How to protect SCADA systems from cyber-attack

被引:0
|
作者
Rush, William F.
Kinast, John A.
机构
来源
Gas Utility Manager | 2003年 / 47卷 / 09期
关键词
Cryptography - Data processing - Economics - Finance;
D O I
暂无
中图分类号
学科分类号
摘要
The technique to protect SCADA systems from cyber-attack was discussed. It was stated that the first step in protecting a SCADA system is to recognize the possible threats against such systems. It was suggested that the hacker might possess malicious intent or could do accidental damage to a system.
引用
收藏
页码:12 / 18
相关论文
共 50 条
  • [1] An Overview of Cyber-Attack Vectors on SCADA Systems
    Irmak, Erdal
    Erkek, Ismail
    [J]. 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
  • [2] Here's what you need to know to protect SCADA systems from cyber-attack
    [J]. Rush, W.F., 1600, Oildom Publishing Co. of Texas Inc. (230):
  • [3] Here's what you need to know to protect SCADA systems from cyber-attack
    Rush, WF
    Kinast, JA
    [J]. PIPELINE & GAS JOURNAL, 2003, 230 (02) : 29 - 30
  • [4] Modeling Cyber-Attack for SCADA Systems Using CoPNet Approach
    El Bouchti, Abdelali
    Haqiq, Abdelkrim
    [J]. PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 481 - 486
  • [5] Protocols, Solutions, and Testbeds for Cyber-Attack Prevention in Industrial SCADA Systems
    Kumar A.
    Bhushan B.
    Malik A.
    Kumar R.
    [J]. Studies in Big Data, 2021, 99 : 355 - 380
  • [7] Extending the cyber-attack landscape for SCADA-based critical infrastructure
    Rodofile, Nicholas R.
    Radke, Kenneth
    Foo, Ernest
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 25 : 14 - 35
  • [8] Cyber-Attack Detection for Automotive Cyber-Physical Systems
    Lee, Suyun
    Jung, Sunjae
    Baek, Youngmi
    [J]. BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215
  • [9] Cyber-Attack Attributes
    Kadivar, Mehdi
    [J]. TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2014, : 22 - 27
  • [10] The Law of Cyber-Attack
    Hathaway, Oona A.
    Crootof, Rebecca
    Levitz, Philip
    Nix, Haley
    Nowlan, Aileen
    Perdue, William
    Spiegel, Julia
    [J]. CALIFORNIA LAW REVIEW, 2012, 100 (04) : 817 - 885