Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 3 dokumen yang sesuai dengan query
cover
Oxford: Pergamon Press, 1980
629.895 APP
Buku Teks  Universitas Indonesia Library
cover
Sinurat, Permata Putra Satria
"Dalam era industri 4.0, teknologi informasi dan komunikasi menjadi tulang punggung utama dalam operasional sistem industri, termasuk sistem kontrol industri (ICS). Namun, meningkatnya ketergantungan pada teknologi digital juga meningkatkan risiko serangan siber. Penelitian ini bertujuan untuk mengembangkan dan menguji testbed keamanan siber untuk sistem kontrol tangki air otomatis menggunakan komunikasi Modbus TCP. Testbed ini memungkinkan simulasi berbagai serangan dan pengujian strategi mitigasi dalam lingkungan yang aman dan terkontrol. Sistem yang dikembangkan terdiri dari Arduino Mega sebagai server Modbus TCP, PLC Siemens S7-1200 sebagai klien, sensor ultrasonik untuk pengukuran ketinggian air, dan pompa submersible. Pengujian dilakukan dengan menggunakan berbagai alat keamanan siber seperti nmap, Wireshark, dan modbus poll. Hasil penelitian menunjukkan bahwa sistem ini dapat berfungsi dengan baik dan mampu menangani data yang tidak valid tanpa menyebabkan kerentanan keamanan atau ketidakstabilan. Rekomendasi untuk penelitian selanjutnya mencakup peningkatan protokol keamanan dan penerapan sistem dalam lingkungan industri nyata.

In the era of Industry 4.0, information and communication technology has become the backbone of industrial system operations, including Industrial Control Systems (ICS). However, the increased reliance on digital technology also heightens the risk of cyberattacks. This research aims to develop and test a cybersecurity testbed for automatic water tank control systems using Modbus TCP communication. The testbed enables the simulation of various attacks and testing mitigation strategies in a safe and controlled environment. The developed system comprises an Arduino Mega as the Modbus TCP server, a Siemens S7-1200 PLC as the client, an ultrasonic sensor for water level measurement, and a submersible pump. Testing was conducted using various cybersecurity tools such as NMAP, Wireshark, and Modbus Poll. The results show the system functions properly and can handle invalid data without causing security vulnerabilities or instability. Recommendations for future research include enhancing security protocols and applying the system in real industrial environments."
Depok: Fakultas Teknik Universitas Indonesia, 2024
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Rowe, Neil C
"This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots.  It contains features friendly for classroom use: (1) minimal use of programming details and mathematicsm (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application.  Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.  "
Switzerland: Springer International Publishing, 2016
e20528403
eBooks  Universitas Indonesia Library