Loading...

Please Wait...

 

Description

Manufacturing and process control computer systems are often connected to business, commercial and enterprise networks that in turn are connected to the Internet. Process control systems may also contain computers with Internet connections, or modems for remote access. These connections with the outside world provide the means for attackers to penetrate the systems and cause harm. The potential also exists for manipulation of control systems by people acting from inside a company.

Various types of attack are possible including the theft, corruption, damage or destruction of information; denial of service wherein users are prevented or inhibited from accessing computer systems; manipulation where computers are used to control process equipment such as pumps, valves, and motors; and process shutdown.

Why Address Cyber Security?

Manipulation of process computer control systems by cyber attack can result in events producing catastrophic human, environmental and financial impacts. The risks of such events must be managed.

The International Society of Automation (ISA) is developing a set of standards on manufacturing and control systems security (ISA-99). These standards represent good engineering practice for the manufacturing and process industries.

Why Primatech?

Primatech has developed a comprehensive cyber security management system that addresses protection from cyber attacks. We have also developed various cyber security vulnerability analysis (CSVA) and risk assessment approaches. These approaches have been published in periodicals and presented at conferences. Primatech has conducted numerous CSVAs using these methods.

Primatech has participated in the development of the ISA-99 standards for manufacturing and control systems security.

Services Offered

  • Development of a Cyber Security Management System.

    We develop a management system to help reduce the likelihood and severity of cyber attacks against your facility and and integrate it with your existing management systems.

  • Performance of Cyber Security Vulnerability Analysis (CSVA).

    We facilitate CSVAs for you facility and document the results in a report.

  • Reviews and audits of facilities to assess the current state of protection against cyber attack.

    We examine your facility to determine where cyber security weaknesses exist and where improvements may be needed. We provide you with a report on the results of the assessment.
 

All Services