Behavioral task
behavioral1
Sample
SeConSys_kezikonyv_aktual_2023_jan.pdf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SeConSys_kezikonyv_aktual_2023_jan.pdf
Resource
win10v2004-20230220-en
General
-
Target
SeConSys_kezikonyv_aktual_2023_jan.pdf
-
Size
9.4MB
-
MD5
ef967bc550b9ff74b3cb75da14a734dc
-
SHA1
2f06cd3109b4ce7e97e3e1e4e23edc34eb4c6ec4
-
SHA256
35e4cdb717492aef9054227b70712cc8729ba3a1179c4576fc227c9d1f06d685
-
SHA512
21c7e1db276485e3f951cb91e8dd1c896d0232282ea03cdcad65c6764064c6870ba044b8d260ec17fc599c7a771e7c0ec11461a656f77912718536af82e57677
-
SSDEEP
196608:q3/CYfkPDBxNUzHgErSjX3WRQ9tBLGyxn6e/0K4b:q3/Nk6H9SjX3PtAyJ6
Malware Config
Signatures
Files
-
SeConSys_kezikonyv_aktual_2023_jan.pdf.pdf
-
https://www.admin.ch/opc/de/classified-compilation/20071266/index.html
-
https://www.strom.ch/de
-
https://www.cisa.gov/control-systems-goals-and-objectives
-
https://www.whitehouse.gov/briefing-room/statements-releases/2021/08/25/fact-sheet-biden-administration-and-private-sector-leaders-announce-ambitious-initiatives-to-bolster-the-nations-cybersecurity/
-
https://www.energy.gov/articles/progress-report-100-days-biden-administrations-industrial-control-systems-ics
-
https://www.utilitydive.com/news/maybe-its-not-the-right-approach-anymore-ferc-chair-glick-mulls-new-se/607594/
-
https://www.whitehouse.gov/briefing-room/statements-releases/2021/07/28/national-security-memorandum-on-improving-cybersecurity-for-critical-infrastructure-control-systems/
-
https://thehill.com/policy/cybersecurity/556625-white-house-sends-out-recommendations-to-private-sector-on-protections
-
https://industrialcyber.co/article/cisa-sets-up-latest-cyber-defense-initiative-to-defend-critical-infrastructure/
-
https://www.federalregister.gov/documents/2021/04/22/2021-08483/revocation-of-prohibition-order-securing-critical-defense-facilities
-
https://www.energy.gov/ceser/articles/doe-announces-8m-build-robust-and-cyber-resilient-energy-delivery-systems
-
https://www.federalregister.gov/documents/2021/03/01/2021-04280/americas-supply-chains
-
https://www.whitehouse.gov/briefing-room/presidential-actions/2021/01/20/executive-order-protecting-public-health-and-environment-and-restoring-science-to-tackle-climate-crisis/
-
https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
-
https://www.energy.gov/articles/biden-administration-takes-bold-action-protect-electricity-operations-increasing-cyber-0
-
https://www.mandiant.com/resources/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor
-
https://www.energy.gov/oe/articles/department-energy-s-electricity-advisory-committee-establishes-grid-resilience-national
-
https://www.federalregister.gov/documents/2020/07/08/2020-14668/securing-the-united-states-bulk-power-system
-
https://www.energy.gov/sites/prod/files/2020/12/f81/BPS%20EO%20Prohibition%20Order%20Securing%20Critical%20Defense%20Facilities%2012.17.20%20-%20SIGNED.pdf
-
https://securethegrid.com/wp-content/uploads/2021/02/STG-Coalition-Letter-DOE-OMB.pdf
-
https://www.controlglobal.com/blogs/unfettered/emergency-executive-order-13920-response-to-a-real-nation-state-cyberattack-against-the-us-grid/
-
https://www.federalregister.gov/documents/2020/05/04/2020-09695/securing-the-united-states-bulk-power-system
-
https://s3.documentcloud.org/documents/1212530/14f00304-documents.pdf
-
https://eur-lex.europa.eu/legal-content/HU/TXT/PDF/?uri=CELEX:32008L0114&from=EN
-
https://www.jcip1.org/weiss.html
-
https://isssource.com/safeguarding-ot-from-cyber-threats-2/
-
https://fluchsfriction.medium.com/why-ot-has-different-needs-than-it-18ba9baa36e7
