Why Internal Network Security Monitoring (‘INSM‘) Begins with Visibility
The concept of visibility was introduced to most of us at an early age. The message was clear. Seeing is important.
What is Network Security Monitoring and Visibility for IT
If you've been to an airport in recent years, you've likely seen the proliferation of self-serve check-in kiosks. Maybe you even caught one roaming around the airline ticket counter. If you insert your credit card, the kiosk retrieves and displays your flight information, allows you to change your seat, check your bags, and one day might offer you a cup of coffee. When you're finished, the kiosk transmits your check-in status to the airline, prints your boarding pass and luggage tags, and tells you where to pick up your coffee.
IT data includes everything sent over the internet to retrieve your flight information, like keystrokes, your credit card number, or biometric data. OT data includes the control signals sent along an internal 'network' used by components inside the kiosk, like the display screen, the printer, and the computer that instructs them.
Cybersecurity for IT and OT have a lot in common in that they both require the ability to inspect data to ferret out hackers and malware. The devices and systems used in the collection and handling of network data for threat analysis are commonly referred to by IT as Network Security Monitoring aka Visibility.
What is Network Security Monitoring for Critical Infrastructure?
FERC recently issued a Notice of Public Rulemaking ('NOPR') directing NERC to develop Reliability Standards for Internal Network Security Monitoring ('INSM') for Critical Infrastructure. Existing NERC CIP Reliability Standards focus on defending the network perimeter. NERC CIP Standards for INSM will focus on improving visibility inside your network.
Patrick Miller, CEO of Ampere Industrial Security, explains Network Security Monitoring for Critical Infrastructure as something akin to the flight data recorder, or black box, used on airplanes to collect and record information about the flight. Stuff like fuel, altitude, heading, and airspeed are collected by sensors and stored in a crash-survivable medium used for accident and incident investigation.
When something goes wrong, the 25 hours of data recorded onto the data recorder can often provide insight into what went wrong. But even the best recording device is only as good as the inputs it receives. And that's where Visibility comes in.
Visibility/Monitoring for critical infrastructure (and OT), typically begins with the addition of network TAPS at the Control System level. Network TAPS are purpose-built devices that capture and send vast amounts of hidden bits and bytes to packet brokers and security tools that inspect and respond to abnormal or malicious activity.
Once TAPS are installed, network packet brokers filter, aggregate, regenerate and efficiently route network traffic to security tools, and are useful for mitigating the challenge of examining vast quantities of network data. Systems that capture all network packets, especially while under attack, create a complete historical archive of required data to meet strict NERC CIP audit requirements. The addition of TAPS creates a tightly integrated, compliant, security solution for critical infrastructure. They give you ready access to data from critical infrastructure systems without adding to the compliance footprint or the need to reprogram network switches. So, when the next supply chain attack happens or new reporting regulations are enforced, you'll have the ability to see whether or not you're affected.
- |
- +1 赞 0
- 收藏
- 评论 0
本文由董慧转载自Keysight,原文标题为:Why Internal Network Security Monitoring (‘INSM’) Begins with Visibility,本站所有转载文章系出于传递更多信息之目的,且明确注明来源,不希望被转载的媒体或个人可与我们联系,我们将立即进行删除处理。
相关推荐
Keysight Enables Microamp Solutions to Accelerate Development of mmWave Radio Units for Private 5G Networks
Keysight Technologies announced that Microamp Solutions has selected Keysight Open Radio Architect (KORA) solutions to meet increasing demand for mmWave radio units in private 5G networks.
Keysight Cyber Training Simulator Provides Universities a Realistic Turnkey Cyber Range
Keysight Technologies has introduced Keysight Cyber Training Simulator (KCTS), a comprehensive, turnkey cyber range that simulates real-world traffic using the company‘s BreakingPoint solution.
Keysight Technologies Acquires Quantum Benchmar, Augmenting Keysight‘s Quantum Portfolio
Keysight Technologies, Inc. , a leading technology company that delivers advanced design and validation solutions to help accelerate innovation to connect and secure the world, announced today it has acquired Quantum Benchmark, a leader in error diagnostics, error suppression and performance validation software for quantum computing.
KEYSIGHT示波器选型表
KEYSIGHT示波器选型,高清晰度示波器、混合信号示波器、手持式示波器等,最大存储器深度120kpts-2Gpts。
产品型号
|
品类
|
描述
|
宽带(MHz、GHz、GBd)
|
最大存储器深度(kpts、Mpts、Gpts)
|
最大采样率(GSa/s、KHz)
|
操作系统
|
类型
|
DSAZ504A
|
示波器
|
Infiniium 示波器:50 GHz
|
50 GHz
|
2 Gpts
|
160 GSa/s
|
Windows 10
|
Real-Time
|
选型表 - KEYSIGHT 立即选型
KEYSIGHT数字万用表选型表
KEYSIGHT数字万用表选型,手持式数字万用表、USB 模块化数字万用表、手持式钳形表等,基本 1 年 DCV 精度0.00%-0.5%。
产品型号
|
品类
|
描述
|
Digits of Resolution
|
基本 1 年 DCV 精度
|
连通性
|
测量功能
|
34470A
|
数字万用表
|
数字万用表,七位半,Truevolt DMM
|
7 ½
|
0.0016%
|
LAN,USB,GPIB (optional)
|
DCV and ACV,DCI and ACI,2- and 4-wire Resistance,Frequency,Capacitance,Diode test,Continuity test,Temperature
|
选型表 - KEYSIGHT 立即选型
Keysight Technologies计算机病毒控制计划
Keysight Technologies Inc. 针对仪器可能连接到计算机或网络而带来的计算机病毒感染风险,实施了多项措施以降低风险。包括在所有业务计算机上实施集中管理的防火墙和防病毒程序,对操作中接触仪器的计算机进行定期扫描,以及在制造、服务、支持、销售、分销和演示环境中实施严格的病毒控制协议。对于病毒感染报告,Keysight 将立即采取措施,包括缓解威胁、追踪病毒来源和范围,并更新内部预防措施以应对新的威胁。
KEYSIGHT
Keysight i3070 09.20pc软件修补程序
Keysight Technologies发布了一款针对i3070测试系统的软件补丁,版本号为09.20pc,发布日期为2018年11月。该补丁适用于装有i3070 09.20p软件的测试系统或工作站,支持Windows 7或Windows 10操作系统。补丁主要解决了多个变更请求,包括改进故障显示、电容补偿、用户界面布局、IPG功能、错误消息、安全性和其他功能增强。安装补丁时需以管理员身份登录,并遵循屏幕上的安装说明。安装后,用户可以通过Korn Shell窗口检查软件版本。
KEYSIGHT
圣罗莎的Keysight
Keysight Technologies在Santa Rosa设有其智力中心,专注于高性能电子和通信测试产品及其相关技术。Santa Rosa位于旧金山北部55英里,太平洋海岸线东部30英里处,是一个艺术、文化和美食的交汇地。该校区拥有1300名员工,占地面积195英亩,提供户外工作区、步行道、运动场、健身设施、食堂和咖啡吧等。此外,Santa Rosa提供丰富的休闲活动,包括骑行、皮划艇、远足、滑雪等,以及世界级的葡萄酒产区。Keysight Technologies是一家平等机会雇主,欢迎有志之士加入。
KEYSIGHT
Keysight N2780/1/2/3B电流探头用户指南
本资料为Keysight N2780/1/2/3B系列电流探头的用户指南。指南详细介绍了探头的规格、特性、安全注意事项、使用方法以及维护保养。内容包括探头的组成部分、测量步骤、安全操作指南等,旨在帮助用户正确使用和维护电流探头,确保测量准确性和安全性。
KEYSIGHT - 高带宽有源电流探头,HIGH BANDWIDTH, ACTIVE CURRENT PROBES,N2783B,N2782B,N2781B,N2780B,N2780B SERIES
用于Keysight EDA模拟器的Keysight EESOF EDA铸造和组件供应商库手册
Keysight EEsof EDA提供广泛的晶圆厂工艺设计套件(PDKs)和组件供应商库,确保高精度设计。与众多晶圆厂和组件制造商合作,提供超过35个RFIC和MMIC晶圆厂PDKs,支持从原理图到设计规则检查(DRC)的完整设计流程。此外,Keysight EEsof EDA还提供超过10万个组件库,包括模拟电路、系统组件、无源组件和高速连接器,以及与HSPICE兼容的模型库,以支持高速串行数据链路设计。
KEYSIGHT - 铸造车间,FOUNDRY
Keysight技术Keysight软件EDA匹配网络阴阳.第1部分
