21.03.2013 Views

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

List of Figures<br />

2.1 Example exposure time-map with red marking systems with known exploits 28<br />

2.2 Node information within visualisation . . . . . . . . . . . . . . . . . . . . . 28<br />

2.3 Vulnerable node information within visualisation . . . . . . . . . . . . . . . 29<br />

3.1 Breakdown of HTTP response types . . . . . . . . . . . . . . . . . . . . . . 34<br />

3.2 Screenshot of unauthenticated whitelisting . . . . . . . . . . . . . . . . . . 34<br />

3.3 Default user names <strong>and</strong> passwords available in help files . . . . . . . . . . . 35<br />

5.1 Number of connections per week . . . . . . . . . . . . . . . . . . . . . . . . 48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!