X hits on this document

Powerpoint document

Unifying the Conceptual levels of Network Security through use of Patterns. - page 23 / 30

122 views

0 shares

0 downloads

0 comments

23 / 30

Solution (Contd…)

By providing Reference monitor or RBAC, we can make sure that the authorized personnel can perform their respective roles.

By adding Physical Access control zones we can prevent physical attacks caused by external elements.

All these security measures added make sure that there is no Denial of Service (DOS).

The use of these security models in SCADA communication can significantly reduce the vulnerability of these critical systems.

               Secure Systems Research GroupFlorida Atlantic University

Document info
Document views122
Page views122
Page last viewedTue Jan 24 11:42:55 UTC 2017
Pages30
Paragraphs286
Words1349

Comments