Research in this area has focussed upon network vulnerability assessments in operational environments that come under the category of critical infrastructure. The lines of investigation have examined the recent growth in access between corporate control systems and the critical infrastructure operations that they serve to administer.
In particular, network vulnerabilities, ICT dependencies between networks, wireless connections, and the convergence between human/physical security systems and cyber systems are all the subject of further examination.
Networks of particular research interest include SCADA systems, CCTV networks, and remote access solutions. The research looks at threat identification, vulnerability identification, consequence and risk analysis, and the identification of protective measures as part of layered defence.
Please leave a comment about your rating so we can better understand how we might improve the page.