首页> 外文期刊>Journal of Information Warfare >Cyber-Mugging: Summary and Analysis of a Simulated ICS/SCADA Attack
【24h】

Cyber-Mugging: Summary and Analysis of a Simulated ICS/SCADA Attack

机译:网络抢劫:ICS / SCADA模拟攻击的摘要和分析

获取原文
获取原文并翻译 | 示例
           

摘要

In a representative Industrial Control System (ICS)/Supervisory Control And Data Acquisition (SCADA) laboratory environment, a simulated cyber attack suggests that an attacker with a low to moderate level of technical proficiency may utilize common, publicly-available tools and techniques to obtain complete control of the ICS environment. The cyber-physical relationship between information systems and industrial machinery has created environments where limited resources may be leveraged to trigger significant physical effects. The feasibility that such an incident has the potential to cause significant disruptive effects directly challenges the current paradigm that state-level resources are required to inflict catastrophic results.
机译:在具有代表性的工业控制系统(ICS)/监控和数据采集(SCADA)实验室环境中,模拟的网络攻击表明,技术水平较低至中等的攻击者可能会利用常见的,公开可用的工具和技术来获取完全控制ICS环境。信息系统与工业机械之间的网络物理关系已经创造了一种环境,在这种环境中,可以利用有限的资源来引发重大的物理影响。此类事件可能造成重大破坏性影响的可行性直接挑战了当前的范式,即需要国家级资源来造成灾难性后果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号