Over the last few years modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, PLCs, SCADA systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others coul...
Cyberphysical systems (CPSs) refer to the embedding of widespread sensing, networking, computation, ...
Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho Na...
Part 1: KeynoteInternational audienceThe threat landscape is continuously evolving. Large, widesprea...
Over the last few years modern accelerator and experiment control systems have increasingly been bas...
Over the last decade modern accelerator and experiment control systems have increasingly been based...
Over the last few years modern accelerator and experiment control systems have increasingly been bas...
Over the last decade modern accelerator and experiment control systems have increasingly been based ...
The enormous growth of the Internet during the last decade offers new means to share and distribute ...
Today, the industralized world lives in symbiosis with control systems: it depends on power distribu...
PCS are used to control parts of the critical infrastructure of society, such as electric utilities,...
COMPUTER SECURITY SERIES - @CERN Securing IT systems in themselves is already a challenge. But when...
CERN (European Organization for Nuclear Research),like any organization, needs to achieve the confli...
The CERN high energy particle physics facility at Geneva, Switzerland will incorporate a wide range ...
2010 has seen wide news coverage of a new kind of computer attack, named "Stuxnet", target...
Detecting, investigating and prosecuting cybercrime? Extremely important, but not really the solutio...
Cyberphysical systems (CPSs) refer to the embedding of widespread sensing, networking, computation, ...
Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho Na...
Part 1: KeynoteInternational audienceThe threat landscape is continuously evolving. Large, widesprea...
Over the last few years modern accelerator and experiment control systems have increasingly been bas...
Over the last decade modern accelerator and experiment control systems have increasingly been based...
Over the last few years modern accelerator and experiment control systems have increasingly been bas...
Over the last decade modern accelerator and experiment control systems have increasingly been based ...
The enormous growth of the Internet during the last decade offers new means to share and distribute ...
Today, the industralized world lives in symbiosis with control systems: it depends on power distribu...
PCS are used to control parts of the critical infrastructure of society, such as electric utilities,...
COMPUTER SECURITY SERIES - @CERN Securing IT systems in themselves is already a challenge. But when...
CERN (European Organization for Nuclear Research),like any organization, needs to achieve the confli...
The CERN high energy particle physics facility at Geneva, Switzerland will incorporate a wide range ...
2010 has seen wide news coverage of a new kind of computer attack, named "Stuxnet", target...
Detecting, investigating and prosecuting cybercrime? Extremely important, but not really the solutio...
Cyberphysical systems (CPSs) refer to the embedding of widespread sensing, networking, computation, ...
Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho Na...
Part 1: KeynoteInternational audienceThe threat landscape is continuously evolving. Large, widesprea...