-
https://www.fortinet.com/content/dam/fortinet/assets/white-papers/wp-operational-technology-design-guide.pdf
-
https://viewer.joomag.com/journal-of-critical-infrastructure-policy-volume-1-number-2-fall-winter-2020/0332765001608321823
-
https://subscription.packtpub.com/book/business/9781788832687/1/ch01lvl1sec16/divergence-in-it-and-ot-security-fundamentals
-
https://www.agoria.be/en/manufacturing/innovation/towards-a-digital-manufacturing-future-part-5-cybersecurity
-
http://operationalevolution.blogspot.com/2015/02/otit-convergence-what-does-it-mean-in.html
-
https://www.fireeye.com/blog/executive-perspective/2016/08/developing_a_securit.html/
-
https://iot-analytics.com/5-industrial-connectivity-trends-driving-the-it-ot-convergence/
-
https://energycentral.com/c/iu/ferc-versus-nerc
-
https://www.king.senate.gov/newsroom/press-releases/senate-passes-king-bill-protecting-energy-grid-from-cyber-attacks
-
https://www.energy.gov/articles/biden-administration-takes-bold-action-protect-electricity-operations-increasing-cyber-0v
-
https://www.energy.gov/ceser/articles/doe-announces-8m-build-robust-and-cyber-resilient-energy-delivery-systems/
-
https://www.energy.gov/oe/articles/department-energy-s-electricity-advisory-committee-establishes-grid-resilience-national/
-
https://www.whitehouse.gov/presidential-actions/executive-order-securing-united-states-bulk-power-system/
-
https://www.dni.gov/files/ODNI/documents/assessments/NIE_Climate_Change_and_National_Security.pdf
-
https://www.controlglobal.com/blogs/unfettered/large-electric-transformers-are-subject-to-cyber-attacks-which-can-cause-outages-of-months-to-years/
-
https://www.controlglobal.com/blogs/unfettered/do-the-chinese-own-our-electric-grids-and-other-infrastructures/
-
https://energycentral.com/c/iu/ics-cyber-security-second-coming-maginot-line-%E2%80%93-and-chinese-have-breached-it
-
https://www.powermag.com/what-you-need-to-know-and-dont-about-the-aurora-vulnerability/
-
https://www.msspalert.com/cybersecurity-breaches-and-attacks/ransomware/colonial-pipeline-investigation/
-
https://www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password
-
https://icscybersec.blog.hu/2021/01/30/solarwinds-tanulsagok-magyarorszagon
-
https://www.wired.com/story/russia-solarwinds-hack-roundup/
-
https://www.excaltech.com/what-you-need-to-know-about-the-massive-solarwinds-hack/?nowprocket=1/
-
https://securityaffairs.co/wordpress/113681/apt/microsoft-solorigate.html/
-
https://www.businessinsider.com/solarwinds-hack-explained-government-agencies-cyber-security-2020-12
-
https://www.dragos.com/blog/industry-news/a-new-water-watering-hole/
-
https://www.gao.gov/products/gao-18-667t
-
https://www.eenews.net/assets/2019/05/29/document_ew_02.pdf
-
https://www.cfr.org/report/cyberattack-us-power-grid
-
https://www.fmn.dk/eng/news/Pages/New-sectoral-strategie-stop-repare-society-for-cyberattacks.aspx
-
https://www.dragos.com/blog/industry-news/energy-organizations-continue-to-be-compromised-globally/
-
https://applied-risk.com/resources/osint
-
https://www.recordedfuture.com/open-source-intelligence-definition/
-
https://www.worldenergy.org/assets/downloads/Cyber_Challenges_to_the_Energy_Transition_WEC_MMC_2019.pdf
-
https://www.eenews.net/stories/1061111289
-
https://www.independent.ie/irish-news/news/exclusive-eirgrid-targeted-by-state-sponsored-hackers-leaving-networks-exposed-to-devious-attack-36003502.html
-
https://in.reuters.com/article/nuclear-cyber-idINKCN12A1P1
-
https://securityaffairs.co/wordpress/46708/security/virus-gundremmingen-nuclear-plant.html
