Cyber Security FIGHTING CYBER Attacks within FRONTIER PITTS CONTROLS Systems

An anti-tamper digital key into its Electronic Control Cabinets for gates, roadblockers and bollards to stop unauthorised bridging of circuits in an attempt to force entry or activate the security products will be introduced by Frontier Pitts.

The device, known simply as KP1, will stop unauthorised attempts to override Frontier Pitts electronic PLCs should access be gained into the security control cabinets. It will stop attempts to gain access to a site by electronic override using a laptop or manually overriding open or close circuits on its PAS 68 impact tested Anti Terra range of products, via the control cabinet.

OLYMPUS DIGITAL CAMERA

By employing the KP1, Frontier Pitts have ushered in a new era in perimeter security products utilising an in depth approach adding additional layers of security to your site.

The KP1 uses a 256-bit encrypted link that switches off all circuits should any attempt to override electronic circuits be detected.

The KP1 alongside our enhanced PLC’s improves the Terra range’s tamper resilience ensuring the integrity of your mission critical infrastructure is safe from malicious intent by locking out un-authorised or intrusive access.

A CPNI/HVM Presentation centred around controls inspired Frontier Pitts Electronics R&D and Software Engineers to create this unit. The unit has been tested on the PAS 68 Terra Range of Blockers and Gates, and will be supplied as standard on all Terra equipment from early 2013.

Please follow the links on our web site which will take you to the UK governments Section on cyber security strategy and downloads section*

 

It sets out how the UK will support economic prosperity, protect national security and safeguard the public’s way of life by building a more trusted and resilient digital environment.

*You will find 5 down loads:

Also CPNIs  top 20 critical security controls for cyber defence are a baseline of high-priority information security measures and controls that can be applied across an organisation in order to improve its cyber defence. CPNI is participating in an international government-industry effort to promote the top 20 critical controls for computer and network security. The development of these controls is being coordinated by the SANS Institute

·          – Inventory of authorised and unauthorised devices

·          – Inventory of authorised and unauthorised software

·          – Secure configurations for hardware and software

·          – Continuous vulnerability assessment and remediation

·          – Malware defences

·          – Application software security

·          – Wireless device control

·         – Data recovery capability

·          – Security skills assessment and appropriate training to fill gaps

·          – Secure configurations for network devices

·          – Limitation and control of network ports, protocols, and services

·          – Controlled use of administrative privileges

·          – Boundary defence

·          – Maintenance, monitoring, and analysis of security audit logs

·          – Controlled access based on the need-to-know

·          – Account monitoring and control

·          – Data loss prevention

·          – Incident response capability

·          – Secure network engineering

·         – Penetration tests and red team exercises

Twitter Digg Delicious Stumbleupon Technorati Facebook Email