Piccinini, 2022 - Google Patents
The impact of cybersecurity on industrial processes. Understand the risks and how to mitigate the consequencesPiccinini, 2022
View PDF- Document ID
- 5983240103001283858
- Author
- Piccinini M
- Publication year
External Links
Snippet
Cybersecurity is becoming an increasingly important topic day after day that cannot be ignored anymore by companies, especially since nowadays most attacks have evolved to the point of making antivirus and firewalls insufficient to guarantee the protection of …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Borky et al. | Protecting information with cybersecurity | |
Stouffer et al. | Guide to industrial control systems (ICS) security | |
Langill | Defending against the dragonfly cyber security attacks | |
Atieh | Assuring the optimum security level for network, physical and cloud infrastructure | |
Mukherjee | Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats | |
Varadharajan et al. | Techniques for enhancing security in industrial control systems | |
Sehgal et al. | Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization | |
Dodiya et al. | Fortifying the digital forge: unleashing cybersecurity in the interconnected world of digital manufacturing | |
DesRuisseaux | Practical overview of implementing IEC 62443 security levels in industrial control applications | |
Al-Sibai et al. | IoT cybersecurity threats mitigation via integrated technical and non-technical solutions | |
Idrissi et al. | Cyber security challenges and issues of industrial control systems–some security recommendations | |
Mack | Cyber security | |
Lenaeus et al. | How to implement security controls for an information security program at CBRN facilities | |
Piccinini | The impact of cybersecurity on industrial processes. Understand the risks and how to mitigate the consequences | |
Rocha | Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing | |
Akheel | Vulnerability Assessment and Analysis of SCADA and Foundation Fieldbus on Industrial Control System (ICS) Networks: A Literature Revie. | |
Sheikh | CompTIA Security+ Certification Study Guide | |
Stawowski | Dilemmas of a Security Architect: How to Protect Critical Systems without Disrupting Continuity of Their Services. | |
Udayakumar | Design and Deploy a Secure Azure Environment | |
Ginter | Cyber Perimeters for Critical Infrastructures | |
Kalogeras | Navigating the waters of maritime cybersecurity with BIMCO’s guidelines: identifying vulnerabilities and mitigating threats to IT and OT systems | |
Veshne | Attack Surface Management: Principles for simplifying the complexity of OT security | |
Sarkar et al. | Security knowledge representation of e-government data centre through ontology | |
Ahmed | Threat Analysis for Cloud-Native Deployments | |
Castillo | IT Security |