Interest in security assessment and penetration testing techniques has steadily increased. Likewise, security of industrial control systems (ICS) has become more and more important. Very few methodologies directly target ICS and none of them generalizes the concept of "critical infrastructures pentesting". Existing methodologies and tools cannot be applied directly to critical infrastructures (CIs) due to safety and availability requirements. Moreover, there is no clear understanding on the specific output that CI operators need from such an assessment. We propose a new methodology tailored to support security testing in ICS/CI environments. By analyzing security assessments and penetration testing methodologies proposed for other domains a...
This paper presents a mapping framework for design factors and an implementation process for buildin...
The most comprehensive handbook on critical infrastructures (CI), addressing both logical and physic...
Assessing the vulnerability of an enterprise’s infrastructure is an important step in judging the se...
Critical infrastructure experienced a transformation from isolated towards highly (inter-)connected ...
The security assessment of the ICT components of critical infrastructures is nowadays a prominent pr...
This research presents the design of new framework—a manually executed and an automated penetration ...
The increased use of technology is necessary in order for industrial control systems to maintain and...
Industrial Control Systems (ICS) are used through- out critical national infrastructure. This has th...
High assurance Cyber-Physical Systems (CPS) are the supporting pillars of the critical infrastructur...
The convergence of Industrial Control System (ICS) with Information Technologies (IT) coupled with t...
In recent years, critical infrastructures have become highly dependent on information and communicat...
Cyber threats directly affect the critical reliability and availability of modern Industry Control S...
Industrial Control Systems (ICSs) are applied to the monitoring, control, and automation of operatio...
The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governme...
In the recent years, the majority of the world’s Critical Infrastructures (CIs) have evolved to be m...
This paper presents a mapping framework for design factors and an implementation process for buildin...
The most comprehensive handbook on critical infrastructures (CI), addressing both logical and physic...
Assessing the vulnerability of an enterprise’s infrastructure is an important step in judging the se...
Critical infrastructure experienced a transformation from isolated towards highly (inter-)connected ...
The security assessment of the ICT components of critical infrastructures is nowadays a prominent pr...
This research presents the design of new framework—a manually executed and an automated penetration ...
The increased use of technology is necessary in order for industrial control systems to maintain and...
Industrial Control Systems (ICS) are used through- out critical national infrastructure. This has th...
High assurance Cyber-Physical Systems (CPS) are the supporting pillars of the critical infrastructur...
The convergence of Industrial Control System (ICS) with Information Technologies (IT) coupled with t...
In recent years, critical infrastructures have become highly dependent on information and communicat...
Cyber threats directly affect the critical reliability and availability of modern Industry Control S...
Industrial Control Systems (ICSs) are applied to the monitoring, control, and automation of operatio...
The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governme...
In the recent years, the majority of the world’s Critical Infrastructures (CIs) have evolved to be m...
This paper presents a mapping framework for design factors and an implementation process for buildin...
The most comprehensive handbook on critical infrastructures (CI), addressing both logical and physic...
Assessing the vulnerability of an enterprise’s infrastructure is an important step in judging the se...