Securing SCADA Systems from Cyber Attacks

Learn about the many ways cyber-attacks threaten SCADA systems, and what can be done to keep manufacturing and utility plants protected. In the initial days of SCADA, OEMs used proprietary communication protocols for the communication network. Over time, however, systems required parts from multiple OEMs and the communication protocol converged. This shift was instrumental for … Read more

Security Decisions in Modbus Industrial Systems

Learn about Modbus security in industrial automation, including vulnerabilities, fixes, and alternative solutions. There are many pros and cons associated with the integration of security on existing Modbus systems. The primary driver for security introduction is the addition of TCP/IP networking to utilize cloud networking, and this brings with it many potential vulnerabilities. Concern for … Read more

The TLS (Transport Layer Security) Protocol in Secure Modbus/TCP

What is TLS and what is its role in the Modbus-TCP version of the Modbus protocol? Security comes with added protocol complexity. Many industrial control systems rely upon encapsulating Modbus Application Protocol (MBAP) Protocol Data Unit (PDU) messages carried on a TCP/IP network within a “TLS” layer to secure communications. The combined solution is called ‘Modbus/TCP … Read more