posted ago by VaccinesCauseSIDS ago by VaccinesCauseSIDS +7 / -1

https://csrc.nist.gov/publications/detail/nistir/8374/draft

https://archive.is/wip/r6ZZC

anyone can apply to become a committee member.

they are actively seeking committee members.

they are actively seeking comments.

become a committee member, and then make comments on their cyber security standard about

Cyber Polygon Cyber Attack July 9, 2021

World Economic Forum

Bill Gates and Klaus Schwab


APB BOLO BILL GATES. WANTED BY INTERPOL


Cyber Polygon - The event will be held online on

THIS FRIDAY July 9th 2021.

Applications from organisations wishing to join the training are open. See further details on the official website (WEF website)

https://greatawakening.win/p/12jJQ1sYQ2/cyber-polygon--the-event-will-be/c/


From “Event 201” to “Cyber Polygon”: The WEF’s Simulation of a Coming “Cyber Pandemic”

https://greatawakening.win/p/12jJQ0kzRf/from-event-201-to-cyber-polygon-/c/


NSA dot GOV

https://archive.is/G2KGM

https://www.nsa.gov/What-We-Do/Cybersecurity/Partnership/Standards/

Center for Cybersecurity Standards

NSA’s Center for Cybersecurity Standards supports collaboration with industry to ensure U.S. Government cybersecurity requirements are included in the standards for a more secure future. These standards enable interoperable IT solutions and mitigate security challenges across networks.

Contact us: [email protected]

How Standards Support NSA’s Cybersecurity Mission

As NSA relies increasingly on commercial products to secure National Security Systems* (i.e. systems that carry classified or otherwise sensitive information), we must find ways to partner with vendors to ensure security requirements are built into development processes. NSA has recognized that engagement with standards bodies is a highly effective mechanism to not only communicate requirements to all vendors in a given product segment, it is also a way to ensure those requirements are met by most vendors.

NSA Cybersecurity Standards Engagements

While NSA works to track development across standards organizations, recent NSA cybersecurity standards engagements fall into the following broad areas: 5G Security

NSA supports the Department of Defense effort to secure next generation mobile infrastructure through participation in the Third Generation Partnership Program (3GPP), the Alliance for Telecommunications Industry Solutions (ATIS), and the Institute of Electrical and Electronics Engineers (IEEE LAN/MAN Standards Committee.

Cybersecurity Automation

To protect DoD networks from attack, NSA Cybersecurity is standardizing the collection and sharing of information necessary to automate network risk assessment and response. This work takes place in cooperation with the National Institute of Standards and Technology (NIST) the Department of Homeland Security (DHS) in the Internet Engineering Task Force (IETF), the Trusted Computing Group (TCG), the International Organization of Standards/International Electrotechnical Committee (ISO/IEC) and the Organization for the Advancement of Structured Information Standards (OASIS). Platform Resilience

Platform resilience standards address vulnerabilities and attacks that leverage weaknesses in platform update mechanisms. NSA Cybersecurity is working with the IETF and TCG to make sure that standards are in place to secure software and firmware update mechanisms, as well as collaborating with NIST to standardize commercial code signing systems. Cryptographic Algorithms

NSA Cybersecurity needs a set of standardized commercial cryptographic primitives to support current requirements, as well as future environments and protection against emerging threats such as quantum computing. Cooperation with NIST is essential to that mission, as is participation in ISO/IEC, IEEE, IETF, and the American National Standards Institute (ANSI). Security Protocols

As part of our mission to protect NSS network communications, NSA Cybersecurity Solutions works with the IETF, ISO/IEC to ensure that a robust set of cryptographic protocols are available and incorporated into commercial products. We also work with 3GPP and ATIS to build security into 5G networks. *National Security Directive 42 designates NSA as the National Manager for National Security Systems (NSS) – information systems which require special protections, such as those used for intelligence activities or command and control of military forces. NSA’s role is to prescribe the appropriate protections for NSS. In support of that role, NSA works with industry to ensure that products are available to provide that protection.


https://en.wikipedia.org/wiki/Cybersecurity_standards

https://archive.is/T98XO

Cybersecurity standards (also styled cyber security standards)[1] are techniques generally set forth in published materials that attempt to protect the cyber environment of a user or organization.[2] This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.

