Industrial Cyber Security




 What is Application Whitelisting?
Industrial Cyber Security

      • Application Whitelisting is an emerging approach to
        combating viruses and malware

      • The basic concept is to create a list that permits only
        good known files to execute, rather than attempting to
        block malicious code and activity

      • First attempt to Whitelist approach is thru email
        management – eliminating spam and allowing delivery
        of messages only wanted




2
Industrial Cyber Security

      Whitelisting vs. Blacklisting

      • Blacklisting blocks or removes known harmful software

      • Blacklisting leaves a time gap between when new
        malware is detected and its inclusion in the latest
        security update

      • During this time gap, opportunity exists for breaches to
        take place. Malicious code exploit the vulnerability

      • With these increasing threats, Whitelisting provides
        additional defense

3
Industrial Cyber Security

      The Impact on the Control Systems Industry

      • Breaches to industrial cyber security can range from
        annoying to financially harmful and even approach
        levels of national security

      • For control systems, these exploitations can involve
        safety issues with the potential loss of life or damage to
        the environment

      • Risks represent solid reasons to white list. Whitelist
        application is designed to prevent unauthorized
        applications from running


4
Industrial Cyber Security

      The Impact on the Control Systems Industry

      • With industrial cyber security, whitelisting solutions must
        undergo same level of scrutiny that was used on anti-
        virus solutions

      • With industrial cyber security, the focus of Business IT is
        different. The CIA’s (confidentiality, integrity and
        availability) level of importance is reversed

      • Whitelisting was designed and architected for the
        enterprise environment, industrial control systems
        industry has to overcome unique challenges


5
Industrial Cyber Security

      The Impact on the Control Systems Industry

      • List of challenges applies not only to whitelisting but to
        most mechanisms deployed for industrial control
        systems

      • All industrial cyber security solutions must extensively
        test new technologies on core control systems




6
Industrial Cyber Security

      About the Author

      Rick Kaun is global industrial IT solutions business
      development lead at Honeywell Process Solutions, a
      pioneer in automation control for more than 35 years. For
      more information about Industrial Cyber Security
      Solutions, please
      visit https://www.honeywellprocess.com/en-
      US/explore/services/industrial-it-
      solutions/Pages/default.aspx today.




7

More Related Content

PPSX
Security policies
PPT
Security policy
PPTX
Network security
PPTX
Enterprise Security Architecture
PDF
DLP Systems: Models, Architecture and Algorithms
PDF
5. Identity and Access Management
PPTX
Zero Trust
PDF
11 palo alto user-id concepts
Security policies
Security policy
Network security
Enterprise Security Architecture
DLP Systems: Models, Architecture and Algorithms
5. Identity and Access Management
Zero Trust
11 palo alto user-id concepts

What's hot (20)

PPTX
Identity and Access Management (IAM)
PPTX
Security Policies and Standards
PDF
Access Control Presentation
PPTX
System security
PPTX
Security and privacy in cloud computing.pptx
PDF
Cloud security
PDF
Enterprise Security Architecture for Cyber Security
PPTX
4_Session 1- Universal ZTNA.pptx
PPTX
Zero Trust Framework for Network Security​
PDF
HITRUST 101: All the basics you need to know
PDF
Types of Threat Actors and Attack Vectors
PPTX
SIEM - Your Complete IT Security Arsenal
PPT
Introduction to Cyber Security
PDF
Zero Trust Model Presentation
PPTX
Enterprise Security Architecture Design
DOC
Cloud security
PPTX
CISSP - Chapter 4 - Network Topology
PDF
Identity & Access Management by K. K. Mookhey
PPT
Information Security Policies and Standards
PDF
IDENTITY ACCESS MANAGEMENT
Identity and Access Management (IAM)
Security Policies and Standards
Access Control Presentation
System security
Security and privacy in cloud computing.pptx
Cloud security
Enterprise Security Architecture for Cyber Security
4_Session 1- Universal ZTNA.pptx
Zero Trust Framework for Network Security​
HITRUST 101: All the basics you need to know
Types of Threat Actors and Attack Vectors
SIEM - Your Complete IT Security Arsenal
Introduction to Cyber Security
Zero Trust Model Presentation
Enterprise Security Architecture Design
Cloud security
CISSP - Chapter 4 - Network Topology
Identity & Access Management by K. K. Mookhey
Information Security Policies and Standards
IDENTITY ACCESS MANAGEMENT
Ad

Viewers also liked (20)

PDF
The Firewall Policy Hangover: Alleviating Security Management Migraines
PPTX
Defense against botnets
PPTX
Tune in for the Ultimate WAF Torture Test: Bots Attack!
PPTX
Digital strategy - security
DOCX
Funny miss la sen hand sketching
PDF
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
PDF
Cyber Security: Protecting Today's Mission Critical Public Safety Networks
PDF
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PDF
Cyber Warfare vs. Hacking (in English)
PDF
Internet and Society: Internet Use And Digital Divide
PPTX
Cyber security , an Analysis of State Security in Sri Lanka
PPTX
Cyber Security Awareness Program
PDF
Cyber Security Awareness (Reduce Personal & Business Risk)
PDF
NACCTFO Cyber Security Presentation 2014 New Orleans
PDF
Prensentasi indosat
PDF
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
PDF
Greater China Cyber Threat Landscape - ISC 2016
PDF
Cyber Security Strategies and Approaches
PPTX
Cyber security awareness for end users
PPT
Cyber security awareness training by cyber security infotech(csi)
The Firewall Policy Hangover: Alleviating Security Management Migraines
Defense against botnets
Tune in for the Ultimate WAF Torture Test: Bots Attack!
Digital strategy - security
Funny miss la sen hand sketching
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
Cyber Security: Protecting Today's Mission Critical Public Safety Networks
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
Cyber Warfare vs. Hacking (in English)
Internet and Society: Internet Use And Digital Divide
Cyber security , an Analysis of State Security in Sri Lanka
Cyber Security Awareness Program
Cyber Security Awareness (Reduce Personal & Business Risk)
NACCTFO Cyber Security Presentation 2014 New Orleans
Prensentasi indosat
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
Greater China Cyber Threat Landscape - ISC 2016
Cyber Security Strategies and Approaches
Cyber security awareness for end users
Cyber security awareness training by cyber security infotech(csi)
Ad

