Home » Research  |  IT vs OT |  When Facing The Insider Threat What Happend | Free Software vs Open Source | Ask me |

Priscilla F. Harmanus · 1993 from the Netherlands · last update: 27 may 2020

How I discovered Free Software and met RMS 

How to install proprietary closed software in Ubuntu

This website focuses on human knowledge and cyber security awareness in the Industrial control systems and explains the gap and the differences between IT and OT environments and why this information is critical and important.

This study focuses on the threat to cyber security awareness in small and medium businesses and startup companies in the digital information age of today.  Read the full story: How It Is When Facing The Insider Threat.


the insider
WHO did you see | WHAT did you see | WHEN you saw it | WHERE it occurred | WHY it's suspicious
** CAUTION ** CAUTION ** CAUTION ** CAUTION ** CAUTION


Cybersecurity voor Industrial Automation
where the physical and digital world come together


SCADA CYBERSECURITY POSTER #archived  Saved 1 time April 29, 2020.

to be continued
to be continued

 


Home » Research  |  IT vs OT |  When Facing The Insider Threat What Happend | Free Software vs Open Source | Ask me |


Binnen de industrie is het personeelstekort het grootst bij bedrijven die werkzaam zijn in de machine-industrie en de reparatie en installatie van machines.

Within the industry, the personnel shortage is highest at companies that are active in the machine industry and the repair and installation of machines.


 

  • Posted on: 2020

  • Posted in: Critical InfrastructureSecurity

  • Posted by: Priscilla F. Harmanus
  • Tags:  Critical InfrastructureCyber threats, energy highway intelligent transportation systems utilities water Industrial Control Systems ICS SCADA OT IT Information Technology Operational Technology - internal external network communication system intranet extranet internet offline online stand alone legacy systems hardware software program application third party web browser services enterprise machine environment vital circus field horror linux halloween unix kernel user memory processor code graphical execute write read execute modules input output ones and zeros library database file server print desktop distributie ubuntu linux gnu windows dos command prompt commando command line knowledge package source proprietary open source suspicious activity terrorism aircraft air plain gps location coordination automatic cloud air motor spin generator black box computer fire maintenance safety inspection  telecommunication technician social engineering mechanical electronic electric autism numbers bits and bytes GPL General Public Licenses lunix layer tux pinguïn zealot high skilled technical non-technical skillset attack vector assets power plant control bug zero days error detect response companies small businesses local family office grandma savvy grandkid son dad mom bro antenna radio container send receive signal packet wiring cables put off on start stop run flow switch light bulb process lateral movement bouw recycling gemeente afval bedrijfsafval papier documenten shredder sensor lamp schemerschakelaar kantoor printer kantoorprinter fax server ip adres name server DNS domain name system whois lookup domain name TLD top level domain subdomain country code level domain .nl .com .net .org .info .club .biz Netherlands network organization information business sex porn KPN politie ncsn.nl checklist factsheet intrusion detection initial access manufacture producer developer internal spear-phishing - family members - email account credentials - trust - time - money - cost - efficiency - computer - run - display - touch screen - monitor - frequency converter - dumpster diving - id theft - e-waste - data - old - outdated - unsupported - version - windows XP - windows nt - linux embedded - shredder - school - education - learn - social networking - user names - data breaches - information leak - dark net - deep web - local - small - equipment - electronic devices - error - failure - cascade - smart grid - monitoring - power plant - vehicle - track - risk - back up - PLC - programmeerbare logische controller - programmable logic control - programmeertaal - programmastructuur - noob - novel - niece - Lotus 123 - Pascal - DBase - Cursus - developing - duurzaamheid - samenwerken - bedrijven - innovatie - slot - dak - onbewust - doelgericht - uitdaging - mailing list - XeroX - license agreement - handshake - protocol - richtlijn - energiesectoren - aanval - power plant - car router modem switch hub equipment hard drives hard disk stroomvoorziening antenne voltage power weegbrug weegserver kastje recycling weeghok wegen HVAC meter celsius recycling camera video surveillance location operating system processor geheugen programma BIOS chip witgoed bruingoed onderhoud patch features bugs installation distro distribution distributie Richard Stallman Free Software Foundation Free Software Movement fsf.org gnu.org stallman.org GNU is not unix kernel Linus Torvalds Amazon Books Delete Spyware transportation manufacturing energy utilities air gap integrated integration integrator operator operation operational technology sectors:

