Work processes and infrastructures become more and more electronically controlled and permanently monitored. Information will be stored and transmitted digital for this. This also means "that more and more social value is behind these systems". 1)
Not only Stuxnet has terrifyingly brought to collective conscience what experts knew long ago: There is no total security and targeted cyber attacks are possible with sufficient resources (money and manpower).
The table shows:
The top 10 threats for automation and process control system identified by the internationally renowned BSI 3) as well as
appropriate security features of the INSYS icom router products as measure against accidental and targeted cyber attacks!
INSYS - secure
- Bank on 3 stands:
2. Physically and
- You are well-prepared with our devices technically
- Find out more about the physical and organisational measures
Measure catalog PDF
Therefore, use INSYS icom products with INSYS SECURITY INSIDE and benefit from the technically well-founded advice of our employees - we are happy to consult you professionally!
1) Prof. Gordon Rohrmeier, Hochschule Augsburg
2) Source: BSI-CS 029 | version 1.00 dated April 12, 2012, page 2 of 2
3) BSI: Bundesamt für Sicherheit in der Informationstechnik (Federal Office for Information Security)