Essays about: "SCADA säkerhet"

Showing result 1 - 5 of 6 essays containing the words SCADA säkerhet.

  1. 1. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  2. 2. Patch Delivery Infrastructure in SCADA Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Svetlomir Petrov; [2018]
    Keywords : ;

    Abstract : As other technologies, the SCADA architecture, whose origin can be traced back to midtwentiethcentury, was not designed initially with security in mind. Recent cyber-attacks andsecurity incidents show that approaches like security through obscurity and air-gapping thesystems are not relevant anymore. READ MORE

  3. 3. Predicting the rate of adoption of IT/OT integration in the Swedish electricity grid system

    University essay from KTH/Hållbarhet och industriell dynamik

    Author : ISABELLE GADRÉ; JENS-MARTIN VACKERBERG; [2016]
    Keywords : Distribution System Operators; SCADA; IT OT integration; Large; Elnätsdistributörer; SCADA; IT OT integration; Large technical system;

    Abstract : Due to the increasing threat of global warming, today’s grid system faces large changes and challenges as more renewable sources are being implemented in the grid. In order to handle these changes and secure future distribution, new technologies and components are necessary. READ MORE

  4. 4. Empirical test of a tool for cyber security vulnerability assessment

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Dan Johansson; [2015]
    Keywords : cyber; security; SCADA; cysemol; p2cysemol; eaat; ABB; tool; empirical; test; vulnerability; assessment; turing;

    Abstract : This report describes a study aimed at verifying a cyber security modeling language named the Predictive, Probabilistic Cyber Security Modelling Language. This modeling language together with the Enterprise Architecture Analysis Tool acts as a tool for cyber security evaluations of system architectures. READ MORE

  5. 5. Refining a Network Model Concerning Network Security Risk Analysis

    University essay from KTH/Data- och elektroteknik

    Author : Daniel Kuehn; Sofia Ljunggren; [2014]
    Keywords : Network Security; Risk Analysis; CySeMoL; P2AMF; Nätverkssäkerhet; Riskanalys; CySeMoL; P2AMF;

    Abstract : P²CySeMoL is a framework in which security risks are calculated and presented with a value referring to the probability that an attack will succeed in a system, mainly SCADA systems. This thesis covers the creation of a more granular network module for the P²CySeMoL security riskanalysis framework to better be able to represent a network in concrete modules and to enable security riskanalysis on a network infrastructure at a greater detail. READ MORE