Recommended Practice for Securing Control System Modems
This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.
- Research Organization:
- Idaho National Lab. (INL), Idaho Falls, ID (United States)
- Sponsoring Organization:
- USDOE
- DOE Contract Number:
- DE-AC07-99ID-13727
- OSTI ID:
- 924510
- Report Number(s):
- INL/EXT-07-12635; TRN: US200809%%533
- Country of Publication:
- United States
- Language:
- English
Similar Records
Control Systems Cyber Security: Defense-in-Depth Strategies
Cyber Incidents Involving Control Systems
Control Systems Cyber Security:Defense in Depth Strategies
Conference
·
Mon Oct 01 00:00:00 EDT 2007
·
OSTI ID:924510
Cyber Incidents Involving Control Systems
Technical Report
·
Sat Oct 01 00:00:00 EDT 2005
·
OSTI ID:924510
Control Systems Cyber Security:Defense in Depth Strategies
Technical Report
·
Mon May 01 00:00:00 EDT 2006
·
OSTI ID:924510