The principal objective is to reduce the risks, including prevention or mitigation of cyber-attacks. These published materials consist of collections of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies.


https://www.isa.org/standards-and-publications/isa-standards/isa-standards-committees/isa99

The ISA99 standards development committee brings together industrial cyber security experts from across the globe to develop ISA standards on industrial automation and control systems security. This original and ongoing ISA99 work is being utilized by the International Electrotechnical Commission in producing the multi-standard IEC 62443 series.


https://webstore.ansi.org/Standards/ISA/ANSIISA9902012009

ANSI/ISA 99.00.01-2007. Add to cart ANSI/ISA TR99.00.01-2007. Add to cart Content Provider The International Society of Automation [ISA] ... Documents sold on the ANSI Webstore are in electronic Adobe Acrobat PDF format, however some ISO and IEC standards are available from Amazon in hard copy format.


https://www.iec.ch/blog/understanding-iec-62443

https://archive.is/74Ezw

Understanding IEC 62443 2021-02-26 ,
Editorial Team fire.jpg The consequences of a cyber-attack on critical infrastructure could be devastating. Image by David Mark from Pixabay. The IEC 62443 series was developed to secure industrial automation and control systems (IACS) throughout their lifecycle. It currently includes nine standards, technical reports (TR) and technical specifications (TS).

IEC 62443 was initially developed for the industrial process sector but IACS are found in an ever-expanding range of domains and industries, such as power and energy supply and distribution, and transport. IACS technologies are central to critical infrastructure.

IT standards are not appropriate for IACS and other OT (operational technology) environments. For example, they have different performance and availability requirements, and equipment lifetime. Moreover, cyber-attacks on IT systems have are essentially economic consequences, while cyber-attacks on critical infrastructure can also be heavily environmental or even threaten public-health and lives.

International standards are based on industry best practices and reached by consensus. Implementing IEC 62443 can mitigate the effects and often prevent successful cyber-attacks. It can bolster security throughout the lifecycle and reduce costs.

IEC 62443 addresses not only the technology that comprises a control system, but also the work processes, countermeasures, and employees. The standard takes a holistic approach because not all risks are technology-based: the staff responsible for an IACS must have the required training, knowledge and skills to ensure security.

IEC 62443 takes a risk-based approach to cyber security, which is based on the concept that it is neither efficient nor sustainable to try to protect all assets in equal measure. Instead, users must identify what is most valuable and requires the greatest protection and identify vulnerabilities.

They must then erect defence-in-depth architecture that ensures business continuity.

The IEC 62443 series of standards is organized into four parts:

General

Part 1 covers topics that are common to the entire series:

1-1 (TS): Terminology, concepts and models Policies and procedures

Part 2 focuses on methods and processes associated with IACS security:

2-1: Establishing an IACS security program 2-3 (TR): Patch management in the IACS environment 2-4: Security program requirements for IACS service providers System

Part 3 is about requirements at the system level:

3-1: Security technologies for IACS 3-2: Security risk assessment for system design 3-3: System security requirements and security levels Components and requirements

Part 4 provides detailed requirements for IACS products:

4-1: Secure product development lifecycle requirements 4-2: Technical security requirements for IACS components Conformity assessment

In addition, IEC conformity assessment verifies that standards are properly applied in real-world technical systems. To this end, the IECEE Industrial Cyber Security Programme tests and provides certification to standards within the IEC 62443 series.

Both IEC 62443 and the IECEE programme help to protect critical infrastructure. In this way, they contribute to the United Nations Sustainable Development Goal 16, which promotes peaceful and inclusive societies.


https://en.wikipedia.org/wiki/IEC_62443

IEC 62443 is an international series of standards on "Industrial communication networks - IT security for networks and systems". The standard is divided into different sections and describes both technical and process-related aspects of industrial cybersecurity.

Comments (0)
sorted by: