This paper will separate the fact from fiction on the threats and vulnerabilities to SCADA systems and
networks. It will outline how SCADA systems have inherent vulnerabilities that can be best resolved by
adhering to security best practices. Considering that security tools have long secured corporate networks, this paper will offer how these same solutions can be used to mitigate the risks to SCADA systems.
Please supply your email address to access the content.
Copyright 2013 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.