论文部分内容阅读
本文基于一个虚构的工业控制系统环境,详细介绍了攻击者入侵企业的工业控制网络,并从其服务器中成功盗取重要生产数据的过程。案例背景工厂A得到一笔关键的订单后,一跃成为当地的明星企业。经过几年发展,不光拓展了生产规模,还建立起一支初具规模的科研团队,开发出好几种新产品,销路很不错。专门受雇入侵网络的攻击小组X最近接到一笔生意,任务是窃取工厂A新产品的生产工艺、图纸、配方等资料。
Based on a fictitious industrial control system environment, this article details the process of an attacker’s invasion of an enterprise’s industrial control network and the successful stealing of important production data from its server. Case Background Factory A has become a local celebrity after it has received a key order. After several years of development, not only expanded the scale of production, but also to establish a scientific research team that has begun to take shape, developed several new products, sales are good. Attack Team X, which was specifically employed on the invasion network, recently received a deal to steal information on the manufacturing processes, drawings, formulations and other information of new plant A products.