The protection of each of the Human Machine Interfaces (HMIs) installed, provides a cyber secure environment in between all protected systems. In the INSIDE-OUT defense philosophy, an attacker needs to launch a discrete attack on each HMI system, and even if successful in doing so, this would remain a local breach that is easier to contain. This form of protection deals with both internal and external threats.
Traditional cyber defense solutions, such as anti-virus and OT network monitoring are more often designed to protect the IT network. Most of IT systems are connected, monitored and up-to-date. These solutions work like a fence – blocking external attacks. This is an outside-in philosophy of protection, that assumes that network connectivity to the outside world is the main cyber threat.
based on cutting edge technology.
|1||Protection against casual or coincidental violation|
|2||Protection against intentional violation using simple means, low resources, generic skills, low motivation|
|3||Protection against intentional violation using sophisticated means, moderate resources, IACS specific skills, moderate motivation|
|4||Protection against intentional violation using sophisticated means, extended resources, IACS specific skills, high motivation|
With an eye to the digital future, NavalDome's solutions are designed to keep both crews and their asset operations safe at sea, today