Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Securing Industrial Control Systems and Safety Instrumented Systems

You're reading from   Securing Industrial Control Systems and Safety Instrumented Systems A practical guide for safeguarding mission and safety critical systems

Arrow left icon
Product type Paperback
Published in Aug 2024
Publisher Packt
ISBN-13 9781801078818
Length 256 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Jalal Bouhdada Jalal Bouhdada
Author Profile Icon Jalal Bouhdada
Jalal Bouhdada
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Part 1:Safety Instrumented Systems
2. Chapter 1: Introduction to Safety Instrumented Systems (SISs) FREE CHAPTER 3. Chapter 2: SIS Evolution and Trends 4. Chapter 3: SIS Security Design and Architecture 5. Part 2: Attacking and Securing SISs
6. Chapter 4: Hacking Safety Instrumented Systems 7. Chapter 5: Securing Safety Instrumented Systems 8. Part 3: Risk Management and Compliance
9. Chapter 6: Cybersecurity Risk Management of SISs 10. Chapter 7: Security Standards and Certification 11. Chapter 8: The Future of ICS and SIS: Innovations and Challenges 12. Index 13. Other Books You May Enjoy

Bypassing a key switch

Reid Wightman presented a method to bypass SIS key switches at the S4 conference (https://s4xevents.com/). He showed how a malicious attacker could bypass the physical key switch lockout by gaining physical access to the SIS, reprogramming the main processor to bypass the locking mechanism, and then using the debug interface to take control of the system without requiring the use of the key switch.

The first step is to gain physical access to the SIS. Once access is obtained, a specialized debug cable is connected to the main processor on the SIS. This gives the malicious attacker access to the processor and enables them to read and write memory, as well as control any underlying processors on the SIS. The attacker then needs to reprogram and bypass the physical key switch lockout mechanism. This step is accomplished by writing a new operation code that allows the attacker to take control of the system without the use of the physical key.

The next step...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime