Quantitatively Assessing and Visualising Industrial System Attack Surfaces
Quantitatively Assessing and Visualising Industrial System Attack Surfaces
Quantitatively Assessing and Visualising Industrial System Attack Surfaces
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
List of Figures<br />
2.1 Example exposure time-map with red marking systems with known exploits 28<br />
2.2 Node information within visualisation . . . . . . . . . . . . . . . . . . . . . 28<br />
2.3 Vulnerable node information within visualisation . . . . . . . . . . . . . . . 29<br />
3.1 Breakdown of HTTP response types . . . . . . . . . . . . . . . . . . . . . . 34<br />
3.2 Screenshot of unauthenticated whitelisting . . . . . . . . . . . . . . . . . . 34<br />
3.3 Default user names <strong>and</strong> passwords available in help files . . . . . . . . . . . 35<br />
5.1 Number of connections per week . . . . . . . . . . . . . . . . . . . . . . . . 48