Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Kartographer

These people are reading too many novels and watching too much TV (e.g., “War Games”). These are physically separated systems, no wired or wireless connection to critical systems. The only way you’re going to get into those systems is with telepathy. Any “Scanners” out there? Didn’t think so.


9 posted on 10/05/2015 12:25:37 PM PDT by chimera
[ Post Reply | Private Reply | To 1 | View Replies ]


To: chimera

Offering additional information assistance on this topic to poster and those similarly minded -
The NSA ICS security framework paper is informative.

Building Optimized Industrial Ethernet Networks - Moxa

www.moxa.com/event/ies/2013/industrial_etherne... Proxy Highlight

An Industrial Control System (ICS) needs the type of network security that takes into ... This paper will discuss the types of protection an industrial-grade wireless ...
SCADA System Cyber Security – A Comparison of ... - CiteSeer

citeseerx.ist.psu.edu/ viewdoc/ download?doi=10.1... Proxy Highlight

support electric power utilities in their cyber security efforts. .... Systems (ICS) Security [17]. National ..... polic(y)(ies), wireless network security, wireless security,.
A Framework for Assessing and Improving the Security Posture of ...

https://www.nsa.gov/ia/_files/ics/ics_fact_sheet.pdf Proxy Highlight

focus the reader on aspects of network security and give them a framework for assessing their .... Most ICS networks contain communications links


11 posted on 10/05/2015 1:20:56 PM PDT by MarchonDC09122009 (When is our next march on DC? When have we had enough?)
[ Post Reply | Private Reply | To 9 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson