En esta sección se ofrecen contenidos de interés para los profesionales en entornos TO que se ocupan de administrar y mantener aplicaciones, sistemas, equipos de redes, gestión de usuarios y accesos, servicios, soporte técnico y respuesta a incidentes de TO.

Las tareas de estos profesionales son muchas veces análogas a las de los profesionales de TI, con la salvedad de que tratan con sistemas en los que la disponibilidad es a menudo más crítica que la confidencialidad.

SweynTooth: Bluetooth in the spotlight

Posted on 17/12/2020, by
INCIBE (INCIBE)
Sweyntooth: Bluetooth in the spotlight
Wireless communications encompass a set of protocols that are widely used in some industrial sectors. In particular, building automation is based on these protocols, mainly using the BACNET and Lontalks protocols, but also making use of new ZigBee and Bluetooth based devices for IIoT. This article will provide information on SweynTooth, a set of vulnerabilities that affect Bluetooth technology.

Cyberchallenges to security in industrial robotics

Posted on 19/11/2020, by
INCIBE (INCIBE)
cyberchallenges to security in industrial robotics
Around 4 million robots are expected to be introduced in the area of industry over the next five years. This is on top of the evolution towards industry 4.0, in which industrial robotics is crucial, and which is now consolidated in any industrial process, from the manufacturing industry to any large-area warehouse. In that industrial transformation, barriers must be applied to ensure the integrity of the components and to prevent incidents in plants.

Security in the GOOSE protocol

Posted on 06/08/2020, by
INCIBE (INCIBE)
GOOSE
After the articles “IEC 61850 Standard, all for one and one for all” and “Multicast security in IEC 61850”, it is useful to add more information about the cybersecurity guidelines set out in the IEC 62351 standard with respect to the GOOSE protocol. An explanation will be made of the operation of the protocol, the weaknesses it presents and the appropriate security measures to protect it against possible attackers.

NTP, SNTP and PTP: what time synchronization do I need?

Posted on 05/03/2020, by
INCIBE (INCIBE)
NTP, SNTP and PTP
Time synchronization in industrial devices is a critical factor. In terms of time, industrial processes and the programming logic of industrial devices have specific needs. These may require specific accuracy that determines the need to use one protocol or another, as well as dependencies on cost or on the network infrastructure itself. Explaining the main differences is key when using one or another in industrial infrastructures. Just as each protocol has different nuances, there are certain differences to be taken into account within security.

Safety recommendations for electric vehicle charging stations

Posted on 06/02/2020, by
INCIBE (INCIBE)
station
Over the last few years we have seen how electric vehicles have experienced a boom in terms of their development and retail and, along with them, the deployment of their charging points. In this article we will discuss a series of requirements, in terms of security, that should be implemented in these charging stations in order to ensure their security.

Secure use of communications and protocols at charging stations

Posted on 09/01/2020, by
INCIBE (INCIBE)
communications and protocols
Electric charging stations are increasingly used in urban furniture in cities. Electric cars and their need to be charged are a reality. Because of this, there is an increase in supply points that depend on specific protocols and communications for these stations.

Attacking a BusyBox, the small Gaulish village

Posted on 05/09/2019, by
INCIBE (INCIBE)
Busybox
A BusyBox is software or a program that combines several functionalities in a small executable. This small tool was created for use in integrated operating systems with very limited resources, and they are usually used in control systems. But, as in all tools, you have to know what security level they have and if it can be improved.

Mitigating availability problems in the industry

Posted on 19/07/2018, by
INCIBE (INCIBE)
Problems in the industry
Given that availability is always a critical point to take into account for within industrial environments, it is necessary to prevent the attacks that denial of services cause and that affect these environments. The means of giving way to a denial of service can be diverse, much like the means of mitigating these problems. This article will review all of these points, as well as the way in which the risks derived from these attacks can be reduced.