Cyber Security

FIGHTING CYBER Attacks within FRONTIER PITTS CONTROLS Systems

Frontier Pitts will be introducing an anti-tamper digital key into its Electronic Control Cabinets for gates, roadblockers and bollards, to stop unauthorised bridging of circuits on site in an attempt to force entry or activate the security products.

The device, known simply as KP1, will stop unauthorised attempts on site to override Frontier Pitts electronic PLCs should access be gained into the security control cabinets. It will stop attempts to gain access to a site by electronically overriding open and closed circuits using a laptop on all IWA 14 and PAS 68 impact tested Anti Terra range of products, via the control cabinet.

By employing the KP1, Frontier Pitts have ushered in a new era in perimeter security products utilising an in depth approach and adding additional layers of security to your site.

The KP1 uses a 256-bit encrypted link that switches off all circuits should any attempt to override electronic circuits be detected.

The KP1, alongside our enhanced PLC’s, improves the Terra range’s tamper resilience ensuring the integrity of your mission critical infrastructure is safe from malicious intent by locking out unauthorised or intrusive access.

A CPNI/HVM Automatic Access Control Portal Presentation centred around controls inspired Frontier Pitts Electronics R&D and Software Engineers to create this unit. The unit has been tested on the IWA 14 and PAS 68 Terra Range of Blockers and Gates, and will be supplied as standard on all Terra equipment from early 2013.

Please follow the links on our web site which will take you to the UK governments Section on cyber security strategy and downloads section*

It sets out how the UK will support economic prosperity, protect national security and safeguard the public’s way of life by building a more trusted and resilient digital environment.

Also CPNIs top 20 critical security controls for cyber defence are a baseline of high-priority information security measures and controls that can be applied across an organisation in order to improve its cyber defence. CPNI is participating in an international government-industry effort to promote the top 20 critical controls for computer and network security. The development of these controls is being coordinated by the SANS Institute

  • Inventory of authorised and unauthorised devices
  • Inventory of authorised and unauthorised software
  • Secure configurations for hardware and software
  • Continuous vulnerability assessment and remediation
  • Malware defencesApplication software security
  • Wireless device controlData recovery capability
  • Security skills assessment and appropriate training to fill gaps
  • Secure configurations for network devices
  • Limitation and control of network ports, protocols, and services
  • Controlled use of administrative privileges
  • Boundary defence
  • Maintenance, monitoring, and analysis of security audit logs
  • Controlled access based on the need-to-know
  • Account monitoring and control
  • Data loss prevention
  • Secure network engineering
  • Penetration tests and red team exercises

https://www.telegraph.co.uk/news/uknews/defence/9789743/Public-must-be-warned-about-cyber-threat-like-AIDS-campaign-in-the-80s.html

https://www.counterterrorbusiness.com/news/61-uk-news/855-cyber-reserve-to-help-tackle-computer-attacks-

Subscribe to our Newsletter
Get the latest news about our products
We respect your privacy, we will not spam you.