-
http://securityaffairs.co/wordpress/31416/cyber-warfare-2/nuclear-plant-south-korea-hacked.html
-
http://securityaffairs.co/wordpress/21109/malware/malware-based-attack-hit-japanese-monju-nuclear-power-plant.html
-
https://www.timesofisrael.com/steinitz-israels-electric-authority-hit-by-severe-cyber-attack/
-
https://lasvegassun.com/news/2015/dec/21/ap-investigation-us-power-grid-vulnerable-to-forei/
-
https://blogs.scientificamerican.com/observations/expert-a-virus-caused-the-blackout-of-2003-will-the-next-one-be-intentional/
-
https://www.wired.com/story/russian-hackers-attack-ukraine/
-
https://www.vice.com/en_us/article/bmvkn4/ukrainian-power-station-hacking-december-2016-report
-
https://www.dragos.com/wp-content/uploads/SecIndSys_Purdue_GEDragos.pdf
-
https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf
-
https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_6.pdf
-
https://www.dragos.com/wp-content/uploads/CRASHOVERRIDE.pdf
-
https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf
-
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/dragonfly-energy-sector-cyber-attacks
-
https://archive.f-secure.com/weblog/archives/00002718.html
-
https://www.langner.com/wp-content/uploads/2017/03/to-kill-a-centrifuge.pdf
-
https://www.automationworld.com/factory/iiot/article/21132891/is-the-purdue-model-still-relevant
-
https://www.dragos.com/wp-content/uploads/TRISIS-01.pdf
-
https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html
-
https://www.sans.org/reading-room/whitepapers/ICS/secure-architecture-industrial-control-systems-36327
-
https://www.dragos.com/blog/industry-news/the-false-choice-of-it-vs-ot/
-
https://ec.europa.eu/commission/sites/beta-political/files/budget-may2018-research-innovation_hu.pdf
-
https://alverad.hu/wp-content/uploads/2022/11/alverad-ot-human-aspektusok-FIN.pdf
-
https://www.researchgate.net/figure/Comparison-of-Typical-IT-and-ICS-Characteristics-4_tbl1_289881199
-
https://www.fireeye.com/blog/executive-perspective/2016/08/developing_a_securit.html
-
https://www.syssec.at/en/projekte/cerberus
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-013-1.pdf
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-010-3.pdf
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-008-6.pdf
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-005-6.pdf
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-003-7.pdf
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-014-2.pdf
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-011-2.pdf
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-010-2.pdf
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-008-6&title=Cyber%20Security%20%E2%80%94%20Incident%20Reporting%20and%20Response%20Planning
-
http://www.nerc.com/pa/Stand/Pages/CIP0037RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-003-7&title=Cyber%20Security%20%E2%80%94%20Security%20Management%20Controls
-
http://www.nerc.com/pa/Stand/Pages/CIP0131RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-013-1&title=Cyber%20Security%20-%20Supply%20Chain%20Risk%20Management
-
http://www.nerc.com/pa/Stand/Pages/CIP0103RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-010-3&title=Cyber%20Security%20%E2%80%94%20Configuration%20Change%20Management%20and%20Vulnerability%20Assessments
-
http://www.nerc.com/pa/Stand/Pages/CIP0056RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-005-6&title=Cyber%20Security%20%E2%80%94%20Electronic%20Security%20Perimeter(s)
-
https://www.nerc.com/pa/Stand/Pages/CIP0085RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-008-5&title=Cyber%20Security%20-%20Incident%20Reporting%20and%20Response%20Planning
