Online Discoverability and Vulnerabilities of ICS/SCADA Devices in the Netherlands

11/03/2020
by   Joao M. Ceron, et al.
0

On a regular basis, we read in the news about cyber-attacks on critical infrastructures, such as power plants. Such infrastructures rely on the so-called Industrial Control Systems (ICS) / Supervisory Control And Data Acquisition (SCADA) networks. By hacking the devices in such systems and networks, attackers may take over the control of critical infrastructures, with potentially devastating consequences. This report focusses on critical infrastructures in the Netherlands and investigates three main questions: 1) How many ICS/SCADA devices located in the Netherlands can be easily found by potential attackers?, 2) How many of these devices are vulnerable to cyber-attacks?, and 3) What measures should be taken to prevent these devices from being hacked?

READ FULL TEXT

page 1

page 7

page 9

page 17

page 23

page 26

page 29

page 41

research
06/05/2019

Investigation of Cyber Attacks on a Water Distribution System

A Cyber Physical System (CPS) consists of cyber components for computati...
research
12/09/2018

Fishy Cyber Attack Detection in Industrial Control Systems

Cyber attacks have become serious threats to Industrial Control systems ...
research
10/11/2018

USBCaptchaIn: Preventing (Un)Conventional Attacks from Promiscuously Used USB Devices in Industrial Control Systems

Industrial Control Systems (ICS) are sensible targets for high profile a...
research
01/17/2018

Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices

Purpose: Used extensively in the diagnosis, treatment, and prevention of...
research
06/10/2021

Myths and Misconceptions about Attackers and Attacks

This paper is based on a three year project during which we studied atta...
research
02/15/2019

ForestFirewalls: Getting Firewall Configuration Right in Critical Networks (Technical Report)

Firewall configuration is critical, yet often conducted manually with in...
research
03/08/2021

Socio-Technical Root Cause Analysis of Cyber-enabled Theft of the U.S. Intellectual Property – The Case of APT41

Increased connectivity has made us all more vulnerable. Cyberspace, besi...

Please sign up or login with your details

Forgot password? Click here to reset