How to protect SCADA systems from cyber-attack

被引:0
|
作者
Rush, William F.
Kinast, John A.
机构
来源
Gas Utility Manager | 2003年 / 47卷 / 09期
关键词
Cryptography - Data processing - Economics - Finance;
D O I
暂无
中图分类号
学科分类号
摘要
The technique to protect SCADA systems from cyber-attack was discussed. It was stated that the first step in protecting a SCADA system is to recognize the possible threats against such systems. It was suggested that the hacker might possess malicious intent or could do accidental damage to a system.
引用
收藏
页码:12 / 18
相关论文
共 50 条
  • [41] Methods of cyber-attack identification for power systems based on bilateral cyber-physical information
    Wang, Qi
    Cai, Xingpu
    Tang, Yi
    Ni, Ming
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2021, 125
  • [42] A cyber-attack response plan: How to ensure that patients continue to be treated (correctly)
    Peters, Samuel
    RADIOTHERAPY AND ONCOLOGY, 2024, 194 : S2 - S3
  • [43] Attack Analysis Framework for Cyber-Attack and Defense Test Platform
    Qi, Yulu
    Jiang, Rong
    Jia, Yan
    Li, Aiping
    ELECTRONICS, 2020, 9 (09) : 1 - 18
  • [44] Cyber-attack risk low for medical devices
    Tse, Zion Tsz Ho
    Xu, Sheng
    Fung, Isaac Chun-Hai
    Wood, Bradford J.
    SCIENCE, 2015, 347 (6228) : 1323 - 1324
  • [45] A Flow Attack Strategy based on Critical Links for Cyber-attack
    Qi, Jiming
    Zhang, Jiazheng
    Liu, Qingxia
    Wang, Bang
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 913 - 920
  • [46] Thwarting cyber-attack reconnaissance with inconsistency and deception
    Rowe, Neil C.
    Goh, Han C.
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 151 - +
  • [47] Telecom links provide cyber-attack route
    Fulghum, DA
    AVIATION WEEK & SPACE TECHNOLOGY, 1999, 151 (19): : 81 - 83
  • [48] Counterplanning deceptions to foil cyber-attack plans
    Rowe, NC
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 221 - 228
  • [49] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    系统仿真技术, 2017, 13 (02) : 90 - 104
  • [50] Predictive model for multistage cyber-attack simulation
    Kour, Ravdeep
    Thaduri, Adithya
    Karim, Ramin
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2020, 11 (03) : 600 - 613