SCADA Testbed for Vulnerability Assessments, Penetration Testing and Incident Forensics

Author(s):  
Sundar Krishnan ◽  
Mingkui Wei
2019 ◽  
Vol 4 (2) ◽  
pp. 15-20
Author(s):  
Nur Khairani Kamarudin ◽  
Farah Shazwani Ismail ◽  
Mahfudzah Othman ◽  
Nurul Hidayah Ahmad Zukri ◽  
Mohd Faris Mohd Fuzi

Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data and also make users share the data faster. The purpose of the system was developed to ease the daily works and can be used frequently by photography companies as a method to send photos and videos to their customers. A penetration testing was conducted in order to test the security performance by conducting four security attacks which were Denial of Service (DoS), SQL injection, Cross Site Scripting, and sniffing password. The purpose of these attacks were conducted is to testing and finding the vulnerabilities of the system because the system deals with the customers’ privacy data which is the photos and the videos owned by the customers. This is crucial to secure a system where the first step taken as a prevention to introduce the system to the public, vulnerability assessments was performed to determine the weaknesses of the system. Scanning and vulnerability assessment are done using tools which is Vega Scanning Tool, Wireshark, and Low Orbit Ion Cannon (LOIC). All results are collected and have been analyze. As a summary of the result, it shows that the system are vulnerable to DoS attack, SQL injection attack, cross site scripting and also password sniffing.  


2006 ◽  
Vol 1 (2) ◽  
pp. 79-89
Author(s):  
Keir Dyce ◽  
Mary Barrett

M-commerce, a growing sub-category of E-business, allows business to be done ‘anywhere, anytime’. However security of wireless devices remains problematic. It is unclear whether protocols to alleviate security problems, such as wireless vulnerability assessments (WNVAs), are being used or are effective. The paper reports on a survey-based study of Australian computer security professionals’ use of and opinions about two types of WNVA: wireless monitoring and penetration testing. An initially surprising finding was how little both types are used, despite the ease with which wireless networks can be attacked and the fact that penetration testing is fairly well understood. In the light of organizational culture the survey findings become more explicable. Senior management, and even IT staff, may still hold a traditional, ‘wired network’ view of their organization. Aspects of organizational culture also appear to limit the way WNVA users go about the assessment process. A cultural shift could help change users’ perceptions about the risks and rewards of WNVAs. This could threaten IT staff’s professional identity, however, and needs further research.


Author(s):  
Palak Aar ◽  
Aman Kumar Sharma

Penetration testing is defined as the procedure of imposing as an attacker to find out the vulnerabilities in a system that can be used to gain access to system for malicious use. This paper provides an overview of penetration testing and list out the criteria used to select the best tools for the given purpose. It also provides a brief description of the selected tools and furthermore we compare those tools. The results of the comparison are shown in terms of graphs and tables.


Climate ◽  
2021 ◽  
Vol 9 (2) ◽  
pp. 25
Author(s):  
Attila Buzási

Wine producers face several challenges regarding climate change, which will affect this industry both in the present and the future. Vulnerability assessments are at the forefront of current climate research, therefore, the present paper has two main aims. First, to assess two components of climate vulnerability regarding the Szekszárd wine region, Hungary; second, to collect and analyze adaptation farming techniques in terms of environmental sustainability aspects. Exposure analyses revealed that the study area will face several challenges regarding intensive drought periods in the future. Sensitivity indicators show the climate-related characteristics of the most popular grapevines and their relatively high level of susceptibility regarding changing climatic patterns. Since both external and intrinsic factors of vulnerability show deteriorating trends, the development of adaptation actions is needed. Adaptation interventions often provide unsustainable solutions or entail maladaptation issues, therefore, an environmental-focused sustainability assessment of collected interventions was performed to avoid long-term negative path dependencies. The applied evaluation methodology pointed out that nature-based adaptation actions are preferred in comparison to using additional machines or resource-intensive solutions. This study can fill the scientific gap by analyzing this wine region for the first time, via performing an ex-ante lock-in analysis of available and widely used adaptation interventions in the viticulture sector.


Fire ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 11
Author(s):  
Charlotte Fafet ◽  
Erinë Mulolli Zajmi

Fires are among the most frequently recurring hazards affecting museums and cultural heritage sites. The fires of the National Museum of Brazil in 2018 and of Notre Dame de Paris in 2019 showed that the consequences of such events can be heavy and lead to irreversible heritage losses. In Kosovo, few studies were made about the risks that can affect cultural heritage sites. A project led by the NGO Kosovo Foundation for Cultural Heritage without Borders (CHwB Kosova) in 2018 explored the most prevalent risks for the cultural heritage sites of the country and highlighted fire as a predominant risk in Kosovo. In order to better understand it, vulnerability assessments were conducted in several museums in Kosovo. Data were collected through field visits in the different museums, in which interviews with staff members as well as observations were conducted. The aim of this paper is to present the main results of the fire vulnerability assessments conducted in Kosovo’s museums in 2018. An important aspect of this project is the approach to collect information in data-scarce environments. It is believed that the questionnaires used to lead interviews with museums’ staff members could help other practitioners to collect data in such contexts and evaluate more easily the risk of fire for the museums and their collections. In the context of Kosovo, one of the main findings is the identification and prioritisation of measures to ensure better protection of Kosovar museums. Structural mitigation measures such as alarm and fire suppression systems are not the only elements necessary to improve the resilience of Kosovar museums to fire. Indeed, the promotion of risk awareness, the training of staff members and the realisation of crisis simulation exercises are just as important in order to prevent and detect a fire, and above all, to respond quickly and accurately if a fire occurs.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Ivan Dario Lopez ◽  
Apolinar Figueroa ◽  
Juan Carlos Corrales

Sign in / Sign up

Export Citation Format

Share Document