Stockholm / Washington / D.C. / Florence / Dalian / Chicago / /
Company
Secure Control Systems / Hercules / Computer Sciences / Intrusion Detection Systems / Wiley & Sons / Building Dependable Distributed Systems / Intrusion Detection/Prevention Systems / ISA Emerging Technologies / Symantec / Wind River Systems / Embedded Computing Systems / Intel / Microsoft / Cyber-Physical Systems / /
Continent
Asia / /
Country
China / Italy / Sweden / United States / / /
Event
FDA Phase / /
Facility
Plant Floor / Electric Power Research Institute / Virginia Polytechnic Institute / Carnegie Mellon University / UDP port / British Columbia Institute of Technologys Internet Engineering Lab / Control Center Communications Protocol / Computer Sciences University of California at Berkeley / British Columbia Institute of Technology / State University / /
IndustryTerm
cyber security solutions / real-time system / level devices / control center network / transportation / command-and-control software / weak default hashing algorithm / legacy networks / Web application / process hardware / web accessibility / electricity pricing / connected interfaced device / real-time operating / continuous systems / soft real-time systems / real-time information exchange / control networks / application layer protocol / transmission control protocol/Internet protocol / target network / energy / real-time process control systems / control algorithm / estimation algorithms / control device / certain operating systems / remote devices / industrial networks / soft real-time systems leads / process control networks / electricity infrastructure enterprises / communication chain / industrial automation software / real-time systems / Internet reference model / security solutions / poor software design / detection systems / control algorithms / real time process data / soft real-time system / station control devices / industrial control systems / electric utilities / field devices / strength database applications / Wireless Networks / Internet connections / modified Internet Control message Protocol / transport protocols / data historian server / foreign intelligence services / servomechanical device / software applications / wireless technologies / networked field devices / Web attacks / relational database applications / control systems / corporate network / communication devices / live audio-video systems / communication network / conventional encryption block algorithms / wireless devices / remote device / /
NaturalFeature
mount SCADA / /
OperatingSystem
UNIX / VxWorks / Microsoft Windows / DoS / /
Organization
University of California / Polytechnic Institute / British Columbia Institute of Technologys Internet Engineering Lab / State University / Central Intelligence Agency / Department of Homeland Securitys / Carnegie Mellon University / Master Terminal Unit / United States Government Accountability Office / British Columbia Institute of Technology / National Science Foundation / Stateds Government Accountability Office / Electric Power Research Institute / ISO Transport Service / Emerging Technologies Conference / Instrumentation Systems and Automation Society / /
Person
Anthony Joseph / Shankar Sastry / Daniel Lough / Peter Baer Galvin / Ray Hunt / John D. Howard / Simon Hansman / Paul Kocher / Nicolas Falliere / Abraham Silberschatz / Octavio Nieto-Taladriz Garcia / Greg Gagne / Anand Raghunathan / Sunil Hattangady / Kevin S. Killourhy / Chun Man / Bonnie Zhu / Roy A. Maxion / Eric Byres / Kymie M. C. Tan / Joel Carter / Liam O Murchu / Amr Elramly / Stewart Baker / Victor K. Wei / Phil Muncaster / Natalia Filipiak / Marcelo Masera / Dan Hoffman / Katrina Timlin / Igor Nai Fovino / Mark Grimes / /
Position
first author / historian / central controller / compromised central serverl/controller / representative / controller historian / smart drive controller / controller / control engineer / /
Product
Achilles Vulnerability Test Platform / SQL injection / C-130 Hercules / C. SQL Injection / most / /
ProgrammingLanguage
SQL / C / /
ProvinceOrState
California / Ontario / /
Technology
TCP protocol / specific SCADA protocols / Information Technology / API / VxWorks / conventional encryption block algorithms / operating system / TCP/IP protocol / modified Internet Control message Protocol / transport protocols / application layer protocol / encryption / Real-time operating system / control algorithms / RPC-based protocol / SCADA protocol / weak default hashing algorithm / wireless technologies / Bluetooth / network operations center / LAN / RTOS system / relational database / wireless devices / UNIX / MAC address / control algorithm / SCADA protocols / UDP / operating systems / process control / TCP/IP / estimation algorithms / pdf / transmission control protocol/Internet protocol / Ethernet / edge device / DNS / controlling algorithms / RTOS / /