Research & Reports

ICS Information Security Assurance Framework 6

January 21, 2020 | Mina Hao

2.2 ICS-Targeting Malware Analysis In recent years, more and more malware took ICSs as targets, causing an increasingly great damage. The following sections analyze major ICS-targeting malware.

ICS Information Security Assurance Framework 5

January 19, 2020 | Mina Hao

Typical ICS Security Incidents As ICSs are increasingly informatized and open, more and more attacks are hitting ICSs, doing an increasing harm. ICS-targeted attacks use the IT network as a springboard to affect the operating of OT systems. Currently, attacks against ICSs are carried out to achieve three purposes: disrupting the normal operating of ICSs, […]

ICS Information Security Assurance Framework 4

January 18, 2020 | Mina Hao

Technical Trend of ICS Information Security 1.3.1 General Introduction As the application of IT technologies in industrial fields is expanding in breadth and depth, ICSs are facing an increasing number of security risks. ICSs’ original security protection systems which feature border separation and protection tend to be associated and integrated with business. With the emergence […]

ICS Information Security Assurance Framework 3

January 17, 2020 | Mina Hao

Development of ICS Information Security Since the Stuxnet virus explosion, countries all over the world have taken ICS security issues to a new height by actively working out and introducing related policies, standards, technologies, and solutions. A look into ICS security developments around the world reveals that the USA is the first to research and […]

Cybersecurity Insights-13

January 16, 2020 | Mina Hao

Distribution of IoT-based Family Samples We analyzed IoT-based malicious family samples captured by NSFOCUS threat hunting systems (see Figure 7-1), those captured by NSFOCUS Threat Intelligence (NTI) and those captured by VirusTotal (see Figure 7-2). The two figures, though presenting different data sources, both indicate that Gafgyt and Mirai take the first two places on […]

IP Reputation Report-01122020

January 15, 2020 | Mina Hao

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 12, 2020.

ICS Information Security Assurance Framework 2

January 14, 2020 | Mina Hao

1.2 Development of ICS Information Security As industrial informatization advances at a rapid pace and the industrial Internet, industrial clouds, and other new technologies spring up, information and network technologies and IoT technologies have found wide application in smart grid systems, intelligent transportation systems, and industrial production systems. For the sake of inter-system collaboration and […]

ICS Information Security Assurance Framework 1

January 13, 2020 | Mina Hao

Development of ICS Security 1.1 Development of Industrial Intelligence The following figure shows the development history of industrial control systems (ICSs). The history of ICSs can date back to the 18th century when James Watt improved the steam engine by adding a throttling controller, i.e., a centrifugal governor. The centrifugal governor works like this: It […]

Cybersecurity Insights-12

January 9, 2020 | Mina Hao

6.3 Worm In the 2018 H1 Cybersecurity Insights , we pointed out that most worm viruses were discovered more than five years ago. This indicates how capable these viruses are of propagating and evolving and how difficult it is to remove them completely from the network. According to data throughout the year, this was still […]

IP Reputation Report-12292019

January 8, 2020 | Mina Hao

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 5, 2020.