Cybersecurity threats to P&C systems / Yu. D. Bay, Ya. Yu. Malkova, A. L. Buran

Уровень набора: (RuTPU)RU\TPU\network\4816, AIP Conference ProceedingsОсновной Автор-лицо: Bay, Yu. D., Specialist in the field of electric power engineering, Assistant of the Department of Tomsk Polytechnic University, 1991-, Yuly DmitrievichАльтернативный автор-лицо: Malkova, Ya. Yu., specialist in the field of electric power engineering, senior Laboratory assistant of Tomsk Polytechnic University, 1996-, Yana Yurievna;Buran, A. L., linguist, Associate Professor of Tomsk Polytechnic University, Candidate of pedagogical sciences, 1977-, Anna LeonidovnaКоллективный автор (вторичный): Национальный исследовательский Томский политехнический университет, Инженерная школа энергетики, Отделение электроэнергетики и электротехники (ОЭЭ)Язык: английский.Резюме или реферат: Vulnerabilities introduced into the hardware and software by P&C system manufacturers are typically difficult for the EPU’s P&C engineers to discover and patch. The most common cybersecurity flaw is a vulnerability that provides the means to inject malicious code into the P&C system software. The primary reason to consider this type of attack is that it can allow an individual to bypass the access control restrictions set by the developer or EPU’s P&C engineer. P&C system engineers should review all wireless remote access to the P&C system. Depreciate wireless access using WEP encryption and their interface to the P&C system network declared “untrusted”. Lastly, P&C managers should not view these vulnerabilities of P&C assets independently as a successful cyber-attack typically involves exploitation of a chain of vulnerabilities present on various assets. Consequently, there is a need to model and analyze the entire sys-tem-of-systems to estimate the relative security of a threat scenario..Примечания о наличии в документе библиографии/указателя: [References: 5 tit.].Тематика: электронный ресурс | труды учёных ТПУ | кибербезопасность | угрозы Ресурсы он-лайн:Щелкните здесь для доступа в онлайн | Щелкните здесь для доступа в онлайн
Тэги из этой библиотеки: Нет тэгов из этой библиотеки для этого заглавия. Авторизуйтесь, чтобы добавить теги.
Оценка
    Средний рейтинг: 0.0 (0 голосов)
Нет реальных экземпляров для этой записи

Title screen

[References: 5 tit.]

Vulnerabilities introduced into the hardware and software by P&C system manufacturers are typically difficult for the EPU’s P&C engineers to discover and patch. The most common cybersecurity flaw is a vulnerability that provides the means to inject malicious code into the P&C system software. The primary reason to consider this type of attack is that it can allow an individual to bypass the access control restrictions set by the developer or EPU’s P&C engineer. P&C system engineers should review all wireless remote access to the P&C system. Depreciate wireless access using WEP encryption and their interface to the P&C system network declared “untrusted”. Lastly, P&C managers should not view these vulnerabilities of P&C assets independently as a successful cyber-attack typically involves exploitation of a chain of vulnerabilities present on various assets. Consequently, there is a need to model and analyze the entire sys-tem-of-systems to estimate the relative security of a threat scenario.

Для данного заглавия нет комментариев.

оставить комментарий.