This thesis reviews traditional ransomware attack trends in order to present a taxonomy for ransomware targeting industrial control systems. After reviewing a critical infrastructure ransomware attack methodology, a corresponding response and recovery plan is described. The plan emphasizes security through redundancy, specifically the incorporation of standby programmable logic controllers. This thesis goes on to describe a set of experiments conducted to test the viability of defending against a specialized ransomware attack with a redundant controller network. Results support that specific redundancy schemes are effective in recovering from a successful attack. Further experimentation is conducted to test the feasibility of industrial con...
Supervisory Control and Data Acquisition (SCADA) systems are increasingly being connected to corpora...
Millions of people rely on vital utility infrastructure such as oil pipelines and water treatment pl...
The proliferation of cyberattacks in the software supply chain domain is a pressing concern making t...
This culminating experience project examined ransomware assaults that have targeted airport manageme...
Ransomware has become a global problem, striking almost every sector that uses computers, from indus...
Critical infrastructures and industrial organizations aggressively move towards integrating elements...
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly ...
The inevitable integration of critical infrastructure to public networks has exposed the underlying ...
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly ...
Ransomware is classified as one of the main types of malware and involves the design of exploitation...
Vulnerabilities in software, whether they be malicious or benign are a major concern in every sector...
Ransomware is classified as one of the main types of malware and involves the design of exploitation...
Ransomware is classified as one of the main types of malware and involves the design of exploitation...
Industrial Control Systems are essential to managing national critical infrastructure, yet the secur...
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly ...
Supervisory Control and Data Acquisition (SCADA) systems are increasingly being connected to corpora...
Millions of people rely on vital utility infrastructure such as oil pipelines and water treatment pl...
The proliferation of cyberattacks in the software supply chain domain is a pressing concern making t...
This culminating experience project examined ransomware assaults that have targeted airport manageme...
Ransomware has become a global problem, striking almost every sector that uses computers, from indus...
Critical infrastructures and industrial organizations aggressively move towards integrating elements...
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly ...
The inevitable integration of critical infrastructure to public networks has exposed the underlying ...
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly ...
Ransomware is classified as one of the main types of malware and involves the design of exploitation...
Vulnerabilities in software, whether they be malicious or benign are a major concern in every sector...
Ransomware is classified as one of the main types of malware and involves the design of exploitation...
Ransomware is classified as one of the main types of malware and involves the design of exploitation...
Industrial Control Systems are essential to managing national critical infrastructure, yet the secur...
This report addresses the cyber-vulnerability of critical infrastructure industries which regularly ...
Supervisory Control and Data Acquisition (SCADA) systems are increasingly being connected to corpora...
Millions of people rely on vital utility infrastructure such as oil pipelines and water treatment pl...
The proliferation of cyberattacks in the software supply chain domain is a pressing concern making t...