Critical Infrastructure & SCADA

control_room_nuclear_germany
Source: National Geographic

Secure your legacy and next generation control systems with White Hawk Software.

Industrial control systems (ICS) are the drivers of our industry. They control and regulate industrial processes from critical infrastructure, power, electricity, oil, water production and distribution, and transportation systems to industrial manufacturing and the supermarket supply chain. Literally any industrial process today has some form of control and automation system in place. ICS include Supervisory Control and Data Acquisition (SCADA), Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), and any other type of technology specific to running an industrial operation.

Industrial Control systems/SCADA have been in place for a long time. However, the new connectivity enables not only new possibilities for ease of remotely controlling and regulating but also open avenues of sabotaging these systems via cyber attacks. While errors in the early days had only localized consequences due to the physical separation, today it makes entire regions and even states vulnerable to becoming dysfunctional. Your life can depend on it and cyber attacks on critical infrastructure are used today to gain political power over a nation. The number of cyber attacks on critical infrastructure is increasing as noted in DELLS’ 2015 report, and they now have the power to uproot complete regions or even nations. Think water, power, energy production and distribution as well as manufacturing in a broad range of areas. The attack on the Ukrainian power system in December of 2015 is one example (Analysis on the cyber attack on the Ukrainian power grid), an attack on Israel’s power grid in January 2016 another one.

Embedded systems have a long history, they are often old legacy systems and not adjusted to today’s connected world. While network security monitoring is a first step in catching an intrusion, a zero day attack geared toward manipulating the code would go undetected.

White Hawk’s code tamper-proofing tool is an effective protection against these attacks and helps you to protect life and your industrial assets.