Remove 2015 Remove Architecture Remove Outage Remove Vulnerability
article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed. Remote Access – As systems are often widely dispersed, remote access is more vulnerable to unauthorised access. Architecture and security of SCADA systems: A review.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed. Remote Access – As systems are often widely dispersed, remote access is more vulnerable to unauthorised access. Architecture and security of SCADA systems: A review.