ibm x force signatures related to ics related products
play

IBM X-Force signatures related to ICS related products and protocols - PowerPoint PPT Presentation

OT Seize the last chance of preventing OT Cyberattack proactively Gwen Hsieh Sr. Offering Manger, IBM Security IBM X-Force signatures related to ICS related products and protocols


  1. 如何即時固守 OT 工業控制的 最後一道資安防線 Seize the last chance of preventing OT Cyberattack proactively Gwen Hsieh Sr. Offering Manger, IBM Security

  2. IBM X-Force signatures related to ICS related products and protocols Provides the protection for more than 1,000 high-risk and critical vulnerabilities or attacks. Signatures Severity • Attack signatures for specific vulnerabilities Scada_IGSS_Collection_Chunk_Overflow High in equipment Scada_IGSS_Collection_Traversal Medium Honeywell Scada_IGSSdataServer_Command_Overflow High Siemens PCL Scada_IGSSdataServer_LogText_Format_Strin High g Schneider Electric Scada_IGSSdataServer_RMS_Overflow High Interactive Graphical SCADA System Scada_IGSSdataServer_StdReport_Overflow High KingView / WellinTech Scada_IGSSdataServer_Dir_Traversal Medium RealWin SCADA System / RealFlex LiveData ICCP Server / Live Data Scada_KingView_History_Generic_Overflow High Scada_KingView_History_Opcode3_Overflow High Realwin_Scada_Fcinfotagsetcontrol_Bo High • Attack signatures for ICS, PLC, SCADA Realwin_Scada_HMI_Integer_Overflow High Realwin_Scada_HMI_Multiple_Overflow High protocol anomalies Realwin_Scada_String_Overflow High Distributed Network Protocol (DNP) Scada_DNP_Unknown_Protocol (*) Low Modbus Scada_DNP_Malformed (*) Medium DCOM - Distributed Common Object Model protocol Scada_ICCP_Long_TPDU High Scada_Modbus_IncorrectLength (*) Medium Scada_Modbus_TooLarge (*) Medium • Attack signatures for DNP, Modbus, DCOM DCOM_Scada_Opc_Bo (*) High protocols such as query, restart, etc. Scada_Citect_ODBC_BO High

  3. Thank you

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend