Abstract:
As industrial control systems grow in complexity, the ability to evaluate their vulnerability to attack becomes increasingly important to automate. Security assessment tools usually begin by determining vulnerabilities of individual hosts. Using this and other information, such as connectivity between hosts, it’s possible to show the potential exploits attackers could use and the paths they can take to gain unauthorized access to a device on the ICS network. Automating this process ensures that every possible attack path is considered, and that the paths contain only those network entities that the intruder is capable of exploiting.
Security Brief “COVID19-Themed Malware and Cyber-Attacks – Overview & Protection Measures”