Many experts believe that it is sufficient to have an "air-gap" between their system and the internet or other outside systems. Because they expect that an "air-gap" would not allow to attack their system.
Several other experts do not believe that.
A demonstration of a destructive cyber attack vector on “air-gapped” systems will be given during a conference in October 2016:
ICS Cyber Security Conference (www.icscybersecurityconference.com)
Click HERE for the full report.
No comments:
Post a Comment