Cyber-Attack Penetration Test and Vulnerability Analysis
نویسندگان
چکیده
منابع مشابه
Cyber-Physical Vulnerability Analysis
Electrical power systems consists of various components including physical components such as generator, transmission lines, buses, loads, transformers etc. and discrete components such as protection relays and other supervisory and control devices. Cyber failures in discrete components such as protection devices contribute towards cascading failures resulting in blackouts in electrical power t...
متن کاملVulnerability Analysis of Power Systems Based on Cyber-Attack and Defense Models
Reliable operation of power systems is a primary challenge for the system operators. With the advancement in technology and grid automation, power systems are becoming more vulnerable to cyber-attacks. The main goal of adversaries is to take advantage of these vulnerabilities and destabilize the system. This paper describes a game-theoretic approach to attacker / defender modeling in power syst...
متن کاملVulnerability Assessment and Penetration Testing
In this modern world, all of the persons are using the facility of internet. SECURITY is one of the major issue of the internet. Everyday highly skilled hackers breach the security and take the advantage of vulnerabilities to access the confidential data. To overcome this problem one solution was suggested named Vulnerability Assessment and Penetration Testing (VAPT). Vulnerability Assessment i...
متن کاملCyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کاملCyber Reconnaissance: An Alarm before Cyber Attack
Today’s cyber world is more than the internet. It is interdependent networks containing telecommunication network, embedded system and critical infrastructures. Malicious attacks on critical infrastructure become a major threat to business and government operations. An easy and fast access to network makes business successful and makes sensitive information more vulnerable to cyber thieves. Tod...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Online Engineering (iJOE)
سال: 2017
ISSN: 1861-2121,1868-1646
DOI: 10.3991/ijoe.v13i01.6407