Remove 2016 Remove Architecture Remove Malware
article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 1: A list of important attacks between 1982-2016 (Yadav & Paul, 2021) You can see from Table 1 that there is a wide variety of different industries, processes attacked, countries affected, methodologies used for the attack. Architecture and security of SCADA systems: A review. & MANIMARAN, G., YADAV, G. &

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 1: A list of important attacks between 1982-2016 (Yadav & Paul, 2021). However, they can also be remote or unmanned, giving the attacker plenty of time to access the system and plant malware. Architecture and security of SCADA systems: A review. Physical Security – Some systems may be secure within the plant.

article thumbnail

Guest Post: Cybersecurity Incidents Lead to New Standards, Requirements

Security Industry Association

The two most significant recent incidents in the cybersecurity timeline were the Mirai botnet of 2016 and the SolarWinds breach of 2020. The hack targeted the network management company’s Orion software, injecting it with malware that was then sent to approximately 18,000 public and private organizations through a customer software update.