GR Semicolon EN

Show simple item record

dc.contributor.author
Parcharidis, Miltiadis
el
dc.date.accessioned
2018-06-12T08:32:09Z
dc.date.available
2018-06-13T00:00:11Z
dc.date.issued
2018-06-12
dc.identifier.uri
https://repository.ihu.edu.gr//xmlui/handle/11544/29209
dc.rights
Default License
dc.subject
SCADA
en
dc.subject
Cyber attacks
en
dc.subject
Open source
en
dc.title
Simulation of cyber attacks against SCADA systems
en
heal.type
masterThesis
en_US
heal.keywordURI.LCSH
Supervisory control systems--Security measures
heal.keywordURI.LCSH
Automatic data collection systems--Security measures
heal.keywordURI.LCSH
Technology--Risk assessment
heal.keywordURI.LCSH
Computer security
heal.keywordURI.LCSH
Computer networks--Security measures
heal.language
en
en_US
heal.access
free
en_US
heal.license
http://creativecommons.org/licenses/by-nc/4.0
en_US
heal.recordProvider
School of Science and Technology, MSc in Communications and Cybersecurity
en_US
heal.publicationDate
2018-05-14
heal.abstract
Our everyday lives heavily depend on Critical Infrastructures and SCADA systems are one of their major backbones. The IT science has managed to create subsystems and protocols that combine electrical and mechanical technology to monitor and command a plethora of Remote Terminal Units or PLCs, forming a network of devices and computers. Unfortunately, the primal protocols do not include the security mindset as they have been built with no vision or with air-gapped intensions. Todays’ world though is interconnected and the need to monitor everything from a distance is essential. This is also the entry point for a malicious user to attempt cyber-attacks against Critical Infrastructures by taking advantage the naivety of SCADA implementation at its total. In this thesis, a simulated SCADA environment is attacked by using open source tools in various ways to achieve the disruption of the normal behavior of the system. The experiments are proportionally less disruptive in malfunctions and in numbers but manage to raise attention and thoughts around the old protocols that are still being used in many SCADA systems some of which in Critical Infrastructures.
en
heal.advisorName
Katsikas, Sokratis
el
heal.committeeMemberName
Kalloniatis, Christos
en
heal.committeeMemberName
Baltatzis, Dimitrios
en
heal.committeeMemberName
Katsikas, Sokratis
en
heal.academicPublisher
IHU
en
heal.academicPublisherID
ihu
en_US
heal.numberOfPages
79
en_US


This item appears in the following Collection(s)

Show simple item record

Related Items