Главная
Study mode:
on
1
Intro
2
Meet Zach Thornton
3
What is SCADA
4
SCADA Components
5
Reporting Position
6
Physical Lab
7
Virtual Lab
8
Modbus
9
Pipeline
10
Process Simulation
11
Controller Model
12
PID Controls
13
Modbus Traffic
14
No native authentication
15
Setpoint modification attack
16
Distributed attack
17
Simulation
Description:
Explore a comprehensive overview of SCADA systems and their vulnerabilities in this conference talk from BSides Huntsville Alabama 2015. Delve into the components of SCADA systems, understand their reporting mechanisms, and compare physical and virtual lab setups. Learn about Modbus protocol, pipeline and process simulation, controller models, and PID controls. Examine the security implications of Modbus traffic, including the lack of native authentication. Discover potential attack vectors such as setpoint modification and distributed attacks. Gain valuable insights into cybersecurity pedagogy and research through this virtual SCADA laboratory presentation.

A Virtual SCADA Laboratory for Cybersecurity Pedagogy and Research - BSides Huntsville 2015

Add to list
0:00 / 0:00