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-008-5.pdf
-
https://www.nerc.com/pa/Stand/Pages/CIP0076RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-007-6&title=Cyber%20Security%20-%20System%20Security%20Management
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-007-6.pdf
-
https://www.nerc.com/pa/Stand/Pages/CIP0066RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-006-6&title=Cyber%20Security%20-%20Physical%20Security%20of%20BES%20Cyber%20Systems
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-006-6.pdf
-
https://www.nerc.com/pa/Stand/Pages/CIP0055RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-005-5&title=Cyber%20Security%20-%20Electronic%20Security%20Perimeter(s)
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-005-5.pdf
-
http://www.nerc.com/pa/Stand/Pages/CIP0025.1aRI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-002-5.1a&title=Cyber%20Security%20%E2%80%94%20BES%20Cyber%20System%20Categorization
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-002-5.1a.pdf
-
https://www.nerc.com/pa/Stand/Pages/CIP0096RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-009-6&title=Cyber%20Security%20-%20Recovery%20Plans%20for%20BES%20Cyber%20Systems
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-009-6.pdf
-
http://www.nerc.com/pa/Stand/Pages/CIP014-2RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-014-2&title=Physical%20Security
-
https://www.nerc.com/pa/Stand/Pages/CIP0112RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-011-2&title=Cyber%20Security%20-%20Information%20Protection
-
https://www.nerc.com/pa/Stand/Pages/CIP-0102RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-010-2&title=Cyber%20Security%20-%20Configuration%20Change%20Management%20and%20Vulnerability%20Assessments
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-004-6.pdf
-
https://www.nerc.com/pa/Stand/Reliability%20Standards/CIP-003-6.pdf
-
https://www.nerc.com/pa/Stand/Pages/CIP0046RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-004-6&title=Cyber%20Security%20-%20Personnel%20&%20Training
-
https://www.nerc.com/pa/Stand/Pages/CIP0036RI.aspx
-
https://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-003-6&title=Cyber%20Security%20-%20Security%20Management%20Controls
-
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
-
https://encs.eu/encs-document/smart-meter-security-requirements/
-
https://esmig.eu/news/first-harmonised-european-approach
-
https://www.swissmig.ch/wp-content/uploads/2019/07/PruefMethodologie-V21.pdf
-
https://www.strom.ch/de/media/6404/download
-
https://www.metas.ch/metas/de/home/dl/datensicherheitspruefungen.html
-
https://www.bfe.admin.ch/bfe/de/home/politik/energiestrategie-2050.html
-
https://www.admin.ch/opc/de/classified-compilation/19995395/index.html#a91
-
https://www.admin.ch/opc/de/classified-compilation/20042411/index.html
-
https://www.bfe.admin.ch/bfe/en/home.html
-
https://www.swissmig.ch/
-
https://nki.gov.hu/hatosag/tartalom/urlapok/
-
https://katasztrofavedelem.hu/35635/letoltheto-dokumentumok-es-kitoltesi-segedletek
-
https://net.jogtar.hu/jogszabaly?docid=A1100118.KOR
-
https://net.jogtar.hu/jogszabaly?docid=A1100190.KOR
-
https://net.jogtar.hu/jogszabaly?docid=99600116.TV
-
https://net.jogtar.hu/jogszabaly?docid=A0700086.TV
-
https://net.jogtar.hu/jogszabaly?docid=A2000374.KOR&searchUrl=/gyorskereso%3Fkeyword%3D374/2020
-
https://net.jogtar.hu/jogszabaly?docid=A1300065.KOR
-
https://net.jogtar.hu/jogszabaly?docid=A1200166.TV
-
