A review of security assessment methodologies in industrial control systems
Purpose: The common implementation practices of modern industrial control systems (ICS) has left a window wide open to various security vulnerabilities. As the cyber-threat landscape continues to evolve, the ICS and their underlying architecture must be protected to withstand cyber-attacks. This stu...
Saved in:
Main Authors: | Qassim, Q.S., Jamil, N., Daud, M., Patel, A., Ja’affar, N. |
---|---|
Format: | Article |
Language: | English |
Published: |
2020
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A review of security assessment methodologies in industrial control systems
by: Qassim Q.S., et al.
Published: (2023) -
A Study on security vulnerabilities assessment and quantification in SCADA systems
by: Firdaus Z., et al.
Published: (2023) -
Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
by: Qassim Q.S., et al.
Published: (2023) -
Compromising the Data Integrity of an Electrical Power Grid SCADA System
by: Qassim Q.S., et al.
Published: (2023) -
Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system
by: Qassim Q.S., et al.
Published: (2023)