[go: up one dir, main page]

Langill, 2014 - Google Patents

Defending against the dragonfly cyber security attacks

Langill, 2014

View PDF
Document ID
4050801439158842401
Author
Langill J
Publication year
Publication venue
Retrieved

External Links

Snippet

This paper is designed to help the owners and operators of manufacturing companies better understand the nature of advanced cyber security threats against ICS and SCADA systems. The report is divided into four parts, each providing evidence regarding the nature, intended …
Continue reading at paper.vulsee.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Makrakis et al. Industrial and critical infrastructure security: Technical analysis of real-life security incidents
Langill Defending against the dragonfly cyber security attacks
Bejtlich The practice of network security monitoring: understanding incident detection and response
Kuipers et al. Control systems cyber security: Defense in depth strategies
US20070192867A1 (en) Security appliances
US8548998B2 (en) Methods and systems for securing and protecting repositories and directories
Makrakis et al. Vulnerabilities and attacks against industrial control systems and critical infrastructures
Mahmood et al. Securing Industrial Internet of Things (Industrial IoT)-A Reviewof Challenges and Solutions
Rocha Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
Vachon CCNA security portable command guide
Fink Lessons learned from cyber security assessments of SCADA and energy management systems
Cappello A comprehensive analysis of EDR (Endpoint Detection & Response), EPP (Endpoint Protection Platform), and antivirus security technologies
Sullivan Survey of malware threats and recommendations to improve cybersecurity for industrial control systems version 1.0
May et al. Advanced information assurance handbook
Lakshmi Beginning Security with Microsoft Technologies
Whyte Using a systems-theoretic approach to analyze cyber attacks on cyber-physical systems
Khondoker et al. Addressing industry 4.0 security by software-defined networking
Sandbu Windows Ransomware Detection and Protection: Securing Windows Endpoints, the Cloud, and Infrastructure Using Microsoft Intune, Sentinel, and Defender
Pareek A study of web application penetration testing
Buecker et al. Stopping Internet Threats Before They Affect Your Business by Using the IBM Security Network Intrusion Prevention System
Penttilä Cyber threats in maritime container terminal automation systems
Ngongang Cloud Computing Security
Birch CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
Ranathunga Auto-configuration of critical network infrastructure
Finco et al. Cyber Security Procurement Language for Control Systems Version 1.6