https://net.jogtar.hu/jogszabaly?docid=a1500041.bm
-
https://net.jogtar.hu/jogszabaly?docid=A1800271.KOR
-
https://net.jogtar.hu/jogszabaly?docid=a1300050.tv
-
https://www.eenews.net/stories/1060216451/
-
https://www.ruggedmonitoring.com/advanced-energy/transformer
-
https://cms-cdn.selinc.com/assets/Literature/Publications/Technical%20Papers/6452_MythReality_MZ_20110217_Web3.pdf?v=20191007-203642
-
https://www.youtube.com/watch?v=LM8kLaJ2NDU
-
https://www.uni-nke.hu/document/uni-nke-hu/Kov%C3%A1cs%20L%C3%A1szl%C3%B3.pdf
-
https://csrc.nist.gov/Projects/cyber-supply-chain-risk-management
-
https://securityaffairs.co/wordpress/113681/apt/microsoft-solorigate.html
-
https://www.excaltech.com/what-you-need-to-know-about-the-massive-solarwinds-hack/
-
https://ics-community.sans.org/media/download/q5lgya/2020-07-23_Christopher-Conway-Miller-DOE-RFI.pdf
-
https://2015-2019.kormany.hu/download/3/6d/b1000/Int%C3%A9zked%C3%A9si%20terv%202020-2022.pdf#!DocumentBrowse
-
https://nki.gov.hu/wp-content/uploads/2020/11/Strat%C3%A9gia-a-h%C3%A1l%C3%B3zati-%C3%A9s-inform%C3%A1ci%C3%B3s-rendszerek-biztons%C3%A1g%C3%A1ra.pdf
-
https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map/national-cyber-security-strategies-interactive-map
-
https://en.wikipedia.org/wiki/Slowloris_(computer_security)
-
https://dheatattack.com/
-
https://www.shodan.io/
-
https://github.com/jivoi/awesome-osint
-
https://enpaselectro.com/ua/tehnologii/sistemy-upravleniya.html
-
https://www.us-cert.gov/sites/default/files/c3vp/Russian_Activity_Webinar_Slides.pdf
-
https://portswigger.net/kb/issues/00200308_client-side-template-injection
-
https://portswigger.net/web-security/server-side-template-injection
-
https://www.youtube.com/watch?v=8ThgK1WXUgk
-
https://www.cyberthreat.report/ukranbarat-hackercsoport-azt-allitja-hogy-feltortek-a-rosseti-lenenergo-scada-rendszeret/?fbclid=IwAR28BSb3pOMIfrq13AQKkGxjXHm0WFsc2c7w1O19pCaQwUKpOthZjjHD7uU
-
https://www.thetechoutlook.com/news/technology/security/exclusive-ghostsec-has-taken-the-responsibility-for-the-recent-russian-ics-attack-with-zero-causality/?fbclid=IwAR21Nb9m9taI8ppMdJPJEGfEhp2UJHKQejJLyY8f5lUnyTyXmr2RYizCsRE
-
https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/
-
https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview
-
https://dothaneagle.com/news/no-data-compromised-in-weekend-wec-ransomware-attack/
-
https://go.recordedfuture.com/redecho-insikt-group-report
-
https://www.bleepingcomputer.com/news/security/enel-group-hit-by-ransomware-again-netwalker-demands-14-million/
-
https://www.bleepingcomputer.com/news/security/netwalker-ransomware-hits-pakistans-largest-private-power-utility/
-
https://www.utilitydive.com/news/enel-ransomware-attack-highlights-the-value-of-a-top-down-security-culture/581179/
-
https://www.bleepingcomputer.com/news/security/ragnarlocker-ransomware-hits-edp-energy-giant-asks-for-10m/
-
https://www.entsoe.eu/news/2020/03/09/entso-e-has-recently-found-evidence-of-a-successful-cyber-intrusion-into-its-office-network/
-
https://dragos.com/blog/industry-news/assessment-of-reported-malware-infection-at-nuclear-facility/
-
https://www.reuters.com/article/us-safrica-city-power/johannesburg-power-body-hit-by-ransomware-attack-idUSKCN1UK15N
-
https://www.independent.co.uk/news/world/europe/chernobyl-ukraine-petya-cyber-attack-hack-nuclear-power-plant-danger-latest-a7810941.html
-
https://dragos.com/wp-content/uploads/CRASHOVERRIDE.pdf
-
https://apnews.com/c8d531ec05e0403a90e9d3ec0b8f83c2
-
https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf
-