    Chemical, Commercial Facilities, Communications, Critical Manufacturing, Dams, the Defense Industrial Base, Emergency Services, Energy, Financial Services, Food and Agriculture, Government Facilities, Healthcare and Public Health, Information Technology, Transportation Systems, Water and Wastewater Systems, and Nuclear Reactors, Materials, and Waste.

    Power station nuclear plants floor convergence

  •  Ordinal numbers  1st – the first 17th – the seventeenth  2nd – the second 18th – the eighteenth 3 rd – the third 19th – the nineteenth  4th – the fourth 20th – the twentieth  5th – the fifth 21st – the twenty-first  6th – the sixth 22nd – the twenty-second  7th – the seventh 23rd – the twenty-third  8th – the eighth 24th – the twenty-fourth  9th – the ninth 25th – the twenty-fifth  10th – the tenth 26th – the twenty-sixth  11th – the eleventh 27th – the twenty-seventh  12 - the twelfth 28th – the twenty-eighth  13th – the thirteenth 29th – the twenty-ninth  14th – the fourteenth 30th – the thirtieth  15th – the fifteenth 31st – the thirty-first  16th – the sixteenth


Security and Privacy
cryptography
digital signatures
encryption
key management
message authentication
post-quantum cryptography
random number generation
secure hashing
cyber supply chain risk management
general security & privacy
identity & access management

access authorization
access control
authentication
Personal Identity Verification
public key infrastructure
privacy
personally identifiable information
privacy engineering
risk management
categorization
continuous monitoring
controls
controls assessment
privacy controls
security controls
risk assessment
roots of trust
system authorization
threats
advanced persistent threat
botnets
information sharing
intrusion detection & prevention
malware
vulnerability management
security & behavior
accessibility
behavior
usability
security measurement
analytics
assurance
modeling
testing & validation
security programs & operations
acquisition
asset management
audit & accountability
awareness training & education
configuration management
contingency planning
incident response
maintenance
media protection
patch management
personnel security
physical & environmental protection
planning
program management
security automation
systems security engineering
trustworthiness
 reliability
 resilience
 safety



 Applications
 communications & wireless
 cyber-physical systems
 cybersecurity education
 cybersecurity framework
 cybersecurity workforce
 enterprise
 forensics
 industrial control systems
 Internet of Things
 small & medium business
 telework
 voting

Technologies 
artificial intelligence
big data
biometrics
blockchain
cloud & virtualization
combinatorial testing
complexity
hardware
circuits
personal computers
sensors
mobile
networks
email
firewalls
internet

quantum information science
servers
smart cards
software & firmware
BIOS
databases
operating systems
 storage

Sectors
aerospace
energy
smart grid



 financial services
 healthcare
 hospitality
 manufacturing
 public safety
 retail
 telecommunications
 transportation


Laws and Regulations
executive documents

Comprehensive National Cybersecurity Initiative
Cybersecurity Strategy and Implementation Plan
Cyberspace Policy Review
Executive Order 13636
Executive Order 13702
Executive Order 13718
Executive Order 13800
Federal Cybersecurity Research and Development Strategic Plan
Homeland Security Presidential Directive 7
Homeland Security Presidential Directive 12
OMB Circular A-11
OMB Circular A-130

laws
Cyber Security R&D Act
Cybersecurity Enhancement Act
E-Government Act
Energy Independence and Security Act
Federal Information Security Modernization Act
First Responder Network Authority
Health Insurance Portability and Accountability Act
Help America Vote Act
regulations
Federal Acquisition Regulation
 Activities and Products
annual reports
conferences & workshops
reference materials
standards development

Home » Research  |  IT vs OT |  When Facing The Insider Threat What Happend | Free Software vs Open Source