Research & Reports

IP Reputation Report-02162020

February 20, 2020 | Adeline Zhang

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at February 16, 2020.

ICS Information Security Assurance Framework 17

February 17, 2020 | Adeline Zhang

Nuclear Power The security scenario of the nuclear power plant is similar to that of the thermal power platform. For details, sees section 4.1.1. Generally, it contains the following contents:

IP Reputation Report-02092020

February 13, 2020 | Adeline Zhang

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at February 9, 2020.

ICS Information Security Assurance Framework 16

February 11, 2020 | Adeline Zhang

System Introduction The computer monitoring system of the hydropower plant adopts a hierarchical distributed open system structure totally controlled by the computer, which consists of the main control layer of functions and the local control unit (LCU) layer of objects. The main control layer consists of the operator station, data server station, external communication station, […]

ICS Information Security Assurance Framework 15

February 10, 2020 | Adeline Zhang

Wind Power System Introduction Based on computers, communication devices, and test control units, the wind power monitoring system provides a basic platform for real-time data collection, switch status monitoring, and remote control of wind power plants. It can work with detection and controls devices to form an arbitrarily complex monitoring system. It plays a vital […]

ICS Information Security Assurance Framework 14

February 7, 2020 | Adeline Zhang

ICS Security Solutions for Typical Industrial Scenarios System Introduction Based on computers, communication devices, and test control units, the electric power monitoring system provides a basic platform for real-time data collection, switch status monitoring, and remote control of thermal power plants. It can work with detection and controls devices to form an arbitrarily complex monitoring […]

IP Reputation Report-02022020

February 6, 2020 | Adeline Zhang

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at February 2, 2020.

ICS Information Security Assurance Framework 13

February 5, 2020 | Adeline Zhang

Policies for Building the Defense-in-Depth System for Industrial Control Networks For the sake of ICS security protection, we can build a defense-in-depth system by implementing the following policies:

ICS Information Security Assurance Framework 12

February 4, 2020 | Adeline Zhang

ICS Information Security Assurance Framework ICS Security Assurance Principles In response to related compliance requirements put forward by the industry and the country, the ICS information security assurance framework will be developed to combine both technology and management, taking full account of the enterprise’s business requirements and ICS operating characteristics. By switching ICS protection from […]

ICS Information Security Assurance Framework 11

February 3, 2020 | Adeline Zhang

2.4 ICS Security Trend All in all, with IT and OT converging at a rapid pace, ICSs will be exposed to more threats that are evolving faster and faster. The threat evolution is reflected in the following aspects: