Skip to main content

Protect Critical Infrastructure Systems With Whitelisting

Security professionals in federal, state and local agencies face many unique challenges in protecting critical systems and information. The CDM program has tremendous potential for both increasing the security levels at those agencies and reducing the cost of demonstrating compliance. However, to be successful, the program must address the following: lack of awareness, low inspector general awareness and lack of information on how to use the program.

35312 (PDF, 2.44MB)

5 Aug 2014
ByDwight Anderson
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

Cyber Guardian Exercise: A Case Study in Brazil to Address Challenges in Cybersecurity and Protect Critical Infrastructure

Research Paper

Discussions of cybersecurity, in particular those associated with critical infrastructure (CI),...

  • 22 Feb 2022

Manage Open-Source Components via Secure Product Development Lifecycle in Industrial Control System

Research Paper

Nowadays, open-source components are becoming the essential components in industrial control systems...

  • 14 Feb 2022

ICS within the NIS Directive should be ATT&CK®ed

Research Paper

In August 2016, the European Parliament and the Council of the European Union implemented the first...

  • 25 Aug 2021

ICS OT Systems Security Engineering Is Not Dead

Research Paper

ICS OT Systems Security Engineering Is Not Dead

  • 23 Mar 2020

ICS Layered Threat Modeling

Research Paper

The ultimate goal of building cybersecurity architecture is to protect systems from potential...

  • 22 Jan 2019

Passive Analysis of Process Control Networks

Research Paper

In recent years there has been an increased push to secure critical ICS infrastructures by...

  • 1 Jun 2018

Incentivizing Cyber Security: A Case for Cyber Insurance

Research Paper

In the wake of recent events-Ukraine, Shamoon v2, WannaCry--providing cyber security continues to be...

  • 27 Jun 2017

The Industrial Control System Cyber Kill Chain

Research Paper

Read this paper to gain an understanding of an adversary's campaign against ICS. The first two parts...

  • 5 Oct 2015

Tactical Data Diodes in Industrial Automation and Control Systems

Research Paper

In recent years, there has been an increased interest in the use of Data Diodes (also known as...

  • 30 Jun 2015

The Perfect ICS Storm

Research Paper

As manufacturing Industrial Control System (ICS) architectural designs have evolved from isolated...

  • 8 Jun 2015

An Abbreviated History of Automation and Industrial Controls System and Cybersecurity

Research Paper

An Abbreviated History of Automation and Industrial Controls System and Cybersecurity

  • 23 Jan 2015

Automated Defense - Using Threat Intelligence to Augment

Research Paper

Automation and industrial controls systems - often referred to as ICS - have an interesting and...

  • 19 Jan 2015

Rate my nuke: Bringing the nuclear power plant control room to iPad

Research Paper

Shibboleth is a free, open-source web single sign-on solution (SSO) for complex federated...

  • 14 Nov 2014

Case Study in Developing Fault Tolerant and Highly Available Systems with Secure Zones of Protection

Research Paper

Process Control is the part of a company that controls the critical processes that company...

  • 8 Aug 2003

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.