«

»

Jun
30

A security checklist for SCADA systems in the cloud

From: GCN

By Patrick D. Howard, (ISC)2 Government Advisory Council Executive Writers Bureau

Given the critical nature of operations that supervisory control and data acquisition (SCADA) systems manage, an article containing the words “cloud,” “SCADA” and “vulnerabilities” together should raise the hair on the necks of information security professionals.

Traditionally, SCADA applications used to control critical infrastructure have been hosted within an organization’s IT infrastructure and have relied on the protection offered inside the infrastructure perimeter. In some cases, organizations have “air gapped” their SCADA applications from the broader network and particularly from the Internet.

Read Complete Article

Leave a Reply

Please Answer: *