Whitepaper: “Meet Your Attacker – Taxonomy & Analysis of a SCADA Attacker”

   Jan 12, 2019 | Radiflow team

As industrial control systems grow in complexity, the ability to evaluate their vulnerability to attack becomes increasingly important to automate.

Security assessment tools usually begin by determining vulnerabilities of individual hosts. Using this and other information, such as connectivity between hosts, it’s possible to show the potential exploits attackers could use and the paths they can take to gain unauthorized access to a device on the ICS network.

Automating this process ensures that every possible attack path is considered, and that the paths contain only those network entities that the intruder is capable of exploiting.

Additional Resources

Request Demo Contact Us
Skip to content