Email Document Reference

Enter your email address below and the reference for this document will be sent to shortly from webmaster@ceesi.com.

Title: Typical Scada, Measurement, Or Amr System
Author(s): [Not Available]
Source: 2016 Canadian School of Hydrocarbon Measurement
Year Published: 2016
Abstract: Figure 1 is a generalized view of a SCADA (Supervisory Control and Data Acquisition, Measurement, or AMR (Automated Meter Reading) system Potential Threats and Types of Cyber-Attacks In an insecure network, a malicious user who has access to the communication network can perform the following types of attacks on: -Data Messages: Eavesdropping. Data Manipulation. Data Replication and Message Freshness. Masquerading. Repudiation. Denial of Service. -Data At-Rest: Data Monitoring and Confidentiality. Data Manipulation. Data Availability.




In order to prevent spam and automated file downloads for documents within the Measurement Library, please follow the instructions below and then you will be able to email a reference to this article.





Copyright © 2025