X hits on this document

Powerpoint document

Unifying the Conceptual levels of Network Security through use of Patterns. - page 23 / 30

71 views

0 shares

0 downloads

0 comments

23 / 30

Solution (Contd…)

By providing Reference monitor or RBAC, we can make sure that the authorized personnel can perform their respective roles.

By adding Physical Access control zones we can prevent physical attacks caused by external elements.

All these security measures added make sure that there is no Denial of Service (DOS).

The use of these security models in SCADA communication can significantly reduce the vulnerability of these critical systems.

               Secure Systems Research GroupFlorida Atlantic University

Document info
Document views71
Page views71
Page last viewedSat Dec 03 16:31:21 UTC 2016
Pages30
Paragraphs286
Words1349

Comments