Views
1 year ago

2017-11 How to use cyberattacks to increase security

  • Text
  • Cyberattacks
  • Honeypot
  • Industrial
  • Auvesy
  • Landau
  • Pfalz
  • Switches
  • Hacker
  • Attacks
  • Fichtenstrasse

How

How to use cyberattacks to increase security Together with a disciplined version control system that includes clear and complete documentation (who changed what, where, when and why), versiondog's automatic backup and compare functions are important components of an effective cybersecurity strategy. Each new backup is compared with the previous backup, and in the case of our honeypot switch, nothing should have changed. If a change is found, the system administrator is alerted and can take the appropriate action. And if the worst comes to the worst and disaster recovery is necessary, the last non-manipulated version of any device data or control program can be located and restored quickly and with confidence. Cyberattacks on industrial facilities and public utilities have, unfortunately, become a reality. Because of the complexity of these largely automated environments, only a multi-layered approach can effectively protect against potentially serious losses. As part of this defence in depth strategy, honeypot scenarios such as this are one component of many – a little more safety, certainty and security for us and the environment. www.versiondog.de Author: Dr. Thorsten Sögding Head of Business Development AUVESY GmbH 76829 Landau in der Pfalz Tel. +49 6341 6810-560 Thorsten.Soegding@auvesy.de Co-author: Stefan Schnackertz Business Development AUVESY GmbH 76829 Landau in der Pfalz Tel. +49 6341 6810-442 Stefan.Schnackertz@auvesy.de © AUVESY GmbH · Fichtenstrasse 38 B · 76829 Landau in der Pfalz · Germany Last updated: 20 Nov 2017 Page 4 of 4

versiondog Factsheets collection

© Copyright 2018 AUVESY GmbH - All rights reserved.