Energy Home»Making Electric Power Grids Resilient and Secure, Green Tech, Page 10

Making Electric Power Grids Resilient and Secure, Green Tech, Page 10

Making Electric Power Grids Resilient and Secure

Share  Email
  Page: 10
See entire paper: http://energy.wesrch.com/pdfTR1AU1FU5JWSL
Page URL: http://energy.wesrch.com/10-pdfTR1AU1FU5JWSL
Note : Best viewed in FF3 or above, IE7 or above
Page(s): 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78
 
Page content:

What Can They Do and
How Can They Do It?
Information Leakage Integrity Violation Denial of Service Illegitimate Use




Penetration Planting
Eavesdropping Masquerade Trojan Horse
Traffic Analysis
Bypassing Trapdoor
EM/RF Controls
Interception Service Spoofing Theft
Authorization
Indiscretions
by Personnel Violation

Media Physical Information Leakage
Scavenging
Intrusion
Integrity Violation

Intercept/Alter Theft Resource Exhaustion

Repudiation Replay Integrity Violation


©
2011 No part of this presentation may be reproduced in any form without prior authorization.

 
 
Subscribe
x