How to protect SCADA systems from cyber-attack

被引:0
|
作者
Rush, William F.
Kinast, John A.
机构
来源
Gas Utility Manager | 2003年 / 47卷 / 09期
关键词
Cryptography - Data processing - Economics - Finance;
D O I
暂无
中图分类号
学科分类号
摘要
The technique to protect SCADA systems from cyber-attack was discussed. It was stated that the first step in protecting a SCADA system is to recognize the possible threats against such systems. It was suggested that the hacker might possess malicious intent or could do accidental damage to a system.
引用
收藏
页码:12 / 18
相关论文
共 50 条
  • [21] Adaptive and Lightweight Cyber-Attack Detection in Modern Automotive Cyber-Physical Systems
    Baek, Youngmi
    Park, Seo-Hee
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [22] Adaptive cyber-attack modeling system
    Gonsalves, Paul G.
    Dougherty, Edward T.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201
  • [23] Cyber-attack and defense simulation framework
    Bergin, Dennis Lee
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
  • [24] Cyber-attack as inevitable kinetic war
    Lilienthal, Gary
    Ahmad, Nehaluddin
    COMPUTER LAW & SECURITY REVIEW, 2015, 31 (03) : 390 - 400
  • [25] Cyber-attack, a clear and present danger
    不详
    NEW SCIENTIST, 2009, 201 (2699) : 18 - 19
  • [26] Controller Cyber-Attack Detection and Isolation
    Sztyber-Betley, Anna
    Syfert, Michal
    Koscielny, Jan Maciej
    Gorecka, Zuzanna
    SENSORS, 2023, 23 (05)
  • [27] ARTT Taxonomy and Cyber-attack Framewok
    Douad, Mohamed Amine
    Dahmani, Youcef
    2015 FIRST INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF INFORMATION AND COMMUNICATION (NTIC), 2015,
  • [28] Cyber-Attack Features for Detecting Cyber Threat Incidents from Online News
    Abdullah, Mohamad Syahir
    Zainal, Anazida
    Maarof, Mohd Aizaini
    Kassim, Mohamad Nizam
    PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
  • [29] Cyber Terror Attack Analysis for Industrial Control Systems (SCADA)
    Sogut, Esra
    Erdem, O. Ayhan
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2020, 23 (02): : 557 - 566
  • [30] Application of Artificial Neural Network for Cyber-Attack Detection in Water Distribution Systems as Cyber Physical Systems
    Min, Kyoung Won
    Choi, Young Hwan
    Al-Shamiri, Abobakr Khalil
    Kim, Joong Hoon
    ADVANCES IN HARMONY SEARCH, SOFT COMPUTING AND APPLICATIONS, 2020, 1063 : 82 - 88