本文探讨了匹配网络的基本概念,包括匹配网络在实现实际性能中的作用,以及如何使用匹配网络来优化电路性能。文章介绍了Smith圆图的使用,以及如何通过L网络匹配技术实现阻抗匹配。此外,还讨论了分布式网络和匹配网络元件值的计算方法。
KEYSIGHT
Keysight N2879A小间距附件套件用户指南
本资料介绍了Keysight N2879A精密接插件套件,适用于Keysight N2870A系列无源探头。套件包含多种附件,便于在精密表面贴装组件上探测和测量信号。内容包括附件详情、安全信息、使用注意事项等,旨在帮助用户正确使用该套件。
KEYSIGHT - 细齿距附件套件,FINE PITCH ACCESSORY KIT,N2879A
Keysight Technologies示波器
Keysight Technologies提供多种型号的示波器,涵盖从20 MHz到90 GHz的带宽范围。产品包括手持式、便携式和台式示波器,具有不同的带宽、通道数和采样率。示波器具备先进的触发技术、深内存和波形处理能力,支持多种应用,如高速串行协议分析和合规性测试。Keysight示波器还提供多种升级选项和配套附件,以满足不同用户的需求。
KEYSIGHT - ACCESSORIES,示波器,OSCILLOSCOPES,配件,探针,PROBES,N8817A,DSO2004A,N8829A,N8805B,254A,N8817B,N8805A,N5415B,DSOX3AUDIO,1052B,DSOX3AERO,404A,U1882B,N1010A,DSOX4FLEX,DSOX6EMBD,V164A,U2700,DSOX6B10T402BW,DSOX2EMBD,N5399D,N8806A,N8818B,U7246A,N8818A,89601B,6004,DSOX3SGM,Z632A,N5399C,DSOX2MASK,N5416B,DSO1024A,3024T,N1045A,N2809A,N6463B,N5416A,3012T,MSOX2024A,MSOX2012A,U7246B,DSOX4WAVEGEN2,Z592A,U7249C,N5461A,1130A SERIES,U7249D,N8815A,N8827B,N8827A,N5461B,1000,DSOX4AUTO,N2808A,6000X,86115D,DSO1014A,90000A,N8803B,N8803A,DSOX4SENSOR,DSOX2WAVEGEN,N8900A,N6466B,90000A SERIES,N6466A,DSOX3COMP,Z254A,Z-SERIES,N8828A,U7236A,U7248B,N5462B,DSOX6USBH,U7236B,N2863B,U7248A,N8816A,Z634A,V-SERIES,9000 SERIES,54754A,3022T,V204A,3034T,N5406A,86116C,MSOX2014A,MSOX2002A,N1055A,N6465B,N6465A,U1600,DSOX6SENSOR,90000,1072B,N8809B,N8809A,N5463B,Z594A,DSOX6VID,N2862B,6002A,N5463A,N7020A,DSOX6FPGAX,V334A,U1604B,N2806A,DSO1004A,N6468A,DSOXEDK,DSOX6B10T404BW,DSOX6B10T254BW,N6456A,DSOX3FLEX,DSOX6AERO,10070D,U7238C,U7238D,DSO1072B,N2873A,1102B,N5464B,N5464A,4000X,4024A,S-SERIES,64996A,DSOX4FPGAX,3032T,N6467B,N8830A,N6467A,N8819A,N8807B,N8807A,N8819B,U1600 SERIES,N2872A,N5465A,6004A,DSOX6AUDIO,DSOX4USBFL,DSO1102B,Z504A,DSOX2COMP,N6175A,U1602B,64997A,86100D-SIM,U1561A,604A,DSOXDVMCTR,N8808A,DSOX3PWR,N5430B,N8808B,E2681A,N2871A,DSOX6MASK,N5430A,E2625A,86100D,N1019A,MSOX2022A,N6174A,86112A,DSOX6JITTER,DSOX6COMP,4022A,1004A,4034A,N6457A,DSOX3AUTO,104A,U1562A,3054T,N2870A,W2650A,DSOX4EMBD,N2894A,DSOX6FLEX,N5467C,1024A,N5467B,N5431B,3000T X-SERIES,N5431A,DSOX4MASK,DSOXDVM,6000X