SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Energy-grid Threat Analysis Using Honeypots

Marian M. Kendrick, Zaki A. Rucker

1 min read
in Book, Learning

 

This research addresses cyber threats to smart energy grids. This research identified and characterized threats to electric-power grids by analysis of traffic in a simulated grid. We deployed a high-interaction honeypot that simulates a grid named GridPot. Network-traffic captures and honeypot-activity logs were analyzed to demonstrate the effectiveness of our honeypot at collecting intelligence for threat analysis. This study will contribute to the efforts of the Department of Defense and Department of Homeland Security to protect U.S. critical infrastructure from cyber threats.

Get Book

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.

Related

Tags: Active Defense BookBooksMarian M. KendrickZaki A. Rucker
3
VIEWS
ADVERTISEMENT

Related Posts

PCI POINT-TO-POINT ENCRYPTION (P2PE) ASSESSOR

PCI POINT-TO-POINT ENCRYPTION (P2PE) ASSESSOR

May 20, 2022
PCI FORENSIC INVESTIGATOR (PFI)

PCI FORENSIC INVESTIGATOR (PFI)

May 20, 2022
3DS ASSESSOR QUALIFICATION

3DS ASSESSOR QUALIFICATION

May 20, 2022
INTERNAL SECURITY ASSESSOR (ISA)

INTERNAL SECURITY ASSESSOR (ISA)

May 20, 2022

More Articles

Book

Haters: Harassment, Abuse, and Violence Online

November 22, 2021
Document

PCI Firewall Basics

May 18, 2022
Tool

Open Vulnerability Assessment Scanner

February 11, 2022
Movie

Bourne Ultimatum (2007)

November 11, 2020
Course

SEC555: SIEM with Tactical Analytics

March 17, 2022

Book: The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime

October 16, 2020
Book

Cybercriminal Networks: Origin, growth and criminal capabilities

April 20, 2022

Application Security Weekly – Podcast

March 10, 2022
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials
  • Cyber Opportunities

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....