Auflistung nach Autor:in "Bajramovic, Edita"
1 - 5 von 5
Treffer pro Seite
Sortieroptionen
- TextdokumentForensic-related Application Security Controls for RHEL in Critical Infrastructure(INFORMATIK 2017, 2017) Bajramovic, Edita; Lainer, AndreasIndustrial cyber security is an avid area of research. Incident response and forensic investigations are complex activities. Due to the complexity of critical infrastructures, such as Nuclear Power Plants (NPPs), preparation is vital. Manual approaches still tend to be favored mainly because of (physical) safety assurances. The tasks and actions required and the outcomes to expect need to be documented. Application Security Controls (ASCs) are a good way to document forensic controls for which an extended model is proposed. However, ASCs must be tested further on forensic applicability and there are also considerable alternatives. In terms of possible additional security measures and to apply the gained insights, one exemplary operational Instrumentation & Control (I&C) server system is analyzed in order to derive recommendations.
- KonferenzbeitragGraded security forensics readiness of SCADA systems(Informatik 2016, 2016) Li, Jianghai; Bajramovic, Edita; Gao, Yuan; Parekh, Mithil
- TextdokumentSecure Unidirectional Security Gateways for Industrie 4.0(INFORMATIK 2021, 2021) Moussi Djeukoua, Christele Larissa; Guiraud, Timothee; Bajramovic, Edita; Schindler, Josef; Waedt, KarlSecure data exchange between different geographical sites (e.g. industrial manufacturing facilities, power plants, research labs, and manufacturer test facilities) is an important part of cybersecurity. It is for example addressed by section 13 “Communications Security” of ISO/IEC 27002:2013. ISO/IEC 27033-4:2014 gives guidance for securing communications between networks using security gateways (firewall, application firewall, Intrusion Protection System, etc.). While the newest part of the multipart ISO/IEC 27033 standards series, ISO/IEC WD 27033-7 “Information technology Network security Part 7: Guidelines for network virtualization security” is more on the abstraction of physical components involved in communication, this paper aims to emphasize the fiber optical network communication-based security between very specific Cyber-Physical Systems (CPS). In this case, secure means a strictly reduced feedback channel. According to ISO/IEC 27033-4, essentially, the approaches described in this paper would be classified as physically unidirectional security gateways. In this paper, requirements and concepts will be presented which are beneficial for a scalable use in Industry 4.0 applications for highest (hardware-enforced) unidirectional communication and which can coexist with Firewall and Demilitarized Zone (DMZ) approaches that are also needed for complex IACS architectures.
- KonferenzbeitragSecurity Challenges and Best Practices for IIoT(INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), 2019) Bajramovic, Edita; Gupta, Deeksha; Guo, Yun; Waedt, Karl; Bajramovic, AnisSecurity concerns regarding the Industrial Internet of Things (IIoT) are constantly increasing, causing issues in industrial facilities, where heavy machinery and dangerous systems are operated and controlled with connected devices. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to IIoT, including nuclear facilities. Yet, as industrial systems become more and more interconnected, comparable cyber-attacks could happen in other industrial domains in the future. Therefore, adequate international standards and best practices can decrease occurrence of such attacks.
- KonferenzbeitragSIEM: policy-based monitoring of SCADA systems(Informatik 2016, 2016) Gao, Yuan; Xie, Xin; Parekh, Mithil; Bajramovic, Edita