Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Ransomware Strategies

biblio

Visible to the public Ransomware Threat and its Impact on SCADA

Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
  • Ransom
  • Device Compromising
  • Downtime
  • Encrypting
  • human machine interface
  • ICs
  • Industrial Control Systems
  • industrial networks
  • industrial processes
  • Infected System
  • Locker
  • malicious software
  • Network
  • operation technology
  • Petya
  • programmable logic controllers
  • Data Mitigation
  • Ransomware
  • ransomware attack
  • Ransomware Deadline
  • Ransomware Incidents
  • Ransomware Prevention
  • Ransomware Strategies
  • Ransomware Taxonomy
  • ransomware threat
  • Ransomware Threating
  • Remote Terminal Units
  • SCADA systems
  • supervisory control and data acquisition
  • Threat report
  • WannaCry
  • cryptocurrency
  • invasive software
  • Cybersecurity
  • pubcrawl
  • Metrics
  • Resiliency
  • resilience
  • Human behavior
  • Computer crime
  • malware
  • Human Factors
  • control engineering computing
  • industrial control
  • information security
  • cybercrimes
  • production engineering computing
  • cryptojacking
  • business productivity
  • Coin Miner
  • critical infrastructure
  • critical infrastructures
  • Cryptor
  • Cyber Actor
  • cyber attack
  • cyber threat
  • cyber-attack incidents
  • cybercriminals
  • Data and System Access
  • Data Backup
  • Data Extortion

Terms of Use  |  ©2023. CPS-VO