Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Edith Cowan University

2005

Firewall

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Honeypot Technologies And Their Applicability As An Internal Countermeasure, Craig Valli Jan 2005

Honeypot Technologies And Their Applicability As An Internal Countermeasure, Craig Valli

Research outputs pre 2011

Honeypots or honeynets are a technology that is rapidly maturing and establishing this archetype of countermeasure as viable and useful in modern network defence. Honeypot technology is now at a point of development where near real-time monitoring and forensic analysis of security events can occur. This paper explores the hurdles to be overcome for the internal deployment of honeypot technologies.


Integrating Open Source Protections Into Scada Networks, Craig Valli Jan 2005

Integrating Open Source Protections Into Scada Networks, Craig Valli

Research outputs pre 2011

SCADA (Supervisory Control And Data Acquisition) networks control much of the industrialised nations production and supply complexes. Various government reports and investigations have highlighted the vulnerability of these systems. Many of these systems are on private networks which are increasingly being connected to systems that are accessible from other networks such as the Internet. There are a range of open source tools that now offer fonctionality that can be used to secure SCADA networks from intrusion or compromise. This paper explores some of the issues with current SCADA deployment trends from a network security perspective and then examines open source …