Thousands of security vulnerabilities are discovered every year in software, systems and IT infrastructures. Attackers exploit these vulnerabilities to penetrate the communications networks of organizations and gain access to critical assets for the purpose of harming confidentiality, integrity and availability of data or systems
What does it come to your mind when you hear talking about hackers? Probably your first thoughts focus on breaking passwords and damaging a webpage or a computer. Maybe you think about the idea of stealing bank details in order to make money. You are right, but it is not common to relate cyber-security to healthcare when, actually, it is one of the most important targets of hackers.
Control and safety systems take a central role in the safe operation of trains in European rail networks since a long time. In the early days, around 1900, the Safety of trains was ensured by the usage of mechanical interlockings. Since then, the interlocking systems have experienced a steady evolution, which resulted in the current electronic interlockings (ESTW).
This post has been written by Markus Heinrich (Technische Universität Darmstadt).
This post has been written by Manos Athanatos.
This post has been written by Vittorio Vallero and Barbara Lunel.
This post has been written by Sarang Kahvazadeh, PhD Researcher from Polytechnic University of Catalonia
(Barcelona, Spain), Apr. 26th
This post has been written by Dr. Kostas Lampropoulos from University of Patras, Greece
(Patras, Greece), Mar. 26th
This post has been written by Andrea Bartoli, Director of Innovation at Worldsensing.
(Barcelona, Spain), Feb. 28th
This post has been written by Joaquín Rodríguez, ICT Consultant at ATOS Research and Innovation (Cybersecurity Lab).
(Madrid, Spain), Jan. 26th
In this post, we introduce most common attack vectors in critical infrastructures (CIs) in a clear and understandably way.