Cyber security analysis using vulnerability assessment and penetration testing

Author(s):  
Prashant S. Shinde ◽  
Shrikant B. Ardhapurkar

Due to the wide application of SCADA systems in national critical infrastructure, their cyber security issues and vulnerabilities have been a primary concern; whereas, the impact and consequences of cyber-attacks to these systems have the potential to result in catastrophic consequences in the physical domain. Therefore, estimating possible attack impacts and identifying system vulnerabilities are major concern in SCADA management and operations. However, it is quite difficult to plan, execute and review vulnerability analysis in critical infrastructure systems as well as in industrial control systems (such as SCADA system) due to its complexity, large-scale and heterogeneity. Consequently, a consistent domain-specific conceptual model is required to establish a generic framework for cyber security analysis to examine and investigate security threats on cyber-physical systems, the role of the entities within the system as well as system operations. The main contribution of this work is to present a multi-facets model to support cyber security analysis practices such as penetration testing, vulnerability assessment and risk analysis. The proposed model presents a common insight among different SCADA configurations, implementations and the employed protocols to handle its complexity, heterogeneous and scale. To demonstrate the usability as a proof of concept and applicability of the proposed model, the paper also presents an example illustrating how the proposed model can be employed to carry out security vulnerability assessment.


2019 ◽  
Vol 1 (1) ◽  
pp. 18-22
Author(s):  
Rama Sahtyawan

Serangan terhadap sistem komputer dari waktu ke waktu semakin meningkat dan semakin canggih. Perusahaan dituntut untuk memastikan Cyber Security yang aman untuk melindungi dari serangan hacker. Penelitian ini, Mengimplementasikan VAPT (Vulnerability Assessment and Penetration Testing) menggunakan metode ZEH (Zero Entry Hacking)Penetration Testing Methodology untuk mengetahui kerentanan SMB (server Message block) dan RDP(remote desktop) pada server yang dapat dieksploitasi serta memberi penyerang hak akses terhadap server yang mampu memanipulasi data pada server.


Author(s):  
Ievgen Babeshko ◽  
Kostiantyn Leontiiev

Safety assessment of nuclear power plant instrumentation and control systems (NPP I&Cs) is a complicated and resource-consuming process that is required to be done so as to ensure the required safety level and comply to normative regulations. A lot of work has been performed in the field of application of different assessment methods and techniques, modifying them, and using their combinations so as to provide a unified approach in comprehensive safety assessment. Performed research has shown that there are still challenges to overcome, including rationale and choice of the safety assessment method, verification of assessment results, choosing and applying techniques that support safety assessment process, especially in the nuclear field. This chapter presents a developed framework that aggregates the most appropriate safety assessment methods typically used for NPP I&Cs.


Sign in / Sign up

Export Citation Format

Share Document