Speaker
Description
This talk describes four cyber security related activities of
SLAC. First, a broad review of accelerator computing cyber and mission
reliability; our analysis method, findings and outcomes. Second, lab
and accelerator penetration testing, in particular, methods to control
coordinate, and trap, potentially hazardous scans. Third, a summary gap
analysis of recent regulatory orders from common practice at
accelerators, and nominal plan. Finally, briefly, first steps in
adding authentication and encryption to EPICS itself, as described in
other talks.
Please select if talk will be in person or on zoom | In person |
---|