Conference Proceeding
Refine
Year of publication
- 2017 (17) (remove)
Document Type
- Conference Proceeding (17) (remove)
Language
- English (17) (remove)
Keywords
- Competence Developing Games (1)
- Gamification (1)
- Image Database (1)
- Image Forensics (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- Mobile Phones (1)
- Optimal Topology (1)
- Piecewise Linearization (1)
- Process design (1)
- Process reference model (1)
- Serious Games (1)
- Similarity Theory (1)
- Ventilation System (1)
- enhanced Telecom Operations Map (eTOM) (1)
- learning theories (1)
- motivation theories (1)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (17) (remove)
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.