kmfkua.blogg.se

Kaspersky cybermap
Kaspersky cybermap











kaspersky cybermap

Using the embedded network packet scan algorithms, the application detects signs of falsified addresses in ARP packets and various anomalies in the TCP and IP protocols. When the conditions defined in an active Intrusion Detection rule are detected in traffic, the application registers a rule-triggering event. Intrusion Detection rules and embedded network packet scan algorithms are used to detect such activity. This functionality lets you monitor traffic to detect signs of attacks or unwanted network activity. Lists of monitored system commands are generated when you configure the settings of Process Control devices. Values of industrial process parameters are tracked with the aid of Process Control rules that are used by the application to detect unacceptable values. This functionality lets you monitor traffic to detect the values of process parameters and the systems commands transmitted or received by devices.

kaspersky cybermap

  • Deep Packet Inspection (hereinafter also referred to as "Process Control").
  • When the application detects an interaction that is described in an enabled rule, it considers this interaction to be allowed and does not register an event. Detected interactions are checked to see if they match any Interaction Control allow rules.

    kaspersky cybermap

    This functionality lets you monitor interactions between devices of the industrial network. For the purpose of Asset Management, the application generates a table containing information that is received automatically from traffic or information that is manually provided. In conjunction with Process Control functionality, read/write operations for programmable logic controllers are also monitored. The application can also define device settings for Process Control. To automatically receive information about devices, the application analyzes industrial network traffic according to the rules for identifying information about devices and the protocols of communication between devices. This functionality lets you monitor the activity of devices and track changes to device information based on data received in network packets. In Kaspersky Industrial CyberSecurity for Networks, industrial network traffic analysis is provided by the following functionality: Industrial network traffic analysis functionality Overview of Kaspersky Industrial CyberSecurity for Networks functionality













    Kaspersky cybermap