主页 / ISC2016 中国互联网安全大会 / Industrial CyberSecurity Mission Centric Approach

-
作者Sergey Gordeyhcik SCADA StrangeLove Research Team
-
简介
- CYBERSECURITY?
- INDUSTRIAL CYBERSECURITY
- THREATS?
- INTERCONNECTED WORLD
- 220,558 ONLINE, 17,042 IN ENTERPRISES
- ICS ONLINE: CHINA
- GREATER CHINA
- DIGITAL SUBSTATION TAKEOVER
- DIGITAL SUBSTATION TAKEOVER: GOALS
- VULNERABILITIES IN RELAY PROTECTION
- REMOTE CODE EXECUTION?
- CONFIRMATION CODE “311299”
- DEVICE MEMORY
- CODE REUSE
- RAILWAY COMPUTER BASED INTERLOCKING
- RAILWAY GSM-R ISSUES
- VULNERABILITIES OF (U)SIM
- LOCAL VENDORS
- INDUSTRIAL CYBERSECURITY
- MISSION CENTRIC APPROACH
- COMPUTER BASED INTERLOCKING
- FORMAL REQUIREMENTS
- CBI: THREAT MODEL
- FULL PICTURE
- LET DO IT TOGETHER!
-
SCADASOS
-
SCADASOS RESULTS
- THANK YOU FOR COLLABORATION!
-
援引http://security.360.cn/News/news/id/89.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2018-09-17 12:21:26
-
2020-12-02 12:03:07.687476
-
2020-08-29 12:38:58.399473
-
2019-09-02 04:10:38
附件下载
-
Sergey.Gordeyhcik.Industrial.CyberSecurity.Mission.Centric.Approach.pdf