https://www.risidata.com/Database/Detail/public-utility-compromised-after-brute-force-hack-attack-says-homeland-secu
-
https://www.risidata.com/Database/Detail/computer_glitch_leads_to_shutdown_of_nuclear_reactor
-
https://www.risidata.com/Database/Detail/u._s._power_plant_infected_with_malware
-
https://www.risidata.com/Database/Detail/u._s._electric_utility_virus_infection
-
https://www.risidata.com/Database/Detail/circuit_card_shuts_down_nuclear_plant
-
https://www.risidata.com/Database/Detail/scadalalarm_pcanywhere_compatibility
-
https://www.risidata.com/Database/Detail/cyber_attack_on_texas_electricity_provider
-
https://www.risidata.com/Database/Detail/energy_company_virus_attack
-
https://www.risidata.com/Database/Detail/wrong_signal_shuts_down_cooling_systems
-
https://www.risidata.com/Database/Detail/texas_power_company_hack
-
https://www.risidata.com/Database/Detail/failed_sensor_on_wind_turbine_caused_shower_of_ice_shards
-
https://www.risidata.com/Database/Detail/limerick_nuclear_reactor_1_shut_down
-
https://www.risidata.com/Database/Detail/georgia_nuclear_power_plant_shutdown
-
https://www.risidata.com/Database/Detail/blackout_in_florida
-
https://www.risidata.com/Database/Detail/computer_glitch_causes_major_power_outage
-
https://www.risidata.com/Database/Detail/energy_company_exposed_to_hackers_by_a_phishing_attack
-
https://www.risidata.com/Database/Detail/browns_ferry_nuclear_plant_scrammed_shut_down
-
https://www.risidata.com/Database/Detail/power_network_survives_virus_attack
-
https://www.risidata.com/Database/Detail/power_plant_security_information_leaked_onto_internet
-
https://www.risidata.com/Database/Detail/taum_sauk_water_storage_dam_failure
-
https://www.risidata.com/Database/Detail/e-tag-incident
-
https://www.risidata.com/Database/Detail/japanese_nuclear_company_virus_attack
-
https://www.risidata.com/Database/Detail/offsite-fiber-cable-cut-causes-loss-of-communications
-
https://www.risidata.com/Database/Detail/scada-workstation-infected-by-w32-korgo-worm
-
https://www.risidata.com/Database/Detail/virus-attacks-a-european-utility
-
https://www.risidata.com/Database/Detail/iranian-hackers-attempt-to-disrupt-israel-power-system
-
https://www.risidata.com/Database/Detail/slammer-impact-on-ohio-nuclear-plant
-
https://www.risidata.com/Database/Detail/power-industry-slammer-2
-
https://www.risidata.com/Database/Detail/power-industry-slammer-1
-
https://www.risidata.com/Database/Detail/utility-scada-system-attacked
-
https://www.energy.gov/sites/prod/files/2017/01/f34/Cyber%20Threat%20and%20Vulnerability%20Analysis%20of%20the%20U.S.%20Electric%20Sector.pdf
-
https://www.risidata.com/Database/Detail/y2k-test-crashes-reactor-computer
-
https://www.risidata.com/Database/Detail/power_outages_and_other_service_interruptions
-
https://www.risidata.com/Database/Detail/hackers-attack-nz-aust-for-joining-gulf-taskforce
-
https://www.risidata.com/Database/Detail/salt-river-project-hack
-
https://www.risidata.com/Database/Detail/computer_sabotage_at_nuclear_power_plant
-
https://www.risidata.com/Database/Detail/computer-error-at-sellafield-nuclear-plant-in-uk
-
https://www.cyberthreat.report/scada-power-control-system-of-a-russian-shopping-center-was-hacked/?fbclid=IwAR3k18Qp8iiqVZ6pGHTPatJorRd7xhHCdIE3vFNxiNdrpgON-F6BJH1RufM
-
https://www.youtube.com/watch?v=AUoiKZBqIo0
-
https://www.cisa.gov/sites/default/files/publications/CISA%20Zero%20Trust%20Maturity%20Model_Draft.pdf
-
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf
-
https://en.wikipedia.org/wiki/Authenticated_encryption
-
https://en.wikipedia.org/wiki/Forward_secrecy
-
