PYXIDA Institutional Repository
and Digital Library
 Home
Collections :

Title :Penetration testing methods and tools at ICS environments
Alternative Title :Μέθοδοι και εργαλεία ελέγχου ασφαλείας σε ΙCS συστήματα
Creator :Βαρσάμης, Ζοζέφ
Contributor :Ντούσκας, Θεόδωρος (Επιβλέπων καθηγητής)
Οικονομικό Πανεπιστήμιο Αθηνών, Τμήμα Πληροφορικής (Degree granting institution)
Type :Text
Extent :91p.
Language :en
Identifier :http://www.pyxida.aueb.gr/index.php?op=view_object&object_id=9555
Abstract :In the age of breakthrough technological progress, we find ourselves in a world of daily developments in blockchain technology, digital payments, and hyper-connectivity. As we become an even more digital-dependent society for everything from ordering groceries online to moving oil well production data safely to operators, we must ask ourselves, “is this data safe?”. Recent events with the Colonial Pipeline and the NHS Healthcare attack remind us that the answer is “not always.” The followin document is to define the ICS and SCADA vulnerabilities as well as two walkthroughs on how to perform these penetration testing techniques.
Στο παρόν έγγραφο αναλύονται εκτενώς διαφορετικοί τρόποι Ελέγχου Ασφαλείας σε συστήματα "ICS" και "SCADA" καθώς και τρόποι αντιμετώπισης διάφορων ευπαθειών.
Subject :Έλεγχος ασφαλείας
Βιομηχανικά συστήματα
Penetration
Industrial Control Systems (ICS)
Supervisory Control and Data Acquisition Systems (SCADA)
Date Available :2022-07-04 10:59:17
Date Issued :07/04/2022
Date Submitted :2022-07-04 10:59:17
Access Rights :Free access
Licence :

File: Varsamis_2022.pdf

Type: application/pdf