Главная
Study mode:
on
1
Intro
2
Traditional Security
3
No Control
4
Who is on your network
5
Bring your own device
6
Whos on your network
7
Hardware
8
Hard Disk Drives
9
Hardware Attacks
10
Software Supply Chain
11
Supply Chain Attacks
12
Malware Reverse Engineering
13
BGP Stream
14
BGP Hijacking
15
DNS Hijacking
16
Onion Router Tour
17
The Math
18
In intractable
19
Blockchain
20
Summary
Description:
Explore the dynamic landscape of Industrial Control Systems (ICS) cybersecurity in this 33-minute conference talk by Richard Brooks, Professor at Clemson University, delivered at the Kaspersky Industrial Cybersecurity Conference 2019. Delve into topics such as traditional security challenges, network access control, bring your own device policies, hardware vulnerabilities, supply chain attacks, malware reverse engineering, BGP and DNS hijacking, and blockchain technology. Gain valuable insights into the constantly evolving attack surface of ICS systems and learn about cutting-edge defense strategies. Access accompanying slides for a comprehensive understanding of the presented material and discover additional resources to further expand your knowledge in industrial cybersecurity.

The Evolving Attack Surface

Kaspersky
Add to list