<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://damtoolbox.org/index.php?action=history&amp;feed=atom&amp;title=Cyber_Security</id>
	<title>Cyber Security - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://damtoolbox.org/index.php?action=history&amp;feed=atom&amp;title=Cyber_Security"/>
	<link rel="alternate" type="text/html" href="https://damtoolbox.org/index.php?title=Cyber_Security&amp;action=history"/>
	<updated>2026-04-11T22:58:46Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.40.0</generator>
	<entry>
		<id>https://damtoolbox.org/index.php?title=Cyber_Security&amp;diff=5650&amp;oldid=prev</id>
		<title>Rmanwaring at 15:30, 14 December 2022</title>
		<link rel="alternate" type="text/html" href="https://damtoolbox.org/index.php?title=Cyber_Security&amp;diff=5650&amp;oldid=prev"/>
		<updated>2022-12-14T15:30:44Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:30, 14 December 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l3&quot;&gt;Line 3:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 3:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;!-- Delete any sections that are not necessary to your topic. Add pictures/sections as needed --&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;!-- Delete any sections that are not necessary to your topic. Add pictures/sections as needed --&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&quot;Key cyber risks include cyberattacks that target inadequate security controls, outdated patches, and unknown vulnerabilities; social [[engineering]] attempts designed to gain operator credentials; and intrusions from insider threats. All such attempts could allow attackers to access critical control systems and disrupt or control physical components and processes.&quot;&amp;lt;ref name=&quot;Dams Sector&quot;&amp;gt;[[Dams Sector-Specific Plan| Dams Sector-Specific Plan &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;(&lt;/del&gt;U.S. Department of Homeland Security, 2015&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;)&lt;/del&gt;]]&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&quot;Key cyber risks include cyberattacks that target inadequate security controls, outdated patches, and unknown vulnerabilities; social [[engineering]] attempts designed to gain operator credentials; and intrusions from insider threats. All such attempts could allow attackers to access critical control systems and disrupt or control physical components and processes.&quot;&amp;lt;ref name=&quot;Dams Sector&quot;&amp;gt;[[Dams Sector-Specific Plan | Dams Sector-Specific Plan&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;, &lt;/ins&gt;U.S. Department of Homeland Security, 2015]]&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;quot;Separating controls systems from untrusted networks (known as air-gapping) may no longer be a sufficient security practice. Standardized hardware and communications protocols, the use of USB drives, and the need to deliver operational data into business systems all increase the risk of unintentional outside network connections.&amp;quot;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;quot;Separating controls systems from untrusted networks (known as air-gapping) may no longer be a sufficient security practice. Standardized hardware and communications protocols, the use of USB drives, and the need to deliver operational data into business systems all increase the risk of unintentional outside network connections.&amp;quot;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Rmanwaring</name></author>
	</entry>
	<entry>
		<id>https://damtoolbox.org/index.php?title=Cyber_Security&amp;diff=5113&amp;oldid=prev</id>
		<title>Grichards: Created page with &quot;__NOTOC__ Category:Risk Assessment Site Security ---- &lt;!-- Delete any sections that are not necessary to your topic. Add pictures/sections as needed --&gt; &quot;Key cyber risks include cyberattacks that target inadequate security controls, outdated patches, and unknown vulnerabilities; social engineering attempts designed to gain operator credentials; and intrusions from insider threats. All such attempts could allow attackers to access critical control systems and disrupt...&quot;</title>
		<link rel="alternate" type="text/html" href="https://damtoolbox.org/index.php?title=Cyber_Security&amp;diff=5113&amp;oldid=prev"/>
		<updated>2022-12-09T20:12:29Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;__NOTOC__ &lt;a href=&quot;/index.php?title=Category:Risk_Assessment_Site_Security&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Category:Risk Assessment Site Security (page does not exist)&quot;&gt;Category:Risk Assessment Site Security&lt;/a&gt; ---- &amp;lt;!-- Delete any sections that are not necessary to your topic. Add pictures/sections as needed --&amp;gt; &amp;quot;Key cyber risks include cyberattacks that target inadequate security controls, outdated patches, and unknown vulnerabilities; social engineering attempts designed to gain operator credentials; and intrusions from insider threats. All such attempts could allow attackers to access critical control systems and disrupt...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Category:Risk Assessment Site Security]]&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;!-- Delete any sections that are not necessary to your topic. Add pictures/sections as needed --&amp;gt;&lt;br /&gt;
&amp;quot;Key cyber risks include cyberattacks that target inadequate security controls, outdated patches, and unknown vulnerabilities; social [[engineering]] attempts designed to gain operator credentials; and intrusions from insider threats. All such attempts could allow attackers to access critical control systems and disrupt or control physical components and processes.&amp;quot;&amp;lt;ref name=&amp;quot;Dams Sector&amp;quot;&amp;gt;[[Dams Sector-Specific Plan| Dams Sector-Specific Plan (U.S. Department of Homeland Security, 2015)]]&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Separating controls systems from untrusted networks (known as air-gapping) may no longer be a sufficient security practice. Standardized hardware and communications protocols, the use of USB drives, and the need to deliver operational data into business systems all increase the risk of unintentional outside network connections.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Process control system operators typically have limited experience to distinguish between a system anomaly and a cyberattack. Operators rely on hardware and software vendors, who may not routinely, rapidly, or adequately update and patch process control systems to address cyber vulnerabilities. Some systems must be taken down for updates and can only be patched during planned outages.&amp;quot; &amp;lt;ref name=&amp;quot;Dams Sector&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- For information on notation for in text citations visit https://www.mediawiki.org/wiki/Help:Cite  Or simply enclose the citation as shown &amp;lt;ref&amp;gt; citation &amp;lt;/ref&amp;gt; in the location of the in text mention. Citations will automatically populate below--&amp;gt;&lt;br /&gt;
{{Citations}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Revision history information --&amp;gt;&lt;br /&gt;
{{revhistinf}}&lt;/div&gt;</summary>
		<author><name>Grichards</name></author>
	</entry>
</feed>