Description
This slide presentation outlines information on using a supervisory control and data acquisition system (SCADA) as an essential security system combined with an information technology (IT) system. Topics covered include: connectivity costs; phased implementation; SCADA/IT differences; SCADA security issues; two types of networks, Business (wide area networks and local area networks) networks and SCADA networks; unauthorized access risks; SCADA system corruption risks; risk mitigation procedures; SCADA architecture; SCADA threats/risks; “sensitive information” extends beyond SCADA; SCADA hacking techniques; SCADA vulnerability assessment findings; SCADA security/connectivity policy; security policy addresses connectivity; and, SCADA/cyber security – connectivity lifecycle.
Product Details
- Edition:
- Vol. – No.
- Published:
- 04/18/2004
- Number of Pages:
- 31
- File Size:
- 1 file , 970 KB
- Note:
- This product is unavailable in Ukraine, Russia, Belarus