SCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. qCybersecurity for SCADA Systemsq provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues, and learn strategies for decreasing or eliminating system vulnerabilities.An attacker could use the WiFi connection to bridge the SCADA system LAN, potentially obtaining the access rights of the owner ... A rogue or insufficiently protected WiFi AP can be attacked in much the same way, although this would give the successful attacker access to the LAN ... media, could go up to the system console and issue commands 249 7 IDENTIFYING CYBERSECURITY VULNERABILITIES.
Title | : | Cybersecurity for SCADA Systems |
Author | : | William T. Shaw |
Publisher | : | PennWell Books - 2006 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: