License: Creative Commons Attribution 4.0 PDF - Published Version (839kB) |
- URN to cite this document:
- urn:nbn:de:bvb:355-epub-552145
- DOI to cite this document:
- 10.5283/epub.55214
This publication is part of the DEAL contract with Springer.
Abstract
Organizations face attacks on industrial control systems (ICS) as vulnerabilities are pervasive. However, patching vulnerable systems by simply updating to the newest version is often not an option and shifts focus to workarounds. Beyond pure patching, workarounds specify other remediation measures (e.g., firewall or VPN configuration) that must be taken due to system availability requirements, ...
Owner only: item control page