Stuxnet Video: Mitigation strategy outlined
Part II of a video series on the Stuxnet worm one strategy that can help mitigate attacks like Stuxnet from infiltrating your system.
Security experts remain locked into researching the Stuxnet worm. They learned how it can infiltrate a system, but now experts are learning more about mitigation strategies that can keep the nasty worm out.
Joel Langill, a security consultant and host of a website at SCADAhacker.com devoted to control system security shows in Part II of a video series on the Stuxnet worm one strategy that can help mitigate attacks like Stuxnet from infiltrating your system.
This demo focuses on the Software Restriction Policy (SRP) within the Windows operating environment.
“Introduced in 2000 as part of Windows XP, SRP helps protect systems from unknown and possibly dangerous code,” Langill said.
|Search the online Automation Integrator Guide|
Case Study Database
Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.
These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.
Click here to visit the Case Study Database and upload your case study.