Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hardware and software technologies. This paper describes new technologies that can be applied to the design of next generation security architectures for industrial control systems. The technologies are discussed along with their security benefits and design trade-offs. © 2008 International Federation for Information Processing.
CITATION STYLE
Okhravi, H., & Nicol, D. (2008). Applying trusted network technology to process control systems. IFIP International Federation for Information Processing, 290, 57–70. https://doi.org/10.1007/978-0-387-88523-0_5
Mendeley helps you to discover research relevant for your work.