Kuhse Energy Group
  1. Companies
  2. Kuhse Energy Group
  3. Products
  4. Kuhse - Cyber Security Kits for ...

KuhseCyber Security Kits for Emergency Power Systems

SHARE

We make your emergency power systems cyber secure! As a specialist for emergency power systems in critical infrastructures, we offer you Cyber Security Kits for new systems as well as a Cyber Security Check for your existing plant. We analyze weak points and determine optimization potential to protect your applications against cyber attacks and to ensure maximum availability. We would be happy to support you in an advisory capacity with the certification of your organization and processes according to the guidelines of the Cyber Security Standard IEC 62443–2‑4.

Most popular related searches

MAXIMUM PROTECTION FOR PLANT OPERATORS AND INTEGRATORS IN CRITICAL INFRASTRUCTURES

Critical infrastructures (CRITIS) are organizations and facilities of major importance to the state community and security of supply, such as large hospitals, data centers, utilities and independent power producers.

According to the BSI (German federal office for information security), effective cyber security measures must be implemented and periodically verified not only for critical infrastructures, but also for facilities of public interest. Due to the rapidly increasing number of attacks even on companies and facilities, that do not directly belong to these categories, such as smaller hospitals, the self-interest of those companies and facilities in cyber security increased significantly. It is also to be expected that key cyber security requirements will be successively transferred (cascaded) to other areas.

Current threads

Emergency power systems are an essential part of reliable power supply and exposed to an increased risk of cyber attacks through

Cyber Attacks on control systems with remote access resp. remote monitoring

Malware Infection caused by infected devices accessing the system locally or remotely

Faulty operation by unauthorized persons or persons with restricted authorization through local and remote access

Acts of sabotage