Continued from technical article: Detecting Cyber Intrusion in SCADA System The Three R’s As Response The “three R’s” of the response to cyber intrusion are: Recording, Reporting, and Restoring. Theoretically, it would be desirable to record all data communications into and out of all substation devices. In that manner, if an intruder successfully attacks the […] Read more
[post-views]Responding to Cyber Intrusion in SCADA System
Continued from technical article: Detecting Cyber Intrusion in SCADA System The Three R’s As Response The “three R’s” of the response to cyber intrusion are: Recording, Reporting, and Restoring. Theoretically, it would be desirable to record all data communications into and out of all substation devices. In that manner, if an intruder successfully attacks the […]