Adam Crain explains ICS Protocols in 30 minutes. To meet this challenge he focuses on the purpose of these protocols, different key protocol features and how they apply to various industry sectors, the differences between DCS and SCADA protocols and more. It’s not bits and bytes and very accessible.
1) What protocol or protocol characteristics would be appropriate for a chemical manufacturing plant ICS? What protocol or protocol characteristics would be appropriate for a pipeline ICS?
2) What is the difference between “insecure by design” and “insecure by implementation” and which of these does an asset owner have control over?
3) Should the ICS community add security to ICS protocols by wrapping in TLS, bolt-on security, or new, purpose built secure ICS protocols?
We have an ICS Protocols playlist from past S4 events. It includes sessions on Secure Modbus, Secure CIP EtherNet/IP, SSP-21, etc. It also includes a Wrap It In TLS / Custom Protocol debate from S4x18.