Back to Results
First PageMeta Content
Telemetry / Automation / Industrial automation / SCADA / Modbus / DNP3 / Process control network / Vulnerability / Remote Terminal Unit / Technology / Computer network security / Cyberwarfare


SCADA Protocol Vulnerability Analysis
Add to Reading List

Document Date: 2004-11-30 07:27:17


Open Document

File Size: 272,32 KB

Share Result on Facebook

City

Provence / Albuquerque / Berlin / Chicago / /

Company

Advanced Information Technology / ISA 2002 Emerging Technologies / Modicon Corporation / Critical Infrastructure Control Systems / Sandia National Laboratories / Dr Dobb’s Journal / Cisco Systems Inc. / SCADA Systems Eric J. Byres Group / Industrial Control Systems / Schneider Electric / /

Country

France / United States / /

/

Event

FDA Phase / /

Facility

British Columbia Institute / building AND / building Attack / Scan HTTP/SNMP/Telnet port / building This / Carnegie Mellon Software Engineering Institute / building OR / Factory Floor / /

IndustryTerm

trusted devices / transportation / field site equipment / gateway devices / communication systems / wireless link / process control network / communication protocol / protocol capture tool / particular underlying technology vulnerabilities / electrical generation/distribution / slave device / plant site / information technology world / Internet-based intrusion / important tool / control networks / application layer protocol / unsecured remote site / communications media / energy / link media / un-trusted Internet / communications protocols / communications system / Compromise connection device / closed serial network / request/response protocols / technology vulnerabilities / control device / to multiple network / industrial networks / control systems / energy sector operators / corporate network / bypass connection device / automotive / oil refinery / energy operators / networked systems / Wireless PCN rd / Gain wireless access / wireless control network connections / on-device / transmission media / transmission infrastructure / security protocols / real-world devices / party network / secondary applications / petrochemical / security solutions / /

OperatingSystem

DoS / Microsoft Windows / /

Organization

British Columbia Institute of Technology / US government / International Emergency Management Society / Congress / Service Against Networked Device / Carnegie Mellon Software Engineering Institute / Sophia-Antipolis / Modbus Organization / Emerging Technologies Conference / Instrumentation / Systems and Automation Society / National Infrastructure Security Coordination Centre / /

Person

Matthew Franz / Attacks Disrupt Master / Dillinger / Bruce Schneier / /

Position

Programmable Logic Controller / researcher / service engineer / Administrator / representative / / locksmith / /

Product

Open Systems Interconnection / DNP3 / V1 / /

ProvinceOrState

New Mexico / /

Technology

MODBUS protocol / SNMP / LAN / routing protocol Border Gateway Protocol / control network / MODBUS application protocol / communications protocols / information technology / 10 protocols / underlying application layer protocol / operating system / UDP / layer-7 protocol / Process Control / WAN / TCP/IP / EtherNET / network protocol / wireless access / existing security protocols / request/response protocols / communication protocol / MBAP protocol / HTTP / MODBUS/TCP protocol / DNP3 protocol / MODBUS Message Scanning Tool Management/Application Protocol / /

URL

http /

SocialTag