Skip to Main Content
Handbook of SCADA/Control Systems Security
book

Handbook of SCADA/Control Systems Security

by Robert Radvanovsky, Jacob Brodsky
April 2016
Intermediate to advanced content levelIntermediate to advanced
383 pages
13h 29m
English
CRC Press
Content preview from Handbook of SCADA/Control Systems Security
193Forensics Management
• The ability to bypass rewalls, IDSs, and other security devices through
route changes
• The capability to act as a sniffer on network monitor
• The capability to intercept and modify trafc
The evidence available on the vast majority of routers is volatile in nature. This
means that evidence will be lost if any number of events occur. This can be anything
from a loss of power through to timeouts and natural system purges. Information
contained in the active physical memory of the router will be lost on a power-down.
Additionally, static memory sources (such as ash memory) may be overwritten
if an orderly shutdown is allowed to occur. Much of the information contained
within a router that is related to a forensic ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Houbing Song, Glenn A. Fink, Sabina Jeschke
Techno Security's Guide to Securing SCADA

Techno Security's Guide to Securing SCADA

Greg Miles, Jack Wiles, Ted Claypoole, Phil Drake, Paul A. Henry, Lester J. Johnson, Sean Lowther, Marc Weber Tobias, James H. Windle

Publisher Resources

ISBN: 9781466502260