GarrettCom Ethernet Networks and Web Management manual References

Page 7

Ethernet switch level, assisting readers in appreciating the multiple levels of industrial network security and the overall complexity required to achieve a highly secure distributed communications system.

REFERENCES

Bond, Andrew, “Security Could Put Process Control Under IT”, ControlGlobal.com, The Online Resource of Control Magazine, April 11, 2005, http://www.controlglobal.com/articles/2005/293.html.

Byres, Eric, “Security Technologies for Manufacturing and Control Systems”, ANSI/ISA-TR99.00.01-2004, The Instrumentation, Systems and Automation Society, Research Triangle Park, North Carolina, April, 2004.

Case, J, Mundy, R, Partain, D, Stewart, B, “Network Working Group Request for Comments: 3410”, The Internet Society, Reston, Virginia, December, 2002

Herbert, Dan, “Process Control Security”, ControlGlobal.com, The Online Resource of Control Magazine, October 23, 2004, http://www.controlglobal.com/articles/2004/292.html.

Melton, Ron, Fletcher, Terry, Earley, Matt, “System Protection Profile – Industrial Control Systems”, Version 1.0, National Institute of Standards and Technology, Gaithersburg, Maryland, April, 2004.

Merritt, Rich, “What’s in Your Server”, ControlGlobal.com, The Online Resource of Control Magazine, February 25, 2005, http://www.controlglobal.com/articles/2005/347.html.

Singer, Brian, “Security Standards: Those Available Today and Future Directions”, Proceedings of ISA President’s Fall Meeting, Houston Texas, October 4, 2004.

Webb, Bob, “Integrating Electronic Security into the Manufacturing and Control Systems Environment”, ANSI/ISA-TR99.00.02-2004, The Instrumentation, Systems and Automation Society, Research Triangle Park, North Carolina, April, 2004.

6

Image 7
Contents GarrettCom, Inc 47823 Westinghouse Drive Fremont, CA SECURITY OVERVIEW INTRODUCTIONINDUSTRIAL SECURITY INITIATIVES ETHERNET SECURITY - THE SWITCH VENDOR’S OPPORTUNITYPage ETHERNET SECURITY STANDARDS BEYOND THE SWITCH REFERENCES APPENDIX A BRIEF OVERVIEW OF SP99 AND PCSRFsecurity vulnerabilities addressed by this technology typical deployment known issues and weaknessesassessment of use in the manufacturing and control system environment SNMP APPENDIX B SECURITY STANDARDS IN USE IN ETHERNET INSTALLATIONSSSL - Secure Socket Layer MAC Addressing TLS - Transport Layer SecurityRemote Security