SCADA security in the light of Cyber-Warfare

被引:190
|
作者
Nicholson, A. [1 ]
Webber, S. [1 ]
Dyer, S. [1 ]
Patel, T. [1 ]
Janicke, H. [1 ]
机构
[1] De Montfort Univ, Fac Technol, Leicester LE1 9BH, Leics, England
关键词
SCADA; Security; Cyber-Warfare; Adversary classification; SCADA incidents;
D O I
10.1016/j.cose.2012.02.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems are deployed worldwide in many critical infrastructures ranging from power generation, over public transport to industrial manufacturing systems. Whilst contemporary research has identified the need for protecting SCADA systems, these information are disparate and do not provide a coherent view of the threats and the risks resulting from the tendency to integrate these once isolated systems into corporate networks that are prone to cyber attacks.. This paper surveys ongoing research and provides a coherent overview of the threats, risks and mitigation strategies in the area of SCADA security. (C) 2012 Elsevier Ltd. All rights reserved.
引用
下载
收藏
页码:418 / 436
页数:19
相关论文
共 50 条
  • [31] The Island of the Atlantean Sea, by Juan Tomas Avila Laurel: autobiography and essayistic cyber-warfare in Equatorial Guinea
    Sa, Ana Lucia
    REVISTA CRITICA CULTURAL, 2011, 6 (02): : 487 - 502
  • [32] Nuclear Weapons, Cyber Warfare, and Cyber Security: Ethical and Anticipated Ethical Issues
    Wilson, Richard L.
    Fitz, Alexia
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 440 - 448
  • [33] New cyber security blog tackles DCS, SCADA vulnerabilities
    Hamburg, Bloggers
    Lu allen
    CONTROL ENGINEERING, 2008, 55 (12) : 23 - 23
  • [34] Cyber-Security and Governance for ICS/SCADA in South Africa
    Pretorius, Barend
    van Niekerk, Brett
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 241 - 251
  • [35] A review of cyber security risk assessment methods for SCADA systems
    Cherdantseva, Yulia
    Burnap, Pete
    Blyth, Andrew
    Eden, Peter
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    COMPUTERS & SECURITY, 2016, 56 : 1 - 27
  • [36] A SCADA Testbed for Investigating Cyber Security Vulnerabilities in Critical Infrastructures
    Tesfahun, Abebe
    Bhaskari, D. Lalitha
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (01) : 54 - 62
  • [37] Cyber Security Risk Management in the SCADA Critical Infrastructure Environment
    Henrie, Morgan
    ENGINEERING MANAGEMENT JOURNAL, 2013, 25 (02) : 38 - 45
  • [38] Security of SCADA Systems Against Cyber-Physical Attacks
    Do, Van Long
    Fillatre, Lionel
    Nikiforov, Igor
    Willett, Peter
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2017, 32 (05) : 28 - 45
  • [39] Host-Oriented Approach to Cyber Security for the SCADA Systems
    Lee, Jae-Myeong
    Hong, Sugwon
    2020 6TH IEEE CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'20), 2020, : 151 - 155
  • [40] Cyber-Security for ICS/SCADA: A South African Perspective
    Pretorius, Barend
    van Niekerk, Brett
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2016, 6 (03) : 1 - 16