Nothing Special   »   [go: up one dir, main page]

Piccinini, 2022 - Google Patents

The impact of cybersecurity on industrial processes. Understand the risks and how to mitigate the consequences

Piccinini, 2022

View PDF
Document ID
5983240103001283858
Author
Piccinini M
Publication year

External Links

Snippet

Cybersecurity is becoming an increasingly important topic day after day that cannot be ignored anymore by companies, especially since nowadays most attacks have evolved to the point of making antivirus and firewalls insufficient to guarantee the protection of …
Continue reading at upcommons.upc.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
Borky et al. Protecting information with cybersecurity
Stouffer et al. Guide to industrial control systems (ICS) security
Langill Defending against the dragonfly cyber security attacks
Atieh Assuring the optimum security level for network, physical and cloud infrastructure
Mukherjee Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats
Varadharajan et al. Techniques for enhancing security in industrial control systems
Sehgal et al. Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization
Dodiya et al. Fortifying the digital forge: unleashing cybersecurity in the interconnected world of digital manufacturing
DesRuisseaux Practical overview of implementing IEC 62443 security levels in industrial control applications
Al-Sibai et al. IoT cybersecurity threats mitigation via integrated technical and non-technical solutions
Idrissi et al. Cyber security challenges and issues of industrial control systems–some security recommendations
Mack Cyber security
Lenaeus et al. How to implement security controls for an information security program at CBRN facilities
Piccinini The impact of cybersecurity on industrial processes. Understand the risks and how to mitigate the consequences
Rocha Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
Akheel Vulnerability Assessment and Analysis of SCADA and Foundation Fieldbus on Industrial Control System (ICS) Networks: A Literature Revie.
Sheikh CompTIA Security+ Certification Study Guide
Stawowski Dilemmas of a Security Architect: How to Protect Critical Systems without Disrupting Continuity of Their Services.
Udayakumar Design and Deploy a Secure Azure Environment
Ginter Cyber Perimeters for Critical Infrastructures
Kalogeras Navigating the waters of maritime cybersecurity with BIMCO’s guidelines: identifying vulnerabilities and mitigating threats to IT and OT systems
Veshne Attack Surface Management: Principles for simplifying the complexity of OT security
Sarkar et al. Security knowledge representation of e-government data centre through ontology
Ahmed Threat Analysis for Cloud-Native Deployments
Castillo IT Security