactly what areas are weak and where to devote resources. Ethanol-bio-fuel.com team of certified security experts can cover your organization from top to bottom, or only in the areas you feel that need help.

 

Policy Review - At the core of every good security program is a well-written and current policy. The policy should drive all other parts of the security process, including technology purchases and implementations. A good policy will be a useful tool instead of a hindrance, allowing for easy fixes to existing problems, and preventing new problems from occurring. Ethanol-bio-fuel.com can help you write a new policy, or shape up your existing policy.

 

Consulting - If your organization has security needs above and beyond our defined services, we offer consulting at an hourly rate. Contact us and let us know how we can help make your organization more secure.

 

Risk Mitigation - Ethanol-bio-fuel.com Consultants technology portfolio offers the industry's first and only comprehensive and fully integrated "Defense in Depth" cyber-risk mitigation technology platform designed specifically to monitor and protect both new and legacy process control and SCADA systems. Our services are specifically designed for the real-time environment to ensure they passively monitor and protect without impacting the availability and reliability of the control system and network.

 

Let us maximize your yield and profit!
For our optimization assessment, please contact us at: service@infosecpro.com or call: 732-763-2814

Read more