How to understand the security risks in industrial control systems

Safety risk of industrial control system

The security risk faced by the ICS network is a systemic risk that is not determined solely by security vulnerabilities. Yes, the loopholes are indeed one of the main problems because they represent the attack paths that an attacker might exploit. But we also need to know that intrusion into the ICS network is relatively easy, and the various hacking attacks against ICS devices in the past decade are also the best proof. Once an attacker successfully invades the ICS/OT network, it will be a catastrophe for the ICS network.

How to understand the security risks in industrial control systems

Access the ICS/OT network

The concept of "air-isolated ICS/OT environment" has long since died, because for a variety of reasons, this network has more and more interconnections with the outside world, and this fact has provided attackers with two The main open attack path, but both methods require very high-end and novel exploit techniques:

1. Accessing the ICS/OT network through the “interoperability” of IT networks through “some kind of tools”. The so-called “some tools” refer to technologies such as phishing attacks and puddle attacks.

2. Access the ICS/OT network directly from the outside (through an invaded VPN or unmonitored remote access).

According to the survey information provided by Mandiant, in the North America, the 99th day (average value) after the attacker successfully invaded the IT network is generally detected, and a large number of security detection tools are deployed in the target network system. In the ICS/OT network, the security monitoring system is a scarce resource. When an attacker invades the ICS/OT network, there is almost no way to detect their existence.

Of course, apart from accessing the ICS network from outside, we can't completely ignore those security threats from within. For example, some networks lack restrictions on access credentials, while others do not revoke access credentials for old employees, which are the problems we may encounter in the future.

Destroying the ICS/OT network is much simpler than you think.

Because ICS/OT networks have obvious shortcomings in security monitoring, once an attacker successfully invades the network, they can have a lot of time to understand the topology of the network components and monitor and analyze all the processes in the network. In addition, many devices in the ICS network lack the most basic security management mechanisms. For example, device A, because device A's main function at the beginning of design is to optimize real-time communication, device A lacks proper authentication mechanism and encryption function, but everyone knows that such a device is absolutely insecure. . In fact, most of the controllers in industrial control systems do not have the ability to encrypt information data. These devices do not have such capabilities. There are various reasons, at least for 15 years. You don't have to look forward to any major changes in this area.

Many industrial control systems use PLC (Programmable Logic Controller) as a communication solution for industrial environments, but we need to know that an attacker can use legitimate commands to communicate directly with the PLC, and this behavior will be possible. Bringing immeasurable serious consequences to ICS. For an attacker, once the target ICS network is successfully entered, turning a process on or off is as simple as using a standard engineering tool, and the legitimate commands used by the attacker are not marked by the ICS/OT network. Suspicious behavior. Not only that, but the attacker can easily modify the program loaded on the PLC, and even run a new program is possible. The PLC does not require an operator to authenticate, and even if the controller has authentication capabilities, these features may have been disabled.

Therefore, regardless of whether the PLC has a vulnerability, the attacker can use the PLC black into the ICS network. Therefore, we must be patient when checking the security of ICS components, and make full use of existing resources and system functions to change the security dilemma of the ICS network.

What does the current situation mean?

The ICS/OT network is a high-risk asset, so we must find a way to better monitor the various activities related to the ICS network. As far as the current situation is concerned, attackers can not only bring serious security problems to ICS devices, but also steal valuable intellectual property rights from the company. In addition, some attackers will even use the ICS network as a chip to extort activities, or use ICS as an entry point to invade the enterprise's IT network environment. We can't solve the systemic risks of these networks overnight, and we probably won't be able to solve them well for the foreseeable future. Therefore, we must act now, we don't have time to conduct research and review step by step as before. We must develop and implement strict security policies with new perspectives and ideas, and improve the security level of ICS/OT networks. To a new level.

AbsoluteZero Pods

ZGAR Vape Pods 5.0

ZGAR electronic cigarette uses high-tech R&D, food grade disposable pod device and high-quality raw material. All package designs are Original IP. Our designer team is from Hong Kong. We have very high requirements for product quality, flavors taste and packaging design. The E-liquid is imported, materials are food grade, and assembly plant is medical-grade dust-free workshops.

From production to packaging, the whole system of tracking, efficient and orderly process, achieving daily efficient output. WEIKA pays attention to the details of each process control. The first class dust-free production workshop has passed the GMP food and drug production standard certification, ensuring quality and safety. We choose the products with a traceability system, which can not only effectively track and trace all kinds of data, but also ensure good product quality.


We offer best price, high quality Pods, Pods Touch Screen, Empty Pod System, Pod Vape, Disposable Pod device, E-cigar, Vape Pods to all over the world.

Much Better Vaping Experience!



Pods, Vape Pods, Empty Pod System Vape,Disposable Pod Vape Systems, MAX ICE

Shenzhen WeiKa Technology Co.,Ltd. , https://www.sze-cigarette.com