Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Malicious attack, types

The manipulations may take the form of attacks by skilled malicious hackers, or script kiddies using automated tools. Intrusion Detection System (IDS) is used to detect all types of mahcious... [Pg.157]

The BDMP supporting a risk analysis of this system is given in Fig. 5. It models the different scenarios that lead to pollution of the environment (the top event). There are three t3q>es of possible scenarios attack scenarios, accidental scenarios or hybrid scenarios. The first type of scenarios is a successful attack initiated by a malicious person, the second type is based on mere accidental events like failures of the system s components and the third type is a combination of attacks and components failures. This latter type best characterizes the possible interactions between safety and security events. [Pg.333]

Any type of risk analysis will be concerned with high consequence events as distinct from risk because likelihood need not be evaluated. It can be assumed that the malicious persons do intend to carry out their attack. [Pg.337]


See other pages where Malicious attack, types is mentioned: [Pg.49]    [Pg.57]    [Pg.141]    [Pg.843]    [Pg.340]    [Pg.84]   
See also in sourсe #XX -- [ Pg.334 , Pg.337 ]




SEARCH



Malicious

© 2024 chempedia.info