Energy Critical Infrastructure Threats, Attacks, and Mitigation Strategies (2 of 2)
This video is the second video in a series that provides an introduction to the energy critical infrastructure sector and cybersecurity, focusing on threats, attacks, and mitigation strategies. In this video we conduct a quick review of the first video, discuss factors affecting the protection of the energy sector, the importance of operational technologies in the sector, cyber threats to the sector, cyber attacks on the sector, and mitigation strategies the current state of protecting the energy sector, cyber threats to the sector, and the consequences of an attack.
The intended audiences for these videos are high school or community college students enrolled in IT or cybersecurity programs or courses.
This video includes topics that have been discussed in more detail in earlier videos. Links to other NCyTE videos that relate to the content of this video include:
Cyber Supply Chain Risk Management and Cybersecurity
- Overview of Cyber Supply Chain Risk Management (C-SCRM) - https://youtu.be/seUI2XWRN6Y
- Cyber Risks Across the Supply Chain - Cyber Risks Across the Supply Chain - https://youtu.be/3EhL216emJA
- CSCRM: Government Guidelines and Regulations for Mitigating Cyber Supply Chain Risks - https://youtu.be/PYTScD2gUNw
Artificial Intelligence and Cybersecurity
- Cybersecurity and Artificial Intelligence- a Broad Overview - https://youtu.be/TKYfVk-YNrs
- Machine Learning and Cybersecurity https://youtu.be/VSS1DtGtqqY
Advanced Manufacturing
- An Introduction to Advanced Manufacturing and Cybersecurity (1 of 2) - https://youtu.be/v4ZlfEXkXYU
- Advanced Manufacturing Cyber Threats and Mitigation Strategies (2 of 2) - https://youtu.be/cnGieQPsy6k
FinTech
- Blockchain and cybersecurity - https://youtu.be/6LWrnsBxD58
NCyTE Center and this material is based upon work supported by the National Science Foundation under Grant #1902329.
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
Видео Energy Critical Infrastructure Threats, Attacks, and Mitigation Strategies (2 of 2) канала NCyTE Center
The intended audiences for these videos are high school or community college students enrolled in IT or cybersecurity programs or courses.
This video includes topics that have been discussed in more detail in earlier videos. Links to other NCyTE videos that relate to the content of this video include:
Cyber Supply Chain Risk Management and Cybersecurity
- Overview of Cyber Supply Chain Risk Management (C-SCRM) - https://youtu.be/seUI2XWRN6Y
- Cyber Risks Across the Supply Chain - Cyber Risks Across the Supply Chain - https://youtu.be/3EhL216emJA
- CSCRM: Government Guidelines and Regulations for Mitigating Cyber Supply Chain Risks - https://youtu.be/PYTScD2gUNw
Artificial Intelligence and Cybersecurity
- Cybersecurity and Artificial Intelligence- a Broad Overview - https://youtu.be/TKYfVk-YNrs
- Machine Learning and Cybersecurity https://youtu.be/VSS1DtGtqqY
Advanced Manufacturing
- An Introduction to Advanced Manufacturing and Cybersecurity (1 of 2) - https://youtu.be/v4ZlfEXkXYU
- Advanced Manufacturing Cyber Threats and Mitigation Strategies (2 of 2) - https://youtu.be/cnGieQPsy6k
FinTech
- Blockchain and cybersecurity - https://youtu.be/6LWrnsBxD58
NCyTE Center and this material is based upon work supported by the National Science Foundation under Grant #1902329.
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
Видео Energy Critical Infrastructure Threats, Attacks, and Mitigation Strategies (2 of 2) канала NCyTE Center
Комментарии отсутствуют
Информация о видео
2 августа 2022 г. 21:50:49
00:21:52
Другие видео канала