White Papers and Reports
Download the Whitepaper: “Meet Your Attacker – Taxonomy & Analysis of a SCADA Attacker”
Upon submitting the form below, the download link for the report will be emailed to the email address entered.
As industrial control systems grow in complexity, the ability to evaluate their vulnerability to attack becomes increasingly important to automate.
Security assessment tools usually begin by determining vulnerabilities of individual hosts. Using this and other information, such as connectivity between hosts, it’s possible to show the potential exploits attackers could use and the paths they can take to gain unauthorized access to a device on the ICS network.
Automating this process ensures that every possible attack path is considered, and that the paths contain only those network entities that the intruder is capable of exploiting.
You might also be interested in: