Check Point: Security Demo for Industrial Control Systems HD

Check Point: Security Demo for Industrial Control Systems
00:05:44
Обнаружено блокирование рекламы на сайте

Для существования нашего сайта необходим показ рекламы. Просим отнестись с пониманием и добавить сайт в список исключений вашей программы для блокировки рекламы (AdBlock и другие).

Компания Check Point Software Technologies Ltd. — мировой поставщик решений в области обеспечения интернет-безопасности, единственный поставщик средств обеспечения полной безопасности Total Security для сетей, данных и конечных узлов, объединенных единой средой управления.

Security Demo for Industrial Control Systems.

This video demonstrates how is deployed to protect and secure your operational network. For more information, please visit: In the centralized management center (called the SmartCenter), rules or security policies are created and pushed to the gateways. In the middle perimeter gateway is used to segment the administrative and operational network zones. This gateway can be used as a higher layer of enforcement to provide access control, VPN, and IPS. At the bottom are 1200R ruggedized appliance, these gateways are deployed where extreme temperature and humidity requirements are needed, which might be at field/remote locations and a shop floor. All gateways can be deployed transparently or “bridged” without the need to reconfigure the IP address space.I set the demo up with two hosts accessing a PLC using acting as an operator workstation to monitor the boiler. The workstation left has full access to monitor and control the boiler PLC, the one on the left is only authorized for read access. gateways enforce security by following a set of rules installed from the SmartCenter. These rules control which devices are allowed to communicate; and describes the types of protocols and commands that are allowed through the gateway. The rule displayed shows that this host is authorized to read MODBUS status information and send control commands the PLC. Detailed packet inspection is per formed on SCADA traffic and can be individually customized. Critical applications and access controls need to be enforced and limited to authorized users and devices. From this workstation, I manually setup the water and gas valves to produce an overheat condition that could have been modified by unsuspecting hosts. If this was to continue without notice, the result could be catastrophic.
RSS
Нет комментариев. Ваш будет первым!