Whitepaper: “Optimizing OT Security through Automatic Attacker Evaluation”

   Feb 12, 2019 | Radiflow team

Estimating potential cyber intruder activities and what attack path they may take to access our critical assets is important in understanding how we prioritize our security measures.


This paper focuses on an optimized method for automatically assessing those attack routes taking into account the challenges found due to the unique properties of industrial control systems.


This model takes into consideration threats, vulnerabilities, mitigation activities and potential impact to industrial components. With this model, we can determine potential routes that an intruder could take and prioritize each path based on the potential risk to the industrial application.

Additional Resources

Request Demo Contact Us
Skip to content