Langill, 2014 - Google Patents
Defending against the dragonfly cyber security attacksLangill, 2014
View PDF- Document ID
- 4050801439158842401
- Author
- Langill J
- Publication year
- Publication venue
- Retrieved
External Links
Snippet
This paper is designed to help the owners and operators of manufacturing companies better understand the nature of advanced cyber security threats against ICS and SCADA systems. The report is divided into four parts, each providing evidence regarding the nature, intended …
- 241000238633 Odonata 0 title description 110
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Makrakis et al. | Industrial and critical infrastructure security: Technical analysis of real-life security incidents | |
| Langill | Defending against the dragonfly cyber security attacks | |
| Bejtlich | The practice of network security monitoring: understanding incident detection and response | |
| Kuipers et al. | Control systems cyber security: Defense in depth strategies | |
| US20070192867A1 (en) | Security appliances | |
| US8548998B2 (en) | Methods and systems for securing and protecting repositories and directories | |
| Makrakis et al. | Vulnerabilities and attacks against industrial control systems and critical infrastructures | |
| Mahmood et al. | Securing Industrial Internet of Things (Industrial IoT)-A Reviewof Challenges and Solutions | |
| Rocha | Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing | |
| Vachon | CCNA security portable command guide | |
| Fink | Lessons learned from cyber security assessments of SCADA and energy management systems | |
| Cappello | A comprehensive analysis of EDR (Endpoint Detection & Response), EPP (Endpoint Protection Platform), and antivirus security technologies | |
| Sullivan | Survey of malware threats and recommendations to improve cybersecurity for industrial control systems version 1.0 | |
| May et al. | Advanced information assurance handbook | |
| Lakshmi | Beginning Security with Microsoft Technologies | |
| Whyte | Using a systems-theoretic approach to analyze cyber attacks on cyber-physical systems | |
| Khondoker et al. | Addressing industry 4.0 security by software-defined networking | |
| Sandbu | Windows Ransomware Detection and Protection: Securing Windows Endpoints, the Cloud, and Infrastructure Using Microsoft Intune, Sentinel, and Defender | |
| Pareek | A study of web application penetration testing | |
| Buecker et al. | Stopping Internet Threats Before They Affect Your Business by Using the IBM Security Network Intrusion Prevention System | |
| Penttilä | Cyber threats in maritime container terminal automation systems | |
| Ngongang | Cloud Computing Security | |
| Birch | CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam | |
| Ranathunga | Auto-configuration of critical network infrastructure | |
| Finco et al. | Cyber Security Procurement Language for Control Systems Version 1.6 |