Back to Results
First PageMeta Content
Security / Software testing / Computer network security / Electronic warfare / Military technology / Physical security / SCADA / Vulnerability / Attack / Cyberwarfare / Computer security / Hacking


ICS Defense Use Case (DUC) Dec 20, 2014 Authors: Robert M. Lee Michael J. Assante Tim Conway
Add to Reading List

Document Date: 2014-12-22 13:11:05


Open Document

File Size: 678,42 KB

Share Result on Facebook

City

Refahiye / Baku / Tbilisi / /

Company

Bloomberg / Impacted Systems / Twitter / /

Country

Turkey / Russia / Georgia / /

Facility

pipeline Cyber Attack Note / BTC pipeline / /

IndustryTerm

increased event correlation tools / internal control network / control network / communication software / camera systems / forensics tools / energy policy / camera communication software / communications systems / control systems / security camera network / remote facility communications / wireless exploitation / law enforcement / communication network / alarm server / real-time and historical cyber events analysis / back-up satellite communication links / malicious software / accessible wireless signal / remote Internet connection / internal network / /

OperatingSystem

Linux / Microsoft Windows / /

Organization

Russian government / Russian parliament / Agency of Russian Special Services / /

Person

Robert M. Lee / Michael J. Assante Tim Conway / M. Lee Michael / /

/

Position

pipeline operator spokesperson / advisor / actor / malicious actor / regional analyst / analyst / state-sponsored cyber actor / /

Technology

control network / Linux / operating system / VSAT / /

URL

http /

SocialTag