Tuesday February 12, 2019
Synopsis:
Estimating potential cyber intruder activities and what attack path they may take to access our critical assets is important in understanding how we prioritize our security measures.
This paper focuses on an optimized method for automatically assessing those attack routes taking into account the challenges found due to the unique properties of industrial control systems.
This model takes into consideration threats, vulnerabilities, mitigation activities and potential impact to industrial components. With this model, we can determine potential routes that an intruder could take and prioritize each path based on the potential risk to the industrial application.
Security Brief “COVID19-Themed Malware and Cyber-Attacks – Overview & Protection Measures”