CEC Semenster Undefined
Introduction to SCADA Security
Clint Bodungen -
CEC Archives | CEC Semenster Undefined | Introduction to SCADA Security
December 16,
2013
State of the Industry
This class will take a high level look at the evolution of SCADA systems over the past decade and compare traditional IT networks with SCADA networks in terms of their security and mitigation differences and pitfalls. We will then review significant exposures and incidents that have affected SCADA systems.
Course Resources
Special Educational Materials
December 17,
2013
Threat Sources
Before you can protect your systems from a threat, you must know what the threats are. This class takes a comprehensive look at the different threat sources that could affect SCADA operations environments, along with their motivations and objectives.
Course Resources
Special Educational Materials
December 18,
2013
Vulnerabilities
From people to processes to technology, vulnerabilities are the reason security is needed. Unfortunately, the sheer number of vulnerabilities in existence makes dealing with them a daunting task. This class helps students understand vulnerabilities by examining the root cause of vulnerabilities from a high level and then provides strategies to help reduce the mitigation effort by grouping them into common mitigation categories.
Course Resources
Special Educational Materials
December 19,
2013
Attack Methods
Once you know the threat sources and the vulnerabilities within your own systems, knowing the methods of how these systems can be attacked is a key component to formulating a pragmatic and efficient mitigation strategy. This class will look at the entire anatomy of an attack from start to finish and how hackers go about attacking SCADA systems specifically.
Course Resources
Special Educational Materials
December 20,
2013
Mitigation Strategies
This class puts everything from the previous four Days together. We will review general security mitigation principles and then learn how to apply knowledge of SCADA specific threats, vulnerabilities, and attack methods to formulate pragmatic and efficient mitigation strategies that are safe for SCADA systems and tailored to their environment.
Course Resources
Special Educational Materials
Instructor
Clint Bodungen