computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Women in Tech
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Delta
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • Spotlight - Endpoint management and Security hub
    • IT leaders 250
    • Research
    • Aecom
    • Leeds Building Society
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Graeme Burton
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in
  • Lock-icon Become a Computing member

Analysis: Industrial control systems under attack

Sooraj Shah
clock 18 September 2012 •

Share

  • twitter-icon
  • linkedin icon
  • email-icon
  • facebook-icon
  • whatsapp-icon

Society relies on power grids and nuclear plants, but the systems used to control them could have an avalanche of cyber-attacks coming their way. Sooraj Shah finds out why

Industrial control systems (ICS) are integral to many services that society relies on, whether it is power grids, water treatment plants, nuclear and power plants or other critical infrastructure. But...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

Previous Article

Top 10 articles: Apple iPhone 5 launch, Nokia Lumia 920 hands-on

Next Article

CSC finally implements Lorenzo patient records management system

More on Hardware

Sir Clive Sinclair dies at 81
Hardware

Sir Clive Sinclair dies at 81

Home computing pioneer leaves a legacy of groundbreaking inventions

John Leonard
John Leonard
clock 17 September 2021 • 3 min read
Only one in four IT leaders say their company's e-waste policies are 'robust'
Hardware

Only one in four IT leaders say their company's e-waste policies are 'robust'

E-waste contains toxic materials like lead, mercury and cadmium

Dev Kundaliya
clock 27 August 2021 • 2 min read
Computing research: How IT leaders are meeting human workforce challenges with modern technology solutions
Cloud and Infrastructure

Computing research: How IT leaders are meeting human workforce challenges with modern technology solutions

Andrew Hobbs
clock 23 July 2021 • 2 min read
Delta
view all
Microsoft versus Zoom versus Cisco - Should you opt for traditional UCC vendor or upstart?

Microsoft versus Zoom versus Cisco - Should you opt for traditional UCC vendor or upstart?

The pandemic has boosted UCC, but it's only part of the story

The pandemic has boosted UCC, but it's only part of the story

Microsoft Azure Sentinel vs Darktrace Enterprise Immune System: Who's on top in AI security?

Microsoft Azure Sentinel vs Darktrace Enterprise Immune System: Who's on top in AI security?

IT leaders are reluctant to trust AI in security - here's why they're wrong

IT leaders are reluctant to trust AI in security - here's why they're wrong

  • Contact Us
  • Marketing Solutions
  • About Incisive Media
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US
right wallpaper ad

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited,New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration numbers 09177174 & 09178013

DIGITAL PUBLISHER OF THE YEAR
right wallpaper ad
Loading