SERIES,4154A,DSOX6B10T252BW,U1583B,DSOX4PWR,N8821B,N8821A,86100,N2826B,N5391A,DSOX6USBFL,86100DU-401,N5391B,86100DU-400,DSOX4USBSQ,N2796A,N2893A,1146B,N5432C,DSO1052B,10074D,N5468A,U2700 SERIES,N1085A,4032A,1014A,V084A,U1560A,N8834A,U7250A,DSOX6B10T602BW,3052T,86100 SERIES,N2783B,N5392B,N5392C,054A,N2795A,33503A,DSOXT3SENSOR,DSOX6USBSQ,Z334A,9000,DSOX6AUTO,2002A,2014A,3104T,V134A,N1084A,204A,N8831A,N2739A,U1610A,N2891A,N2782B,N5393D,N5393E,2004A,DSOX2AUTO,DSOX3TAUTO,DSOX4AUDIO,4054A,DSO2022A,N1083A,N8820A,N8832A,N2738A,N8820B,N2781B,N8837A,U1591A,N5411B,DSO1152B,N1010A-SIM,DSOX4USBH,DSOX2SGM,2000X,3102T,N1014A,86105D,86105C,2012A,2024A,86117A,N6460B,86100D-300,N1082A,U7243B,N8801B,N8801A,U1620A,U7231B,804A,U7231C,DSOX3VID,3000TX,N2780B,86100D SERIES,86100D DCA-X,DSOX6WAVEGEN2,N5400A,N5412D,1130A,Z204A,2000 X-SERIES,DSOX3EMBD,MSOX2004A,V254A,4000 X-SERIES,86118A,N8814B,N1081A,N8802A,DSO2012A,DSO2024A,4052A,N8802B,DSOX4AERO,1000 SERIES,6000 X-SERIES,DSOX3MASK,DSOX6B10T604BW,E2688A,DSOX4VID,N2791A,N5384A,N5413C,N5413B,N1012A,N2750A-52A,N6462B,N6462A,DSOXT3DVMCTR,4104A,2022A,86100D-200,3000AX,86107A,U7233B,N8835A,DSOX6PWR,86100D-202,U7245A,U7233A,DSOX3WAVEGEN,N8823A,86100D DCA-X SERIES,DSOX4COMP,N5397A,10076C,1152B,N5414B,N6461B,3014T,N6461A,86108B,N8824A,N8836A,83496B,N8812B,DSO2002A,N8824B,N8812A,DSO2014A,U7232E,4000X SERIES,U7232C
Keysight EESOF EDA:有源混频器设计
本文介绍了使用Keysight EEsof EDA的Advanced Design System (ADS)设计低功耗单晶体管有源混频器的方法。内容包括设计步骤、仿真设置和数据展示。文章详细描述了电路规格、器件选择、设备模型验证、偏置网络设计、混频器匹配电路设计、混频器转换增益与LO驱动电平的关系、混频器转换增益与RF信号电平的关系以及混频器布局创建等过程。
KEYSIGHT - MMBR941
Keysight PXIe机箱系列M9010A、M9019A、M9046A启动指南
本指南介绍了Keysight PXIe机箱的安装、启动和基本操作。涵盖了机箱的特性和功能、硬件和软件要求、嵌入式控制器安装、远程控制器连接、软件安装、使用Keysight Connection Expert和机箱软前面板(SFP)验证操作,以及安装和验证Keysight模块的概述。指南还提供了安全注意事项、术语解释和机箱发货验证步骤。
KEYSIGHT - PXIE机箱,PXIE CHASSIS,M9010A,M9046A,M9019A
现货市场
服务
提供是德(Keysight),罗德(R&S)测试测量仪器租赁服务,包括网络分析仪、无线通讯综测仪、信号发生器、频谱分析仪、信号分析仪、电源等仪器租赁服务;租赁费用按月计算,租赁价格按仪器配置而定。
提交需求>
配备KEYSIGHT网络分析仪,可测量无线充电系统发射机/接收机线圈的阻抗,电感L、电阻R、电感C以及品质因数Q,仿真不同充电负载阻抗下的无线充电传输效率。支持到场/视频直播测试,资深专家全程指导。
实验室地址: 深圳 提交需求>
登录 | 立即注册
提交评论