Subscribe to CERTSI - Blog RSS

Blog

PRP and HSR: Redundancy protocols

PRP and HSR: Redundancy protocols

Posted on 08/03/2017
The evolution of industrial systems towards an almost complete automation entails new challenges in communications. New functionalities acquired by the process, such as the use of digital relays to manage emergency interruptions, are transmitted by the communications network and this cannot fail. Given this need for zero tolerance to any failure, the redundancy offered by the HSR and PRP protocols can be a key factor.
Robots and drones in the Industry 4.0

Robots and drones in the Industry 4.0

Posted on 07/20/2017
Industry 4.0 integrates a large amount of devices used to provide the industrial processes with more intelligence. Among said devices we can find many different types of equipment such as drones or robots that perform specific tasks or tasks requiring precision. The use of these devices –quite well known nowadays– has certain implications for the security of control systems.
Intrusion prevention and management of events for control systems

Intrusion prevention and management of events for control systems

Posted on 04/27/2017, by INCIBE
The installation of security tools may be complex sometimes due to different reasons: the complexity of the tool itself, the environment in which it is installed, the necessary settings, etc. This post shows how to implement an IDS solution and how to manage events in a centralised manner by means of an event manager for industrial control systems.
La seguridad en los protocolos de control de edificios

Security in Protocols for Building Automation

Posted on 04/20/2017, by INCIBE
Smart buildings, either intended for housing, for offices or for industries, are fitted with communications systems for control of all elements such as lighting, heating and air conditioning, blinds, etc. Such communications are mainly carried out by means of two protocols or technologies: BACnet and LonWorks. In this article, the security capabilities of each protocol for operating in as a secure manner as possible shall be described.

Pages