Honeywell: Lifecycle Solutions & Services

  • Middle East: Tuesday, October 09 - 2012 at 11:05

Recognizing that securing your critical infrastructure is an evolving process is a key element in the development of a logical programme that will ensure safety, security and effectiveness. There are four logical phases in this process, with defined actions that can be measured and coordinated. Understanding the risks and how to address them is the first step in customizing the phases to meet your particular requirements. In this white paper, we'll discuss the four phases—assess, remediate, manage, and assure—and give examples of how this approach can ensure the security of your critical infrastructure.

Introduction


Control systems are an integral part of the industrial infrastructure today—not just in North America, but around the world. We have come to understand that control systems share some Information Technology (IT) similarities with corporate business systems; however, control systems are technically, administratively, and functionally more complex and unique than business IT systems.

Vulnerabilities, particularly cyber security, affect the safe, functional performance of both control systems and business IT systems.

However, mainstream IT is quite knowledgeable and experienced with the threats and management of the security environment— perhaps years ahead of the current status of control systems. We do have the opportunity to learn from the experiences of business IT and shorten the time span for control systems to acquire the same level of security awareness.

One of the main reasons for this difference in cyber security maturity is the difference in focus between business IT and control systems.

Control systems have focused on equipment efficiency and reliability, while cyber security was left to the business IT organizations.

However, this situation is changing. And, we see that the convergence of IT and control systems requires expertise from both business IT and industrial control systems.[i]

We call this convergence Industrial IT.

This Honeywell IT white paper covers:

Table of Contents


• Introduction

• Securing Your Critical Information

• An Ongoing Process that Requires a Logical Approach

• Increased Accessibility Requirements and

• Tighter Linkage between Business and Process Information

• Complex Array of Tools, Standards and Best Practices

• Targeted Malicious Cyber Security Threats

• Increase in Industry and Government Regulations or Standards

• Increased Emphasis on Uptime, Availability & ReliabilityTable of Contents Style

• An Organized, Logical Approach to Securing Your Critical Infrastructure

• The Assess Phase

• The Remediate Phase

• The Manage Phase

• The Assure Phase

• Summary
 

Login or register to download whitepaper (free registration)

Would you like your White papers to appear in this section? Please email your whitepaper .pdf, a headline, an abstract of up to 250 words and a jpg company logo to AMEinfo.com White papers
Article Options
Log in to request more information

Disclaimer »

Articles in this section are primarily provided directly by the companies appearing or PR agencies which are solely responsible for the content. The companies concerned may use the above content on their respective web sites provided they link back to http://www.ameinfo.com

Any opinions, advice, statements, offers or other information expressed in this section of the AMEinfo.com Web site are those of the authors and do not necessarily reflect the views of AME Info FZ LLC / 4C. AME Info FZ LLC / 4C is not responsible or liable for the content, accuracy or reliability of any material, advice, opinion or statement in this section of the AMEinfo.com Web site.

For details about submitting your stories, please read the guide - all content published is subject to our terms and conditions