Taylor et al., 2013 - Google Patents
Siemens-INL SCADA System Assessments: Assessment 1: Spectrum Power TG & Assessment 2: Spectrum Power 3 (Final CRADA Report)Taylor et al., 2013
View PDF- Document ID
- 11579896800704393117
- Author
- Taylor T
- Erbes R
- Chaffin M
- Chugg J
- Thomas J
- Wheeler B
- Adams Z
- Publication year
External Links
Snippet
INL, in collaboration with Siemens Energy, Inc., performed a laboratory assessment on Siemens SCADA systems. During the assessment, vulnerabilities were discovered, evaluated, and mitigation strategies recommended. These results were reported to Siemens …
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GASES [GHG] EMISSION, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E10/00—Energy generation through renewable energy sources
- Y02E10/70—Wind energy
- Y02E10/72—Wind turbines with rotation axis in wind direction
- Y02E10/722—Components or gearbox
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GASES [GHG] EMISSION, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E10/00—Energy generation through renewable energy sources
- Y02E10/50—Photovoltaic [PV] energy
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2885739B1 (en) | System and method for providing a secure computational environment | |
US7343599B2 (en) | Network-based patching machine | |
US8548998B2 (en) | Methods and systems for securing and protecting repositories and directories | |
Langill | Defending against the dragonfly cyber security attacks | |
JP2022530288A (en) | How to prevent root-level access attacks and a measurable SLA security and compliance platform | |
CN118432835A (en) | CT cloud and edge cloud security platform | |
CN115720161A (en) | Network security vulnerability type analysis, vulnerability detection and information protection method | |
US8285984B2 (en) | Secure network extension device and method | |
US11770363B2 (en) | Systems and methods for secure access smart hub for cyber-physical systems | |
Varadharajan et al. | Techniques for enhancing security in industrial control systems | |
Peck et al. | Leveraging ethernet card vulnerabilities in field devices | |
CN113132412B (en) | A method for testing and checking computer network security | |
Taylor | Final CRADA Report: Siemens-INL SCADA System Assessments: Assessment 1: Spectrum Power TG Assessment 2: Spectrum Power 3 | |
Sethi et al. | Secure web application: Rudimentary perspective | |
Atighetchi et al. | A framework for resilient remote monitoring | |
Udassin | Control system attack vectors and examples: field site and corporate network | |
Gupta et al. | Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends | |
Ravindrababu | Analysis of Software-Defined Networks as a Mechanism for Enforcing Corporate Security Policies in OT Networks | |
Dunhaupt | Vulnerabilities of industrial automation systems | |
Finco et al. | Cyber Security Procurement Language for Control Systems Version 1.6 | |
Soubra et al. | An assessment of recent Cloud security measure proposals in comparison to their support by widely used Cloud service providers | |
McCormack | " Bolt-On" Network Security for Advanced Manufacturing Deployments | |
Mohammad Ali Pour | Red Team Interview Questions | |
Painter | DSS Security Assessment | |
Cui et al. | Enterprise Security Incident Analysis and Countermeasures Based on the T-Mobile Data Breach |