- document
- Burghouwt, P. (author), Maris, M. (author), van Peski, S. (author), Luiijf, H.A.M. (author), van de Voorde, I. (author), Spruit, M. (author) conference paper 2017
- document
-
Luiijf, H.A.M. (author)Ter ondersteuning van de internationale cyber security gemeenschap ontwikkelde TNO drie producten voor de vierde Global Conference on Cyber Space: From Awareness to action: bridging the gaps in 10 steps, Sharing Cyber Security Information en Cyber Security of Industrial Control Systems (ICS).article 2015
- document
-
Luiijf, H.A.M. (author)Our society and its citizens increasingly depend on the undisturbed functioning of critical infrastructures (CI), their products and services. Many of the CI services as well as other organizations use Industrial Control Systems (ICS) to monitor and control their mission-critical processes. Therefore, it is crucial that the functioning of ICS is...bookPart 2015
- document
-
Luiijf, H.A.M. (author), te Paske, B.J. (author)Our society and its citizens depend on the undisturbed functioning of (critical) infrastructures and their services. Crucial processes in most critical infrastructures, and in many other organisations, rely on the correct and undisturbed functioning of Industrial Control Systems (ICS). A failure of ICS may both cause critical services to fail...book 2015
- document
- Luiijf, H.A.M. (author) article 2013
- document
-
Luiijf, H.A.M. (author), Ali, M. (author), Zielstra, A. (author)International studies have shown that information security for process control systems, in particular SCADA, is weak. Many of the critical infrastructure (CI) services critically depend on process control systems. Therefore, any vulnerability in the protection of process control systems in CI may result in serious consequences for citizens and...article 2011
- document
-
Luiijf, H.A.M. (author), Ali, M. (author), Zielstra, A. (author), TNO Defensie en Veiligheid (author)International studies have shown that information security for process control systems, in particular SCADA, is weak. As many critical infrastructure (CI) services depend on process control systems, any vulnerability in the protection of process control systems in CI may result in serious consequences for citizens and society. In order to...bookPart 2009
- document
-
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author)The second Dutch Process Control Security Event attracted many process control people. The event was organised by the National Infrastructure against Cybercrime (NICC). Over hundred people responsible for the security of process control systems (PCS) and related networks in many of the Dutch critical infrastructures (CI) and key industries took...article 2009
- document
-
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author), Lüders, S. (author)A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in this area.article 2009
- document
-
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author)The European Commission has started the Coordination Action Parsifal as well as another Specific Targeted Research Project for the critical financial infrastructure (CFI).article 2009
- document
-
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author)Opsporing en vervolging van cybercrime? Heel belangrijk, maar niet dé oplossing voor het probleem. Voorkómen is beter! De sectoren die zijn aangesloten op het Informatieknooppunt Cybercrime hebben de (informatie)beveiliging van procescontrolesystemen (PCS), waaronder SCADA, als uitdaging opgepakt. Deze publicatie maakt duidelijk waarom het...other 2009
- document
-
Christiansson, H. (author), Luiijf, H.A.M. (author), TNO Defensie en Veiligheid (author)Supervisory control and data acquisition (SCADA) systems are commonly used to monitor and control critical infrastructure assets. However, over the past two decades, they have evolved from closed, proprietary systems to open networks comprising commodity platforms running common operating systems and TCP/IP stacks. The open architecture and...bookPart 2008