Главная
Study mode:
on
1
Intro
2
What is ICS
3
Typical ICS Architecture
4
Different Systems
5
Is it secure
6
Security by obscurity
7
Remote clients
8
Tools attackers need
9
Case study FPSO
10
What is Floating Manufacturing
11
Air Gap Server
12
Transferring Files
13
Notepad
14
QR Code
15
Maninthemiddle Attack
16
NTP Attack
17
Improving Security
18
Defenseindepth
19
Network Segmentation
20
Education
21
Key takeaways
22
Questions
Description:
Explore a comprehensive conference talk on SCADA/ICS security vulnerabilities, focusing on potential threats to critical infrastructure like nuclear power plants and oil rigs. Delve into practical exploitation techniques, including a live demonstration of simulated power grid attacks. Gain insights into typical ICS architecture, security challenges, and case studies involving floating manufacturing. Learn about various attack methods such as man-in-the-middle and NTP attacks, as well as essential defense strategies like network segmentation and education. Suitable for those with general IT security knowledge, TCP/IP understanding, and basic programming skills.

SCADA - ICS Inherited Insecurity - From Nuclear Power Plants to Oil Rigs

RSA Conference
Add to list