Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
patch management
biblio
Automated Security Configuration Checklist for Apple iOS Devices Using SCAP v1.2
Submitted by aekwall on Mon, 07/27/2020 - 11:20am
patch management
Vulnerability
tools
Standards organizations
security-related configuration settings
security of data
security content automation protocol
security configurations monitoring
security baseline
security automation
SCAP
Resiliency
pubcrawl
policy compliance
Apple iOS
Organizations
organization
Monitoring
Metrics
iOS Security
iOS (operating system)
information security management tasks
Human Factors
Compositionality
Compliance
automation
automated security configuration checklist
Apple iOS device configuration
biblio
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
Ransomware Injection
denial of service
exploitation
extortion
footprinting
intrusion detection and prevention systems
Locker
malicious
patch management
privilege escalation
ransomware attack
ransomware impact
cyber attack
Remote Terminal Units
rootkit
security pre-processor
social engineering
Stuxnet
supervisory control and data acquisition
tactics
techniques and procedures
Vulnerability
WannaCry
cyber physical systems
critical infrastructure
critical infrastructures
Industrial Control Systems
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
Ransomware
Metrics
Cybersecurity
invasive software
information security
cryptocurrency
RSA
Virtual private networks
command injection attacks
advanced encryption standard
command and control server
communication technologies
critical national infrastructure
crypto
biblio
A Model-Based Time-to-Compromise Estimator to Assess the Security Posture of Vulnerable Networks
Submitted by grigby1 on Wed, 10/23/2019 - 11:36am
patch management
uncertainty
Security Risk Management
Security Risk Estimation
security
Scalability
risk management
risk assessment
Resiliency
resilience
pubcrawl
Security Metrics
NIST
Monte Carlo simulation
Metrics
Measurement
Human Factors
Human behavior
estimation
computer science
Comparative security metric