Similar to Industrial Cyber Security: What is Application Whitelisting? (20)

PDF
Industrial Control Security USA Sacramento California Oct 13/14
PDF
Industrial Control Cyber Security Europe 2015
PDF
ICS_WhitePaper_Darktrace
PDF
Darktrace white paper_ics_final
PDF
Cyber war scenario what are the defenses
PDF
Cyber security colombo meetup
PPTX
Critical Infrastructure Security by Subodh Belgi
PDF
Conférence ENGIE ACSS 2018
PDF
SMi Group's Oil & Gas Cyber Security conference & exhibition
PDF
Ics white paper report 2017
PDF
2021. Top Cyber News MAGAZINE Daniel Ehrenreich October 2021
PDF
Top Cyber News Magazine Daniel Ehrenreich
PPTX
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
PDF
Booz Allen Industrial Cybersecurity Threat Briefing
PPT
Control system including PLC cybersecurity
PDF
Cyber Security: Differences between Industrial Control Systems and ICT Approach
PDF
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
PDF
Industrial Control Systems Security and Resiliency Practice and Theory Craig ...
PPTX
InduSoft Speaks at Houston Infragard on February 17, 2015
PDF
CyCron 2016
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Cyber Security Europe 2015
ICS_WhitePaper_Darktrace
Darktrace white paper_ics_final
Cyber war scenario what are the defenses
Cyber security colombo meetup
Critical Infrastructure Security by Subodh Belgi
Conférence ENGIE ACSS 2018
SMi Group's Oil & Gas Cyber Security conference & exhibition
Ics white paper report 2017
2021. Top Cyber News MAGAZINE Daniel Ehrenreich October 2021
Top Cyber News Magazine Daniel Ehrenreich
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Booz Allen Industrial Cybersecurity Threat Briefing
Control system including PLC cybersecurity
Cyber Security: Differences between Industrial Control Systems and ICT Approach
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
Industrial Control Systems Security and Resiliency Practice and Theory Craig ...
InduSoft Speaks at Houston Infragard on February 17, 2015
CyCron 2016

Recently uploaded (20)

PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PPTX
Internet of Everything -Basic concepts details
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
giants, standing on the shoulders of - by Daniel Stenberg
A symptom-driven medical diagnosis support model based on machine learning te...
MuleSoft-Compete-Deck for midddleware integrations
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
Electrocardiogram sequences data analytics and classification using unsupervi...
LMS bot: enhanced learning management systems for improved student learning e...
Ensemble model-based arrhythmia classification with local interpretable model...
Internet of Everything -Basic concepts details
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
NewMind AI Weekly Chronicles – August ’25 Week IV
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Connector Corner: Transform Unstructured Documents with Agentic Automation
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
CEH Module 2 Footprinting CEH V13, concepts
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf

Industrial Cyber Security: What is Application Whitelisting?

  • 1. Industrial Cyber Security What is Application Whitelisting?
  • 2. Industrial Cyber Security • Application Whitelisting is an emerging approach to combating viruses and malware • The basic concept is to create a list that permits only good known files to execute, rather than attempting to block malicious code and activity • First attempt to Whitelist approach is thru email management – eliminating spam and allowing delivery of messages only wanted 2
  • 3. Industrial Cyber Security Whitelisting vs. Blacklisting • Blacklisting blocks or removes known harmful software • Blacklisting leaves a time gap between when new malware is detected and its inclusion in the latest security update • During this time gap, opportunity exists for breaches to take place. Malicious code exploit the vulnerability • With these increasing threats, Whitelisting provides additional defense 3
  • 4. Industrial Cyber Security The Impact on the Control Systems Industry • Breaches to industrial cyber security can range from annoying to financially harmful and even approach levels of national security • For control systems, these exploitations can involve safety issues with the potential loss of life or damage to the environment • Risks represent solid reasons to white list. Whitelist application is designed to prevent unauthorized applications from running 4
  • 5. Industrial Cyber Security The Impact on the Control Systems Industry • With industrial cyber security, whitelisting solutions must undergo same level of scrutiny that was used on anti- virus solutions • With industrial cyber security, the focus of Business IT is different. The CIA’s (confidentiality, integrity and availability) level of importance is reversed • Whitelisting was designed and architected for the enterprise environment, industrial control systems industry has to overcome unique challenges 5
  • 6. Industrial Cyber Security The Impact on the Control Systems Industry • List of challenges applies not only to whitelisting but to most mechanisms deployed for industrial control systems • All industrial cyber security solutions must extensively test new technologies on core control systems 6
  • 7. Industrial Cyber Security About the Author Rick Kaun is global industrial IT solutions business development lead at Honeywell Process Solutions, a pioneer in automation control for more than 35 years. For more information about Industrial Cyber Security Solutions, please visit https://www.honeywellprocess.com/en- US/explore/services/industrial-it- solutions/Pages/default.aspx today. 7