https://en.wikipedia.org/wiki/Post-quantum_cryptography
-
https://csrc.nist.gov/publications/detail/sp/800-207/final
-
https://hu.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology
-
https://hu.wikipedia.org/wiki/Legkisebb_jogosults%C3%A1g_elve
-
https://dale-peterson.com/2019/02/11/is-the-purdue-model-dead/
-
https://www.osti.gov/biblio/1376870
-
https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32008L0114&from=EN
-
https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52005DC0576&from=en
-
https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2006:0786:FIN:EN:PDF
-
http://gdf.hu/szakiranyu-tovabbkepzesek/adatvedelmi-es-informaciobiztonsagi-menedzser/
-
http://www.bgk.uni-obuda.hu/hu/kepzeseink/tovabbkepzesek/informaciobiztonsagi-szakmernokszakember
-
http://bmi.nik.uni-obuda.hu/kiber_kovetelmeny
-
https://jotoki.elte.hu/content/adatbiztonsagi-es-adatvedelmi-szakjogasz.t.406
-
https://hhk.uni-nke.hu/oktatas/mesterkepzes/vedelmi-vezetestechnikai-rendszertervezo
-
https://www.felvi.hu/felveteli/szakok_kepzesek/szakleirasok/!Szakleirasok/index.php/szak/20554/szakleiras
-
https://kti.uni-nke.hu/szakiranyu-tovabbkepzesek/szakiranyu-tovabbkepzesi-szakok/elektronikus-informaciobiztonsagi-vezeto/altalanos-informaciok
-
https://www.felvi.hu/felveteli/szakok_kepzesek/szakleirasok/!Szakleirasok/index.php/szak/36/szakleiras
-
https://www.felvi.hu/felveteli/egyetemek_foiskolak/!IntezmenyiOldalak/meghirdetes.php?meg_id=20905&elj=20a
-
http://www.seconsys.eu/
-
http://www.seconsys.eu
-
http://seconsys.eu
-
http://Felvi.hu
-
https://www.felvi.hu/felveteli/egyetemek_foiskolak/!IntezmenyiOldalak/meghirdetes.php?
-
https://www.felvi.hu/felveteli/szakok_kepzesek/szakleirasok/!Szakleirasok/index.php/szak/36/szakleiras.
-
https://www.felvi.hu/felveteli/szakok_kepzesek/szakleirasok/!Szakleirasok/index.php/szak/20554/szakleiras.
-
https://hhk.uni-nke.hu/oktatas/mesterkepzes/vedelmi-vezetestechnikai-rendszertervezo.
-
https://kti.uni-nke.hu/szakiranyu-tovabbkepzesek/szakiranyu-tovabbkepzesi-szakok/elektronikus-informaciobiztonsagi-vezeto/altalanos-informaciok.
-
https://jotoki.elte.hu/content/adatbiztonsagi-es-adatvedelmi-szakjogasz.t.406.
-
http://bmi.nik.uni-obuda.hu/kiber_kovetelmeny.
-
http://www.bgk.uni-obuda.hu/hu/kepzeseink/tovabbkepzesek/informaciobiztonsagi-szakmernokszakember.
-
http://gdf.hu/szakiranyu-tovabbkepzesek/adatvedelmi-es-informaciobiztonsagi-menedzser/.
-
http://doi.org/10.2172/1376870
-
http://wikipedia.org
-
http://nist.gov
-
http://researchgate.net
-
http://packtpub.com
-
http://fortinet.com
-
https://www.risidata.com/Database/Detail/navy-radar-shuts-down-scada-systems
-
https://www.energy.gov/sites/pro
-
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
-
https://www.theguardian.com/business/2020/may/14/lights-stay-on-despite-cyber-attack-on-uks-electricity-system
-
https://theenergyst.com/elexon-hit-by-cyber-attack/
-
https://www.dragos.com/blog/industry-news/chernovite-pipedream-malware-targeting-industrial-control-systems/
-
https://www.dragos.com/blog/analyzing-pipedream-results-from-runtime-testing/
-
https://www.shodan.io
-
https://nki.gov.hu/wp--a----rendszerek-df
-
http://documentcloud.org
-
https://energycentral.com/c/iu/ics-cyber-security-second-coming-maginot-line--and-chinese-have-breached-it
-
http://controlglobal.com
-
http://securethegrid.com
-
http://energy.gov
-
http://thehill.com
-
https://net.jogtar.hu/jogszabaly?docid=A2000374.KOR&search
-
https://www.swissmig.ch
-
https://www.eenews.net/stories/1061111289.
-
https://www.utilitydive.com/news/maybe-its-not-
- Show all
-