Corpus ID: 53965335

DECONSTRUCTION OF SOME INDUSTRIAL CONTROL SYSTEMS CYBERSECURITY MYTHS

@inproceedings{PitreCambacds2009DECONSTRUCTIONOS,
  title={DECONSTRUCTION OF SOME INDUSTRIAL CONTROL SYSTEMS CYBERSECURITY MYTHS},
  author={L. Pi{\`e}tre-Cambac{\'e}d{\`e}s and P. Sitbon},
  year={2009}
}
This paper presents a selection of technical issue s to address to secure sensitive control systems. The selected issues were chosen because th ey all suffer from misconceptions and a mythology that needs to be rationalized. The paper first presents and deconstructs a selection of these modern myths. A particular stress is placed o n the over-estimated “magical powers” of firewalls, and the belief that proprietary systems are “closed thus invincible” sometimes found in our industrial… Expand
4 Citations

Figures and Tables from this paper

Multi-Agent System For Nuclear Condition Monitoring
  • 5
  • PDF
Distributed Data and Information Fusion for Nuclear Reactor Condition Monitoring
  • 6
Research on Packet Loss Issues in Unidirectional Transmission
  • 2

References

SHOWING 1-10 OF 36 REFERENCES
Recommended Practice for Patch Management of Control Systems
  • 37
  • PDF
An Analysis of Two New Directions in Control System Perimeter Security
  • 8
  • PDF
The nonsecurity of secrecy
  • 17
Lessons Learned from the Maroochy Water Breach
  • J. Slay, M. Miller
  • Engineering, Computer Science
  • Critical Infrastructure Protection
  • 2007
  • 517
  • PDF
Security Analysis of a Cryptographically-Enabled RFID Device
  • 311
  • PDF
A Practical Attack on KeeLoq
  • 126
  • PDF
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication
  • 225
  • PDF
Owl Computing Product Overview
  • 2007; http://www.owlcti.com/docs/Owl_product_overview.pdf .
  • 2007
Security Technologies Guideline - Practical Guidance for Dep loying Cyber Security Technology within Electric Utility Data Networks
  • Electra, To Appear. in Feb 2009 ; http://www.cigre.org/gb/electra/electra.asp
  • 2009
...
1
2
3
4
...