مقالات ISI مدیریت

?Control systems/SCADA forensics, what’s the difference

A B S T R A C T

Immature IT security, increasing network connectivity and unwavering media attention is
causing an increase in the number of control system cyber security incidents. For forensic
examinations in these environments, knowledge and skills are needed in the field of
hardware, networks and data analysis. For forensic examiners, this paper is meant to be a
crash course on control systems and their forensic opportunities, focussing on the differences
compared to regular IT systems. Assistance from experienced field engineers during
forensic acquisition of control systems seems inevitable in order to guarantee process
safety, business continuity and examination efficiency. For people working in the control
system community, this paper may be helpful to get an idea about specific forensic issues
about which they would normally not bother, but may be crucial as soon as their systems
are under attack or become part of a law enforcement investigation. For analysis of acquired
data, existing tools for network security monitoring have useful functionality for
forensic applications but are designed for real-time acquisition and often not directly
usable for post-mortem analysis of acquired data in a forensically sound way. The constant
and predictable way in which control systems normally behave makes forensic application
of anomaly-based threat detection an interesting topic for further research.
© 2014 Elsevier Ltd. All rights reserved.

[aio_button align=”none” animation=”none” color=”red” size=”small” icon=”none” text=”انجام مقاله علمی پژوهشی و ISI در این زمینه” target=”_blank” relationship=”dofollow” url=”http://payannameha.ir/?p=796″]

[aio_button align=”none” animation=”none” color=”orange” size=”small” icon=”none” text=”دریافت سایر مقالات در این زمینه” target=”_blank” relationship=”dofollow” url=”http://payannameha.ir/?page_id=297″]

[aio_button align=”none” animation=”none” color=”blue” size=”small” icon=”none” text=”انجام پایان نامه در این حوزه” relationship=”dofollow” url=”http://payannameha.ir/?page_id=3206″]

[aio_button align=”none” animation=”none” color=”pink” size=”small” icon=”none” text=”انجام پروپوزال در این حوزه” target=”_blank” relationship=”dofollow” url=”http://payannameha.ir/?page_id=3206″]

[aio_button align=”none” animation=”none” color=”green” size=”small” icon=”none” text=”ترجمه تخصصی این مقاله” target=”_blank” relationship=”dofollow” url=”http://payannameha.ir/?p=154″]

جهت خرید فایل به انتهای صفحه مراجعه نمایید

کد محصول : شماره 35

jozvekade (35)

[aio_button align=”none” animation=”none” color=”green” size=”small” icon=”none” text=”پرداخت کارت به کارت” target=”_blank” relationship=”dofollow” url=”http://jozvekade.ir/?page_id=1139″]

دیدگاهتان را بنویسید