Programmable logic controllers based systems (PLC-BS): vulnerabilities and threats

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A rule-based evaluation of ladder logic diagram and timed petri nets for programmable logic controllers

This paper describes an evaluation through a case study by measuring a rule-based approach, which proposed for ladder logic diagrams and Petri nets. In the beginning, programmable logic controllers were widely designed by ladder logic diagrams. When complexity and functionality of manufacturing systems increases, developing their software is becoming more difficult. Thus, Petri nets as a high l...

متن کامل

a rule-based evaluation of ladder logic diagram and timed petri nets for programmable logic controllers

this paper describes an evaluation through a case study by measuring a rule-based approach, which proposed for ladder logic diagrams and petri nets. in the beginning, programmable logic controllers were widely designed by ladder logic diagrams. when complexity and functionality of manufacturing systems increases, developing their software is becoming more difficult. thus, petri nets as a high l...

متن کامل

Information Systems Threats and Vulnerabilities

Vulnerability of Information Systems is a major concern these days in all spheres of Financial, government, private sectors. Security of the Information Systems is one of the biggest challenges faces by almost all the organizations in today's world. Even though most of the organizations have realized the value of information and the part it plays in the success of the business, yet only a ...

متن کامل

Ghost in the PLC Stealth On-The-Fly Manipulation of Programmable Logic Controllers I/O

Programmable Logic Controllers (PLCs) are a family of embedded devices used for physical process control. Similar to other embedded devices, PLCs are vulnerable to cyber attacks. Because they are used to control the physical processes of critical infrastructures, compromised PLCs constitute a significant security and safety risk. In this paper, we investigate attacks against PLCs by introducing...

متن کامل

Vulnerabilities and Threats in Distributed Systems

We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and threats. They are: using fault tolerance and reliability principles for security, enhancing role-based access control with trust ratings, protecting privacy during data dissemination and collaboration, and applying frau...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SN Applied Sciences

سال: 2019

ISSN: 2523-3963,2523-3971

DOI: 10.1007/s42452-019-0860-2