Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

SCADA system minimizing

Some of the previous works [6,11,29] propose a non-intrusive conummication infrastructme that is built from scratch. Om approach is minimally intrusive as we build the protection layer on existing already deployed SCADA systems while keeping the change of the existing SCADA system minimal. [Pg.175]

Where backdoor or vendor connections do exist in SCADA systems, strong authentication must be implemented to ensure secure communications. Modems, wireless, and wired networks used for communications and maintenance represent a significant vulnerability to the SCADA network and remote sites. Successful war dialing or war driving attacks could allow an attacker to bypass all other controls and have direct access to the SCADA network or resources. To minimize the risk of such attacks, disable inbound access and replace it with some type of callback system. [Pg.130]

Establish policies and conduct training to minimize the likelihood that organizational personnel will inadvertently disclose sensitive information regarding SCADA system design, operations, or security controls. [Pg.134]


See other pages where SCADA system minimizing is mentioned: [Pg.162]    [Pg.2056]    [Pg.2057]    [Pg.168]   
See also in sourсe #XX -- [ Pg.33 ]

See also in sourсe #XX -- [ Pg.33 ]




SEARCH



SCADA

© 2024 chempedia.info