Meet Your Attacker: Taxonomy & Analysis of a SCADA Attacker

Meet Your Attacker: Taxonomy & Analysis of a SCADA Attacker

Cyber incident reporting in SCADA systems gives us invaluable insight into the burgeoning threat landscape and helps the security community understand what threats we face, thus enabling teams to establish a robust defense strategy. However, the increase in the number of reports, each with different analysis methodology, makes it challenging to derive a coherent and clear conclusion from these cases.

Download this whitepaper which:

  • Suggests an evidence-based taxonomy to analyze SCADA related incidents
  • Distinguishes between priorities which are more technical (e.g. the type of malware used) and non-technical (e.g. desired impact)
  • Discusses from of the trends that can be easily derived from the taxonomy-based analysis



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.