I am doing a college project - it has to do with malware in industrial control systems
(just to say my day job is coding DCS/PLC/SCADA's). As part of the project I am looking at how to improve knowledge and help engineers on the ground. I have come up with a list of things I think IT/Control Engineers involved with critical infrastructure need to know in order to have at least a chance of knowing what to look for if a system is suspected to be comprised.
I am hoping that members of this forum in which there is a massive amount of knowledge can contribute some ideas and validate/argue against what I am saying.
My areas are the following (and remember we are not dealing with expert OS internals experts!)
-- Executable, Dynamic Library Link and Driver files
-- Windows Registry
-- Service Control Manager
-- Auto-started applications
-- Rootkits
-- DLL Injection
-- Ring 0 and Ring 3 applications
-- Kernel tampering methods – DKOM, Hooking
I would appreciate feedback on this list and any other areas or ideas would be welcome
(just to say my day job is coding DCS/PLC/SCADA's). As part of the project I am looking at how to improve knowledge and help engineers on the ground. I have come up with a list of things I think IT/Control Engineers involved with critical infrastructure need to know in order to have at least a chance of knowing what to look for if a system is suspected to be comprised.
I am hoping that members of this forum in which there is a massive amount of knowledge can contribute some ideas and validate/argue against what I am saying.
My areas are the following (and remember we are not dealing with expert OS internals experts!)
-- Executable, Dynamic Library Link and Driver files
-- Windows Registry
-- Service Control Manager
-- Auto-started applications
-- Rootkits
-- DLL Injection
-- Ring 0 and Ring 3 applications
-- Kernel tampering methods – DKOM, Hooking
I would appreciate feedback on this list and any other areas or ideas would be welcome