Content area

Abstract

User account and credential management. Let's take the hypothetical example of Joe, a recently fired and disgruntled employee. Joe was hired to work as an operator by the city. After being hired he was given a username and password to log onto the city's network. When he reported for duty at the water treatment plant, he was given another username and password to access the ICS network, including remote access so he could check on the system during his on-call shift.

Details

Title
Industrial Control System Security by Isolation: A Dangerous Myth
Author
Groves, Daniel A
Pages
28-30
Section
Security and Preparedness
Publication year
2011
Publication date
Jul 2011
Publisher
American Water Works Association
ISSN
0003150X
e-ISSN
15518833
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
878745593
Copyright
Copyright American Water Works Association Jul 2011