SCADA security in the light of Cyber-Warfare

被引:190
|
作者
Nicholson, A. [1 ]
Webber, S. [1 ]
Dyer, S. [1 ]
Patel, T. [1 ]
Janicke, H. [1 ]
机构
[1] De Montfort Univ, Fac Technol, Leicester LE1 9BH, Leics, England
关键词
SCADA; Security; Cyber-Warfare; Adversary classification; SCADA incidents;
D O I
10.1016/j.cose.2012.02.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems are deployed worldwide in many critical infrastructures ranging from power generation, over public transport to industrial manufacturing systems. Whilst contemporary research has identified the need for protecting SCADA systems, these information are disparate and do not provide a coherent view of the threats and the risks resulting from the tendency to integrate these once isolated systems into corporate networks that are prone to cyber attacks.. This paper surveys ongoing research and provides a coherent overview of the threats, risks and mitigation strategies in the area of SCADA security. (C) 2012 Elsevier Ltd. All rights reserved.
引用
下载
收藏
页码:418 / 436
页数:19
相关论文
共 50 条
  • [41] Cyber Security in communication of SCADA systems using IEC 61850
    Czechowski, Robert
    Wicher, Pawel
    Wiecha, Bernard
    2015 MODERN ELECTRIC POWER SYSTEMS (MEPS), 2015,
  • [42] Results From a SCADA-Based Cyber Security Competition
    Novak, Heath
    Likarish, Dan
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 177 - 182
  • [43] Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security"
    Jones, Kevin
    Janicke, Helge
    Facchi, Christian
    Maglaras, Leandros
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 34 : 152 - 152
  • [44] Lessons from Stuxnet and the Realm of Cyber and Nuclear Security: Implications for Ethics in Cyber Warfare
    Baylon, Caroline
    ETHICS AND POLICIES FOR CYBER OPERATIONS: A NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE INITIATIVE, 2017, 124 : 213 - 229
  • [45] What are the Roles of Electronic and Cyber Warfare in Cognitive Radio Security?
    Scott, Amber
    Hardy, T. J.
    Martin, Richard K.
    Thomas, Ryan W.
    2011 IEEE 54TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2011,
  • [46] The Impact of Cyber-Physical Warfare on Global Human Security
    Payne, Bryson R.
    Mienie, Edward L.
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2019, 9 (03) : 36 - 50
  • [47] Cyber security and communications network on SCADA systems in the context of Smart Grids
    Rizzetti, Tiago Antonio
    Wessel, Pedro
    Rodrigues, Alexandre Silva
    da Silva, Bolivar Menezes
    Milbradt, Rafael
    Canha, Luciane Neves
    2015 50TH INTERNATIONAL UNIVERSITIES POWER ENGINEERING CONFERENCE (UPEC), 2015,
  • [48] Cyber-Security Gaps in a Digital Substation: From Sensors to SCADA
    Khodabakhsh, Athar
    Yayilgan, Sule Yildirim
    Houmb, Siv Hilde
    Hurzuk, Nargis
    Foros, Jorn
    Istad, Maren
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 39 - 42
  • [49] Enhancing Suricata Intrusion Detection System for Cyber Security in SCADA Networks
    Wong, Kevin
    Dillabaugh, Craig
    Seddigh, Nabil
    Nandy, Biswajit
    2017 IEEE 30TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2017,
  • [50] CYBER SECURITY - Conclusion SCADA system protection requires independent barriers
    Shaw, Tim
    OIL & GAS JOURNAL, 2009, 107 (37) : 68 - 71