It is the culmination of two years worth of research in how to identify a hands-on, portable small-scale approach to convey the cyber risks associated with control system environments," said Matthew E...The small-scale models highlight the real threat associated with cyber, physical, and operational risks in today's modern control system cyber assets and their default communication protocols.
Modern control system's are used to operate the majority of essential life functions enjoyed daily. The water we drink, the electricity we use and even the amusement we partake in. The control system cyber assets automating these functions were initially designed with real-world logic, such as the water level in this tank should never go beyond empty (a negative value) so it is unnecessary to address this in a logical design. They were also designed with trustworthy communication protocols with the belief that only trusted devices would communicate with them. The Internet, wireless, just-in-time designs and enhanced performance expanded the control environments beyond these trustworthy systems. November 1.
For the original version on PRWeb visit: http://www.prweb.com/releases/prweb2012/10/prweb9941899.htm