How to protect SCADA systems from cyber-attack

被引:0
|
作者
Rush, William F.
Kinast, John A.
机构
来源
Gas Utility Manager | 2003年 / 47卷 / 09期
关键词
Cryptography - Data processing - Economics - Finance;
D O I
暂无
中图分类号
学科分类号
摘要
The technique to protect SCADA systems from cyber-attack was discussed. It was stated that the first step in protecting a SCADA system is to recognize the possible threats against such systems. It was suggested that the hacker might possess malicious intent or could do accidental damage to a system.
引用
收藏
页码:12 / 18
相关论文
共 50 条
  • [31] A model predictive approach for cyber-attack detection and mitigation in control systems
    Rosich, Albert
    Voos, Holger
    Li, Yumei
    Darouach, Mohamed
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 6621 - 6626
  • [32] Distributed cyber-attack isolation for large-scale interconnected systems
    Gallo, Alexander J.
    Boem, Francesca
    Parisini, Thomas
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 48 - 53
  • [33] Estimating the Impact of Cyber-Attack Strategies for Stochastic Networked Control Systems
    Milosevic, Jezdimir
    Sandberg, Henrik
    Johansson, Karl Henrik
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (02): : 747 - 757
  • [34] Vulnerability Analysis of Power Systems Based on Cyber-Attack and Defense Models
    Hasan, Saqib
    Ghafouri, Amin
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    2018 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2018,
  • [35] KCAD: Kinetic Cyber-Attack Detection Method for Cyber-Physical Additive Manufacturing Systems
    Chhetri, Sujit Rokka
    Canedo, Arquimedes
    Al Faruque, Mohammad Abdullah
    2016 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2016,
  • [36] Hierarchical Cyber-Attack Detection in Large-Scale Interconnected Systems
    Keijzer, Twan
    Gallo, Alexander J.
    Ferrari, Riccardo M. G.
    2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 6134 - 6139
  • [37] Experimentation and Implementation of the BFT++ Cyber-Attack Resilience Mechanism for Cyber-Physical Systems
    Keppler, David R.
    Karim, M. Faraz
    Mickelson, Matthew S.
    Mertoguno, J. Sukarno
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2024, 8 (03)
  • [38] Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems
    Hao, Xiaochen
    Lv, Mingsong
    Zheng, Jiesheng
    Zhang, Zhengkui
    Yi, Wang
    2019 IEEE 37TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2019), 2019, : 237 - 245
  • [39] Methods of cyber-attack identification for power systems based on bilateral cyber-physical information
    Wang, Qi
    Cai, Xingpu
    Tang, Yi
    Ni, Ming
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2021, 125
  • [40] A Flow Attack Strategy based on Critical Links for Cyber-attack
    Qi, Jiming
    Zhang, Jiazheng
    Liu, Qingxia
    Wang, Bang
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 913 - 920