weSRCH Android App

Making Electric Power Grids Resilient and Secure, Green Tech, Page 10

Making Electric Power Grids Resilient and Secure

Share  Email
  Page: 10
See entire paper: http://energy.wesrch.com/pdfTR1AU1FU5JWSL
Page URL: http://energy.wesrch.com/10-pdfTR1AU1FU5JWSL
Note : Best viewed in FF3 or above, IE7 or above
Page(s): 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78
 
Page content:

What Can They Do and
How Can They Do It?
Information Leakage Integrity Violation Denial of Service Illegitimate Use




Penetration Planting
Eavesdropping Masquerade Trojan Horse
Traffic Analysis
Bypassing Trapdoor
EM/RF Controls
Interception Service Spoofing Theft
Authorization
Indiscretions
by Personnel Violation

Media Physical Information Leakage
Scavenging
Intrusion
Integrity Violation

Intercept/Alter Theft Resource Exhaustion

Repudiation Replay Integrity Violation


©
2011 No part of this presentation may be reproduced in any form without prior authorization.

 
 
Subscribe
x