Srbija Posted April 28, 2023 #1 Posted April 28, 2023 Industrial Cyber Security Controls From Iec62443 For Ics/Ot Last updated 10/2022 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 5.74 GB | Duration: 7h 53m IEC 62443 Standard, and implementation in the industrial control system (ICS). Technical controls, Levels & assessment. What you'll learn Details of IEC 62443 standard Authentication and Authorization controls Cybersecurity Controls for ICS/OT Controls: DFA, Firewalls, VPN, PKI Controls: Password, Biometric, Token Zones, Conduits and Security Levels Foundational requirements Log management High/Low level Risk assessment Industrial use case for SL1-SL3 Requirements Basic industrial knowledge of DCS/SCADA/PLC No programming knowledge required Basic understanding of ICS/OT environment Prior experience required in ICS Architecture awareness of OT systems Description Safeguarding critical infrastructures like Power plants, Oil & Gas industry, Wind power, Manufacturing, Food processing, etc., all are now integrated with IT technologies and some of them are connected to the internet as well. This convergence of IT and OT is increasing changes of being exposed or increased attack surface. Hence cybersecurity requirement for OT/ICS industry is a prime concern now. Most industries are now implementing these measures and mitigating risks.ICS systems comprise SCADA, DCS, PLC, and many more proprietary systems and protocols, designing a cybersecurity solution for these systems need the understanding of both OT-related applications and IT-related controls which can fit into these environments.In this course, we will learn about 62443 standard and technical controls which can be implemented in the ICS environment. Some controls can be implemented, what could be a probable weakness, and what does industry assessment says about those prescribed cybersecurity controls as per 62443-3-3. This course also covers risk assessment based on 62443-3-2 for high-level and detailed risk assessment. Industry uses case for zoning, segmentation is also explained in the course to make it easier to understand.These are based on guidelines hence in the upcoming courses learner will understand the required cybersecurity controls for critical infrastructure. Overview Section 1: IEC 62443 Basic Introduction Lecture 1 Introduction About Course Lecture 2 Key IACS Roles Lecture 3 IEC 62443 Brief Overview Lecture 4 Security Levels (SL0 to SL5) Lecture 5 Levels of Control System (Contextual Model (L0-L4) Lecture 6 Maturity Levels Lecture 7 Security Level types: Target, Achieved and Capability Lecture 8 Zone & Conduits Lecture 9 Foundational requirements Section 2: Foundational Requirements from 62443-3-3 Lecture 10 FR 1-Identification and Authentication Lecture 11 FR 2-Use Control Lecture 12 FR 3-System Integrity Lecture 13 FR 4-Data Confidentiality Lecture 14 FR 5-Restricted Data flow Lecture 15 FR 6-Timely response to events Lecture 16 FR 7-Resource Availability Section 3: Foundational Requirements from 62443-4-2 Lecture 17 FR 1 - Identification and Authentication Control Lecture 18 Detailed Use Case Study for FR1 Lecture 19 FR 2 -Use Control Lecture 20 Detailed Use Case Study for FR2 Lecture 21 FR 3-System Integrity Lecture 22 Detailed Use Case Study FR-3 Lecture 23 FR 4-Data Confidentiality Lecture 24 Detailed Use Case Study FR-4 Lecture 25 FR 5-Restricted Data flow Lecture 26 Detailed Use Case Study FR-5 Lecture 27 FR 6-Timely response to events Lecture 28 Detailed Use Case Study FR-6 Lecture 29 FR 7-Resource Availability Lecture 30 Detailed Use Case Study FR-7 Section 4: Authentication & Authorization Technologies- 62443-3-1 Lecture 31 Authentication & Authorization Briefing Lecture 32 Role Based Access Control Lecture 33 Password Authentication Lecture 34 Challenge/response Authentication Lecture 35 Physical Token Authentication Lecture 36 Smart Card Authentication Lecture 37 Biometric Authentication Lecture 38 Location Based Authentication Lecture 39 Password Distribution & Management Lecture 40 Device to Device Authentication Section 5: Network Protection Technologies Lecture 41 Network Firewalls Lecture 42 Host Based Firewalls Lecture 43 Virtual Local Area Networks (VLAN) Section 6: Encryption Technologies and Data Validation Lecture 44 Virtual Private Networks (VPN) Lecture 45 Symmetric Key Encryption Lecture 46 Public Key Encryption Section 7: Management, Audit, Measurement, Monitoring and Detection Tools Lecture 47 Log Auditing Utilities Lecture 48 Virus and Malicious Code Detection Lecture 49 Intrusion Detection Systems Section 8: Zones, Conduits and Risk Assessments -62443-3-2 Lecture 50 How to implement Lecture 51 Flowchart for Risk Assessment Lecture 52 ZCR 1: Identification of SuC Lecture 53 ZCR 2: High Level Risk Assessment Lecture 54 ZCR 3 : Partition of SuC in zones and conduits Lecture 55 ZCR 4: Detailed Risk Assessment Lecture 56 ZCR 5: Document Cybersecurity requirements, assumptions and constraints Section 9: Cybersecurity Requirements & Techniques-Use Case Lecture 57 Security Level 1 Lecture 58 Security Level 2 Lecture 59 Security Level 3 Lecture 60 Use case for Industrial Firewall Lecture 61 About availability of 62443 Standards Control engineers, integrators, and architects who design or implement OT systems,System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems,Security consultants who perform security assessments and penetration testing of OT systems,Cybersecurity managers who are responsible for OT systems,Vendors that are developing products that will be deployed as part of an OT system Homepage Hidden Content Give reaction to this post to see the hidden content. Hidden Content Give reaction to this post to see the hidden content. Hidden Content Give reaction to this post to see the hidden content. Hidden Content Give reaction to this post to see the hidden content.
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now