Exposed Infrastructures - Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices
Offered By: IEEE via YouTube
Course Description
Overview
Explore the critical issue of exposed industrial control system (ICS) remote management devices in this 19-minute IEEE conference talk. Delve into the research conducted by experts from Yokohama National University, TU Delft, and the National Institute of Information and Communications Technology as they present their findings on device discovery, honeypot observations, and notification campaigns. Gain insights into the vulnerabilities of ICS infrastructures and learn about potential attacks and remediation strategies. Understand the importance of securing these critical systems and the steps being taken to address this pressing cybersecurity concern.
Syllabus
Introduction
Device Discovery
Honeypot Observation
Notification Campaign
Conclusion
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Основные методы обеспечения информационной безопасностиE-Learning Development Fund via Coursera Assessing the Security Posture of ICS Infrastructure Using ISA 62443 Standard
nullcon via YouTube The Internet of Insecure Things - 10 Most Wanted List
YouTube Attacking Electric Motors for Fun and Profit
Black Hat via YouTube Exfiltrating Reconnaissance Data from Air-Gapped ICS - SCADA Networks
Black Hat via YouTube