2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) 2016
DOI: 10.1109/iciccs.2016.7542306
|View full text |Cite
|
Sign up to set email alerts
|

A review: Outrageous cyber warfare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…Instead of traditional methods like firearms and explosives, they employ digital codes to launch attacks on other states. By utilizing a single computer, they can target vital infrastructures such as SCADA and PLC systems, which are responsible for overseeing and organizing various industries (Sahu et al, 2016). Stuxnet is the first malicious threat directed at the industrial control system like gas pipelines, power plants, etc.…”
Section: Stuxnet Malwarementioning
confidence: 99%
See 3 more Smart Citations
“…Instead of traditional methods like firearms and explosives, they employ digital codes to launch attacks on other states. By utilizing a single computer, they can target vital infrastructures such as SCADA and PLC systems, which are responsible for overseeing and organizing various industries (Sahu et al, 2016). Stuxnet is the first malicious threat directed at the industrial control system like gas pipelines, power plants, etc.…”
Section: Stuxnet Malwarementioning
confidence: 99%
“…As a response to the Stuxnet attack, Iran has taken measures to strengthen its cybersecurity and has been known for its efforts in building a formidable digital defense. This includes creating one of the world's largest digital armies to protect against future cyber threats (Sahu et al, 2016).…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the present implementation practices of ICS/SCADA systems have introduced a wide range of security vulnerabilities (Sajid et al, 2016). Cyberattacks on ICS/SCADA systems can be performed from the internet or devices connected to the business or enterprise networks, which have access to the field-level devices (Sahu et al, 2016). As a result, ICS turn into obvious targets for cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%