2006
DOI: 10.2172/1177071
|View full text |Cite
|
Sign up to set email alerts
|

Generic attack approaches for industrial control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
17
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(18 citation statements)
references
References 0 publications
1
17
0
Order By: Relevance
“…These requirement differences mean that even when technically possible, blindly applying IT-based security mechanisms or procedures in industrial environments might lead to process malfunction or potentially safety-threatening scenarios, as they have been designed with different goals in mind. For instance, running antivirus software on PLCs might compromise the PLC's ability to perform real-time operations on a process, or conducting a penetration test can lead to dangerous scenarios [48].…”
Section: Industrial Network Since the Invention Of Thementioning
confidence: 99%
“…These requirement differences mean that even when technically possible, blindly applying IT-based security mechanisms or procedures in industrial environments might lead to process malfunction or potentially safety-threatening scenarios, as they have been designed with different goals in mind. For instance, running antivirus software on PLCs might compromise the PLC's ability to perform real-time operations on a process, or conducting a penetration test can lead to dangerous scenarios [48].…”
Section: Industrial Network Since the Invention Of Thementioning
confidence: 99%
“…In one case, a robotic arm inadvertently became active, and on another occasion a gas utility's ICS was locked up, stopping gas flowing for several hours [68].…”
Section: Technical Riskmentioning
confidence: 99%
“…Similar to when a cyberattack is launched against a company's database or web server, the exploitation or misuse of the devices found on a SCADA network can have negative effects on both the clientele and the corporation [7]. However, unlike the IP networks in abundance today, SCADA systems are threatened not only by hackers wishing to exploit vulnerabilities in software or firmware but also by the tools commonly associated with monitoring, auditing, and securing networks.…”
Section: Introductionmentioning
confidence: 99%