z-logo
Premium
Industrial Control System Security by Isolation: A Dangerous Myth
Author(s) -
Groves Daniel A.
Publication year - 2011
Publication title -
journal ‐ american water works association
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.466
H-Index - 74
eISSN - 1551-8833
pISSN - 0003-150X
DOI - 10.1002/j.1551-8833.2011.tb11490.x
Subject(s) - isolation (microbiology) , computer security , vulnerability (computing) , computer science , industrial control system , control (management) , key (lock) , risk analysis (engineering) , business , artificial intelligence , microbiology and biotechnology , biology
Although complete industrial control system (ICS) isolation may have been a viable option in years past, in today's interconnected and technologically mobile world, true isolation is nearly impossible. Additionally, separation of ICS networks from general business networks owned by a water utility can actually increase ICS network vulnerability. This article discusses several reasons why ICS isolation is impractical, and provides an example of how ICS isolation can actually increase overall vulnerabilities. The article presents secure network integration as a viable alternative for maintaining a secure system, and lists several key steps that are required to achieve secure integration between IT and ICS networks.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here