Skip to main content

Woburn, MA – December 2, 2015Kaspersky Lab has patented a method of modeling IT security and adapting it to an organization’s individual needs. By analyzing the ways in which malware affects different elements of the IT infrastructure, the newly patented method can be used to simulate the possible effect of malware on the infrastructure as a whole and to choose the most effective methods of neutralizing threats based on an enterprise’s specific security criteria. The patent was issued by the United States Patent and Trademark Office.

In an age of ubiquitous Internet-connectivity, an industrial network needs protection from cyberthreats just as much as an enterprise IT infrastructure. Moreover, there is ample proof that cyber-incidents in industrial networks can have far graver consequences than the same incidents in corporate networks. According to the RISI analytical agency, every tenth enterprise has suffered losses of between one and ten million dollars from cyber-incidents that resulted in the disruption of an industrial process. In 2013, the downtime caused by a cyber-incident in an industrial network lasted 24 hours or more in 25 percent of cases.

An infection of the industrial network commonly starts with cybercriminals penetrating the corporate network and in many cases, there is a direct data transfer channel between the two networks, with little or no protection. Another popular method used is entry via remote access to the industrial network (directly from controllers or the remote offices of the organization/contractor) using a Wi-Fi and/or cellular wireless channel and incorrect VPN connection settings. Access to the Industrial Control System (ICS) from contractor networks makes it impossible to fully control the security of a contractor’s remote networks and to inform the contractor’s employees about IT security rules.

The method patented by Kaspersky Lab makes it possible to create a model of an organization’s IT security system in several stages, adapt the security system to the enterprise’s specific requirements and identify the most effective methods of mitigating IT security incidents in an industrial network.

In the first stage, a complete model of the enterprise with all its electronic systems is created, based on the topology of computing devices and their connections. Next, the impact of malware on each individual computing device is reproduced and the result of that impact is modeled. In all subsequent stages, the IT system’s response to different malware-related events is calculated, as well as the most effective measures to mitigate the unwanted effects of these events.

“When implementing an enterprise’s cybersecurity system, it is very difficult to assess how effective it will be. Expensive solutions are not always the most effective,” said Andrey Doukhvalov, Head of Future Technologies, Chief Strategy Architect at Kaspersky Lab. “Modeling security incidents and designing an optimal response strategy for a specific information system can be used to calculate the most effective measures to protect industrial processes based on predefined criteria, such as data confidentiality or industrial process continuity.”

The ideas behind the patented method are used in the Kaspersky Industrial Protection Simulation training course.

About Kaspersky Lab

Kaspersky Lab is one of the world’s fastest-growing cybersecurity companies and the largest that is privately-owned. The company is ranked among the world’s top four vendors of security solutions for endpoint users (IDC, 2014). Since 1997 Kaspersky Lab has been an innovator in cybersecurity and provides effective digital security solutions and threat intelligence for large enterprises, SMBs and consumers. Kaspersky Lab is an international company, operating in almost 200 countries and territories across the globe, providing protection for over 400 million users worldwide.

Learn more at www.kaspersky.com.

 

For the latest in-depth information on security threat issues and trends, please visit:

Securelist | Information about Viruses, Hackers and Spam
Follow @Securelist on Twitter

Threatpost | The First Stop for Security News
Follow @Threatpost on Twitter

 

Media Contact
Stephen Russell
781.503.1833
stephen.russell@kaspersky.com

Kaspersky Lab Empowers ICS Operators with Adaptive Information Security

Kaspersky Lab Empowers ICS Operators with Adaptive Information Security
Kaspersky Logo