
Work processes and infrastructures become more and more electronically controlled and permanently monitored. Information will be stored and transmitted digital for this. This also means "that more and more social value is behind these systems". 1)
Not only Stuxnet has terrifyingly brought to collective conscience what experts knew long ago: There is no total security and targeted cyber attacks are possible with sufficient resources (money and manpower).
The table shows:
The top 10 threats for automation and process control system identified by the internationally renowned BSI 3) as well as
appropriate security features of the INSYS icom router products as measure against accidental and targeted cyber attacks!

Technical measures by INSYS SECURITY INSIDE | ||
No. | Threat 2) | Measures |
---|---|---|
1 | Unauthorised use of remote maintenance accesses | |
2 | Online attacks via office / enterprise networks |
|
3 | Attacks on used standard components in the ICS network | |
4 | (D)DoS attacks | |
5 | Human misbehaviour and sabotage |
Intuitive configuration Restrictable web interface access Devices and services |
6 | Introduction of malicious code via removable media and external hardware |
|
7 | Reading and writing messages in the ICS network |
|
8 | Unauthorised access to resources |
|
9 | Attacks to network components |
|
10 | Technical misbehaviour and force majeure |
Therefore, use INSYS icom products with INSYS SECURITY INSIDE and benefit from the technically well-founded advice of our employees - we are happy to consult you professionally!
1) Prof. Gordon Rohrmeier, Hochschule Augsburg BR kontrovers, from min. 8:00
2) Source: BSI-CS 029 | version 1.00 dated April 12, 2012, page 2 of 2 web link
3) BSI: Bundesamt für Sicherheit in der Informationstechnik (Federal Office for Information Security)