Advanced search

Showing result 1 - 5 of 30 essays matching the above criteria.

  1. 1. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  2. 2. Attack Surface Management : Principles for simplifying the complexity of OT security

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jyotirmay Veshne; [2023]
    Keywords : OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Abstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE

  3. 3. Digital mapping of critical infrastructure : Design of a component data collection method for small-scale power grids

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Axel Rapp; [2023]
    Keywords : SCADA; CPS; cyber-physical system; CI; critical infrastructure; digital model; digital shadow; power grid; design science;

    Abstract : Critical infrastructures (CIs) distributing water, oil, gas, electricity, etc., to community residents and businesses, leverage cyber-physical systems (CPSs) to supervise and control the physical processes that these services entail. READ MORE

  4. 4. Honeypot study of threats targeting critical infrastructure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlo Alberto Scola; [2023]
    Keywords : ICS; Honeypots; Modbus; SCADA; Enip; Conpot; Bacnet; FTP; IPMI; Network security; Cyber attacks;

    Abstract : Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. READ MORE

  5. 5. Cyber resilience for critical infrastructure : A systematic review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Vahid Naserinia; [2021]
    Keywords : Cyber resilience; critical infrastructures; systematic review;

    Abstract : Critical infrastructure is a term to define the network of crucial assets for the functioning of a society and modern economies. The complexity of critical infrastructures and the ability to connect smart devices to these networks make them more vulnerable to cyberattacks. READ MORE