This paper presents a study based on the identification of the security elements that affect the textile industry where SCADA systems are used, and that may cause risks of leakage, unavailability or unauthorized alteration of information, in common environments in which information technologies (IT) and operating technologies (OT) operate. For this, the elements identified in the safety guide for industrial control systems NIST 800-82 and the cybersecurity maturity model C2M2 were used. As a result, the security elements that are involved in the different processes, technological trends of the analyzed industry were obtained and a comparison of the C2M2 and NIST 800-82 models is made.En este trabajo se presenta un estudio de identificación ...
Many different meanings are covered by this word: "security", depending on the application environme...
Performing vulnerability analysis and penetration tests is becoming more and more important for the ...
This article makes a thoughtful research on the different threats that arise in industrial control s...
Los sistemas SCADA, son sistemas de información que reúnen un conjunto de tecnologías, protocolos y ...
To implement a security model on corporate organizations, there are some essential steps that need t...
Investigación de la ciberseguridad aplicada a los sistemas de control industrial, mediante un estudi...
El objetivo de este trabajo es dar a conocer algunas de las amenazas existentes en el ciberespacio, ...
The technological transformation that society has undergone has generated an increase in global cybe...
Dissertação de Mestrado em Engenharia Informática apresentada à Faculdade de Ciências e Tecnologia ...
This document shows an analysis of the different management tools for information security at globa...
Establecer un sistema de análisis de tráfico de red basado en algoritmos de machine learning (ML), o...
International audienceIn the context of security, risk analyzes are widely recognized as essential. ...
Este proyecto pretende definir, a manera de estudio, cuáles son las diferentes amenazas y vulnerabil...
Currently companies do not import their asset classification of asset types of customers, cash, vehi...
El presente trabajo se basa en la identificación de amenazas y vulnerabilidades hacia los activos má...
Many different meanings are covered by this word: "security", depending on the application environme...
Performing vulnerability analysis and penetration tests is becoming more and more important for the ...
This article makes a thoughtful research on the different threats that arise in industrial control s...
Los sistemas SCADA, son sistemas de información que reúnen un conjunto de tecnologías, protocolos y ...
To implement a security model on corporate organizations, there are some essential steps that need t...
Investigación de la ciberseguridad aplicada a los sistemas de control industrial, mediante un estudi...
El objetivo de este trabajo es dar a conocer algunas de las amenazas existentes en el ciberespacio, ...
The technological transformation that society has undergone has generated an increase in global cybe...
Dissertação de Mestrado em Engenharia Informática apresentada à Faculdade de Ciências e Tecnologia ...
This document shows an analysis of the different management tools for information security at globa...
Establecer un sistema de análisis de tráfico de red basado en algoritmos de machine learning (ML), o...
International audienceIn the context of security, risk analyzes are widely recognized as essential. ...
Este proyecto pretende definir, a manera de estudio, cuáles son las diferentes amenazas y vulnerabil...
Currently companies do not import their asset classification of asset types of customers, cash, vehi...
El presente trabajo se basa en la identificación de amenazas y vulnerabilidades hacia los activos má...
Many different meanings are covered by this word: "security", depending on the application environme...
Performing vulnerability analysis and penetration tests is becoming more and more important for the ...
This article makes a thoughtful research on the different threats that arise in industrial control s...