Responding to Cyber Intrusion in SCADA System

Continued from technical article: Detecting Cyber Intrusion in SCADA System The Three R’s As Response The “three R’s” of the response to cyber intrusion are: Recording, Reporting, and Restoring. Theoretically, it would be desirable to record all data communications into and out of all substation devices. In that manner, if an intruder successfully attacks the […]

Continued from technical article: Detecting Cyber Intrusion in SCADA System The Three R’s As Response The “three R’s” of the response to cyber intrusion are: Recording, Reporting, and Restoring. Theoretically, it would be desirable to record all data communications into and out of all substation devices. In that manner, if an intruder successfully attacks the […] Read more

[post-views]

Leave a Reply

Your email address will not be published. Required fields are marked *