Had to finish last session after holiday.Thank you for archive! Very informative (and scary) course.
@lynbr2(2:45:42). Agree. In my limited experience, management often looks at initial hardware and installation costs and gives less thought (and budget) to the future software and manpower required to maintain a network.
@dtucky - All things considered, DHCP vs. static IP, in terms of security trade-off is not that significant. It only prevents someone easily getting an IP once they are physically on your network and even with static IP assignment, the hacker can figure out a valid IP. It's just another "layer" of added security.
@huntwork - block the IP addresses in question. (i.e. IP Black listing). Not much you can do legally do to the vast caveates with cyber security. Sometimes there is legal recourse but it's so difficult to achieve.
Range of RFID sniffers depends on the power they are given. Higher powered sniffers can read from longer ranges. Yes they can read through clothing. Metel lined wallets and sleeves are recommended as a counter.
RFID is at the doors of every depatment clothing store. They absolutely can see through layers of clothing put on in the try-out booth. There are specially lined bags that shoplifters use to hide the tags from the sniffers at the door.
No IT group, we used VIPRE, common sense and a 3rd prty contractor to protect our systems ... no real IT security or IT department ... needless to say we were vulnerable and got hit a few times since we didn't have any experts in IT Sec... thansk for the repsentation it was awesome!
This is a great question because DHCP vs. IP security have security trade-offs. DHCP might be easier to manage, but anyone can plug in and get an address. That being said, static IP addresses can be a nightmare to manage in larger orgs. It should not cost anything when using the RFC reserved addresses such as 10.x.x.x, 192.168.x.x, and 172.16.x.x.... those are inside IP addresses that are free to use internally
dtucky asked: I heard you say that DHCP should be avoided in favor of fixed IP addresses (audio was cutting out a bit but that's what I think I heard). In your experience, is this followed in practice today for devices on SCADA networks? The limited feedback I hear in my job is that DHCP support in devices is desired, to help lower installation costs. Do you see this as a significant security concern?
I heard you say that DHCP should be avoided in favor of fixed IP addresses (audio was cutting out a bit but that's what I think I heard). In your experience, is this followed in practice today for devices on SCADA networks? The limited feedback I hear in my job is that DHCP support in devices is desired, to help lower installation costs. Do you see this as a significant security concern?
my systems are not currently connected, and have a proprietary programming interface (no USB, no Windows, No Linux etc.) But I am looking forward to possible future connection strategies, and what is involved
Hi all -Audio is live! If you don't see the audio bar at the top of the screen, please refresh your browser. It may take a couple tries. When you see the audio bar, hit the play button. If you experience audio interruptions and are using IE, try using FF or Chrome as your browser. Many people experience issues with IE. Also, make sure your flash player is updated with the current version. Some companies block live audio streams, so if that is the case for your company, the class will be archived on this page immediately following the class and you can listen then. People don't experience any issues with the audio for the archived version.
-The streaming audio player will appear on this web page when the show starts at 2 PM Eastern time today. Note however that some companies block live audio streams. If when the show starts you don't hear any audio, try refreshing your browser. If that doesn't work, try using Firefox or Google Chrome as your browser. Some users experience audio interruptions with IE. If that doesn't work, the class will be archived immediately following our live taping.
Getting slides. When you call for product support, remember the voice that says: "This call may be recorded for quality assurance?" That's your attack vulnerability. The worm enters the audio recording and the help desk is attacked.
Transfers the control of a large number of motion axes from one numerical control kernel to another within a CNC system, using multiple NCKs, and enables implement control schemes for virtually any type of machine tool.
Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.