![Eaton INDGW-X2 Скачать руководство пользователя страница 193](http://html.mh-extra.com/html/eaton/indgw-x2/indgw-x2_user-manual_525442193.webp)
Cybersecurity considerations for electrical distribution systems
Securing the Network Management Module – 195
•
•
•
•
•
•
•
•
•
•
5.1.4.1 Paths to the control network
The paths in above figure include:
External users accessing the network through the Internet
Misconfigured firewalls
Unsecure wireless routers and wired modems
Infected laptops located elsewhere that can access the network behind the firewall
Infected USB keys and PLC logic programs
Unsecure RS-232 serial links
The most common malicious attacks come in the following forms:
Virus—a software program that spreads from one device to another, affecting operation
Trojan horse—a malicious device program that hides inside other programs and provides access to that device
Worm—a device program that spreads without user interaction and affects the stability and performance of the ICS network
Spyware—a device program that changes the configuration of a device
5.1.5 Defense in depth
While there are differences between traditional IT systems and ICS, the fundamental concept of “defense in depth” is applicable to
both. Defense in depth is a strategy of integrating technology, people, and operations capabilities to establish variable barriers
across multiple layers of an organization. These barriers include electronic countermeasures such as firewalls, intrusion detection
software/components, and antivirus software, coupled with physical protection policies and training. Fundamentally, the barriers are
intended to reduce the probability of attacks on the network and provide mechanisms to detect “intruders.”
Содержание INDGW-X2
Страница 1: ...UPS Industrial Gateway Card INDGW X2 User s Guide English 10 18 2021 2 2 3 ...
Страница 23: ...Configuring Modbus Installing the Network Management Module 25 ...
Страница 24: ...Configuring Modbus Installing the Network Management Module 26 ...
Страница 25: ...Configuring Modbus Installing the Network Management Module 27 ...
Страница 26: ...Configuring Modbus Installing the Network Management Module 28 ...
Страница 35: ...Home Contextual help of the web interface 37 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode ...
Страница 37: ...Home Contextual help of the web interface 39 3 2 7 2 2 Bypass mode 3 2 7 2 3 Battery mode ...
Страница 61: ...Protection Contextual help of the web interface 63 Example 4 Custom ...
Страница 62: ...Protection Contextual help of the web interface 64 Settings 1 Settings 2 ...
Страница 218: ...Default settings and possible parameters Information 220 ...
Страница 266: ...Acronyms and abbreviations Information 268 ...
Страница 273: ......