Trend Micro Incorporated 2013 ICS Kyle Wilhoit
1
2
1 http://www.us-cert.gov/control_systems/pdf/ICS-CERT_Monthly_Monitor_Oct-Dec2012.pdf2 https://www.snort.org/; http://www.honeyd.org/
| 6
Who’s Really Attacking Your ICS Equipment? | 11 | 11Who’s Really Attackingngngnggngngngnggngggnggngngngngggnnnnnnn Your IC q p ? | 11S S EEEEququipmeuquipmenntt? | 1? | 1 | 111 | 11
5
5 http://about-threats.trendmicro.com/Malware.aspx?language=au&name=TROJ_MEREDROP.II; http://about-threats.trendmicro.com/us//archive/malware/WORM_ATAK.A
| 12
http://www.tofinosecurity.com/blog/controlling-stuxnet-–-no-more-flat-networks-please-lets-embrace-security-zones
| 14
(TRENDMICRO INCORPORATED) TREND MICRO INCORPORATED
©2013 by Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.