Remove 2016 Remove Alert Remove Malware Remove Outage
article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 1: A list of important attacks between 1982-2016 (Yadav & Paul, 2021) You can see from Table 1 that there is a wide variety of different industries, processes attacked, countries affected, methodologies used for the attack. Physical Security – Some systems may be secure within the plant.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 1: A list of important attacks between 1982-2016 (Yadav & Paul, 2021). However, they can also be remote or unmanned, giving the attacker plenty of time to access the system and plant malware. Hackers can either physically gain access to the devices or gain access to the system without alerting anyone else.