skip to main content
The County of DuPage
Wheaton, Illinois
 

Management and Security Links

Chemical Emergency Website URL

  • Chemical Hazard Emergency Medical Management - The goals of this site are to enable first responders, first receivers, and other healthcare providers and planners to plan for, respond to, recover from, and mitigate the effects of mass-casualty incidents involving chemicals and to provide a comprehensive, user-friendly, web-based resource that is also downloadable in advance, so that it may be available during an event if the internet is not accessible.

Cyber Security URLs

  • Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) - ICS-CERT works to reduce risks within and across all critical infrastructure sectors by partnering with law enforcement agencies and the intelligence community and coordinating efforts among Federal, state, local, and tribal governments and control systems owners, operators, and vendors. Additionally, ICS-CERT collaborates with international and private sector Computer Emergency Response Teams (CERTs) to share control systems-related security incidents and mitigation measures.
  • OPSEC for Control Systems - This training is intended to provide an overview of operations security for control systems (also referred to as SCADA, DCS, PCS, etc.). This training was developed through the Control Systems Security Program, established by the U.S. Department of Homeland Security National Cyber Security Division.
  • Cyber Security for Control Systems Engineers & Operators - This training is intended for control system (also referred to as SCADA, DCS, PCS, etc.) employees whose primary job is not cyber security. This training was developed through the Control Systems Security Program, established by the U.S. Department of Homeland Security National Cyber Security Division.
  • Cyber Security Evaluation Tool- The Cyber Security Evaluation Tool (CSET) is a Department of Homeland Security product that assists organizations in protecting their key national cyber assets. CSET is a desktop software tool that guides users through a step-by-step process to assess their control system and information technology network security practices against recognized industry standards.
  • Cyber Threat Source Descriptions - Cyber threats to a control system refer to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway. Threats to control systems can come from numerous sources, including hostile governments, terrorist groups, disgruntled employees, and malicious intruders. Though other threats exist, including natural disasters, environmental, mechanical failure, and inadvertent actions of an authorized user, this discussion will focus on the deliberate threats mentioned above.