How to recognize intrusion? One of the axioms of cyber security is that although it is extremely important to try to prevent intrusions into one’s systems and databases, it is essential that intrusions be detected if they do occur. An intruder who gains control of a substation computer can modify the computer code or insert […] Read more
[post-views]Detecting Cyber Intrusion in SCADA System
How to recognize intrusion? One of the axioms of cyber security is that although it is extremely important to try to prevent intrusions into one’s systems and databases, it is essential that intrusions be detected if they do occur. An intruder who gains control of a substation computer can modify the computer code or insert […]