2020 International Conference on Communication and Signal Processing (ICCSP) 2020
DOI: 10.1109/iccsp48568.2020.9182452
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Cyber Physical System Attacks: Issues and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 31 publications
0
7
0
Order By: Relevance
“…CPS are vulnerable to cyber-attacks, and taking measures to protect them is important. According to an article by IEEE, here are some countermeasures that can be taken to protect CPS from cyber-attacks (Singh et al ., 2020):Risk assessment: Conduct a risk assessment to identify potential vulnerabilities and threats.Access control: Implement access controls to limit critical systems and data access.Encryption: Use encryption to protect sensitive data in transit and at rest.Intrusion detection: Deploy intrusion detection systems to detect and respond to cyber-attacks.Patch management: Keep software and firmware up to date with the latest security patches.Physical security: Implement security measures to prevent unauthorized access to critical systems.Training: Provide training for employees on cybersecurity best practices.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…CPS are vulnerable to cyber-attacks, and taking measures to protect them is important. According to an article by IEEE, here are some countermeasures that can be taken to protect CPS from cyber-attacks (Singh et al ., 2020):Risk assessment: Conduct a risk assessment to identify potential vulnerabilities and threats.Access control: Implement access controls to limit critical systems and data access.Encryption: Use encryption to protect sensitive data in transit and at rest.Intrusion detection: Deploy intrusion detection systems to detect and respond to cyber-attacks.Patch management: Keep software and firmware up to date with the latest security patches.Physical security: Implement security measures to prevent unauthorized access to critical systems.Training: Provide training for employees on cybersecurity best practices.…”
Section: Discussionmentioning
confidence: 99%
“…This plan should include procedures for detecting, containing and mitigating the effects of an attack. It is also important to note that the effectiveness of these countermeasures depends on the specific CPS being protected, and it may be necessary to implement additional measures based on the system's unique characteristics (Singh et al ., 2020).…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…With the rapid evolution of wireless communication networks, more and more CPS subsystems are built and connected through the communication networks, which enables more and more devices to link to CPS. However, the extensive utilization of devices with security vulnerabilities and unprotected communication networks makes CPS more prone to malicious cyber attacks and intrusions [1] (see Figure 1). These cyber threats, if they cannot be detected quickly and adjust the proper response strategy, will lead to grave consequences such as equipment damage, financial losses, and public safety.…”
Section: Introductionmentioning
confidence: 99%