Главная
Study mode:
on
1
Intro
2
Agenda
3
2009 - 2013 SCADA Vulnerabilities
4
Components
5
Acquisition Convert parameters like light, temperature, pressure or flow to analog signals
6
Conversion
7
Presentation & Control
8
2013 Vulnerabilities by category
9
Emerson ROC800 Vulnerabilities
10
Siemens CP 1604 / 1616 Interface Card Vulnerability
11
Communication
12
ModBus Vulnerabilities
13
DNP Vulnerabilities
14
Security Analysis of SCADA protocols
15
SSH, FTP, TFTP, IGMP, SNMP
16
Real world issues
17
System Wide Challenges
18
Proposals
19
Scada Scan
Description:
Explore the technical security challenges faced by organizations with SCADA, critical infrastructure, or control systems installations in this 47-minute conference talk. Dive into the intricacies of SCADA systems, including RTU, IED, PLC, FEP, PCS, DCS, HMI, sensors, and data historians. Categorize these components into distinct groups based on functionality and examine their security implications. Study SCADA protocols at the packet level and understand their vulnerabilities. Learn about potential attacks against each group and component, and discover an updated open-source tool for identifying and inventorying SCADA systems. Gain insights from real-world examples of successful and unsuccessful security control implementations in SCADA systems. Receive guidance on implementing additional measures to achieve acceptable security for control system owners. Whether you're responsible for control system infrastructure, an engineer in charge of security, or new to control systems, acquire valuable knowledge about the security complexities of these critical systems. Read more

Why is SCADA Security an Uphill Battle

OWASP Foundation
Add to list