Breaking News
Comments
Newest First | Oldest First | Threaded View
CMathas
User Rank
Manager
Re: Any examples...
CMathas   9/9/2013 9:15:21 AM
NO RATINGS
The focus of this standard is how to set up a cyber security management program. The ANSI/ISA-62443-3-3 standard is the first standard from ISA-99 which provides technical cyber security standards for the control systems that make up an IACS—the first standard to address systems.

While there are several industry-segmented standard covering water, infrastructure, oil and gas, etc., cyber security is left to the user to implement. Sometimes that's not possible as the systems aren't capable of meeting the requirements of the individual standards. ANSI/ISA-62443-3-3 defines these capabilities. End users can now define compliance to the ANSI/ISA-62443-3-3 standard as their requirement in their procurement specification. Naturally, issues of cyber security and implementation continue to evolve—somewhat rapidly, so there is a futures element of this. Like several standards, however, a basis of certification from which to go forward is always preferable compared with everyone to their own devices. This certification is currently ISASecure, from the ISA Security Compliance Institute (ICSI). Now, with the new standard, certification for these systems will be labeled ISASecure SSA. Systems that have been designed for this level of security will be easily identified.

As to a specific future vulnerability on a system level, there are so many current ones with systems the constant target of hacking, and nothing sufficient in place to protect so many, I think the criminal mind would be better than mine to think of a future vulnerability! Hacking and undermining are constantly evolving.

Thanks for posting, Charles.

 

Charles.Desassure
User Rank
Manager
Any examples...
Charles.Desassure   9/7/2013 12:36:40 AM
NO RATINGS
This sounds very interesting.  After doing additional research,  according to the International Electrotechnical Commission (IEC), this standard is designed to provide a flexible framework to address and mitigate current and future vulnerabilities in industrial automation and control systems (IACS).  I wonder if they could provide and example of a future vulnerability in this area.  Carolyn Mathas, any examples?



Flash Poll
EE Life
Frankenstein's Fix, Teardowns, Sideshows, Design Contests, Reader Content & More
Engineer's Bookshelf
Caleb Kraft

The Martian: A Delightful Exploration of Math, Mars & Feces
Caleb Kraft
6 comments
To say that Andy Weir's The Martian is an exploration of math, Mars, and feces is a slight simplification. I doubt that the author would have any complaints, though.

The Engineering Life - Around the Web
Caleb Kraft

Surprise TOQ Teardown at EELive!
Caleb Kraft
Post a comment
This year, for EELive! I had a little surprise that I was quite eager to share. Qualcomm had given us a TOQ smart watch in order to award someone a prize. We were given complete freedom to ...

Design Contests & Competitions
Caleb Kraft

Join The Balancing Act With April's Caption Contest
Caleb Kraft
57 comments
Sometimes it can feel like you're really performing in the big tent when presenting your hardware. This month's caption contest exemplifies this wonderfully.

Engineering Investigations
Caleb Kraft

Frankenstein's Fix: The Winners Announced!
Caleb Kraft
8 comments
The Frankenstein's Fix contest for the Tektronix Scope has finally officially come to an end. We had an incredibly amusing live chat earlier today to announce the winners. However, we ...

Top Comments of the Week
Like Us on Facebook
EE Times on Twitter
EE Times Twitter Feed

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)