Programmable logic controllers based systems (PLC-BS): vulnerabilities and threats
نویسندگان
چکیده
منابع مشابه
A rule-based evaluation of ladder logic diagram and timed petri nets for programmable logic controllers
This paper describes an evaluation through a case study by measuring a rule-based approach, which proposed for ladder logic diagrams and Petri nets. In the beginning, programmable logic controllers were widely designed by ladder logic diagrams. When complexity and functionality of manufacturing systems increases, developing their software is becoming more difficult. Thus, Petri nets as a high l...
متن کاملa rule-based evaluation of ladder logic diagram and timed petri nets for programmable logic controllers
this paper describes an evaluation through a case study by measuring a rule-based approach, which proposed for ladder logic diagrams and petri nets. in the beginning, programmable logic controllers were widely designed by ladder logic diagrams. when complexity and functionality of manufacturing systems increases, developing their software is becoming more difficult. thus, petri nets as a high l...
متن کاملInformation Systems Threats and Vulnerabilities
Vulnerability of Information Systems is a major concern these days in all spheres of Financial, government, private sectors. Security of the Information Systems is one of the biggest challenges faces by almost all the organizations in today's world. Even though most of the organizations have realized the value of information and the part it plays in the success of the business, yet only a ...
متن کاملGhost in the PLC Stealth On-The-Fly Manipulation of Programmable Logic Controllers I/O
Programmable Logic Controllers (PLCs) are a family of embedded devices used for physical process control. Similar to other embedded devices, PLCs are vulnerable to cyber attacks. Because they are used to control the physical processes of critical infrastructures, compromised PLCs constitute a significant security and safety risk. In this paper, we investigate attacks against PLCs by introducing...
متن کاملVulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and threats. They are: using fault tolerance and reliability principles for security, enhancing role-based access control with trust ratings, protecting privacy during data dissemination and collaboration, and applying frau...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SN Applied Sciences
سال: 2019
ISSN: 2523-3963,2523-3971
DOI: 10.1007/s42452-019-0860-2