Cyber-Security for ICS/SCADA: A South African Perspective

被引:8
|
作者
Pretorius, Barend [1 ,2 ]
van Niekerk, Brett [1 ,2 ]
机构
[1] Transnet, Durban, South Africa
[2] Univ KwaZulu Natal, Durban, South Africa
关键词
Cyber-Attack; Cyber-Security; Industrial Control Systems; Supervisory Control and Data Acquisition; Vulnerabilities;
D O I
10.4018/IJCWT.2016070101
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies operating the infrastructure. Despite the high risk of leaving these systems exposed, providing adequate cyber-security is often challenging. The Stuxnet worm illustrated how vulnerable control systems potentially are when it bypassed a number of security mechanisms to cause physical damage to an Iranian nuclear facility. The article focuses on ICS/SCADA in South Africa discussing the unique challenges and legislation relate to securing control system in the South Africa. A governance and security framework for overcoming these challenges are proposed.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [21] CYBER-SECURITY RISKS OF FEDWIRE
    Bilger, Mark J.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2019, 14 (04)
  • [22] Challenging confidence in cyber-security
    Strand, Chris, 1600, Elsevier Ltd (2014):
  • [23] On Cyber-security of Augmentation Networks
    Neri, Alessandro
    Baldoni, Sara
    Capua, Roberto
    PROCEEDINGS OF THE 2019 INTERNATIONAL TECHNICAL MEETING OF THE INSTITUTE OF NAVIGATION, 2019, : 408 - 422
  • [24] On Cyber-Security of Information Systems
    Sneps-Sneppe, Manfred
    Sukhomlin, Vladimir
    Namiot, Dmitry
    DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2018), 2018, 919 : 201 - 211
  • [25] The Science of Social Cyber-Security
    Carley, Kathleen
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 459 - 459
  • [26] A CYBER-SECURITY STORM MAP
    Ferebee, Denise
    Dasgupta, Dipankar
    Wu, Qishi
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 93 - 102
  • [27] Seamless Industry 4.0 Integration: A Multilayered Cyber-Security Framework for Resilient SCADA Deployments in CPPS
    Wai, Eric
    Lee, C. K. M.
    APPLIED SCIENCES-BASEL, 2023, 13 (21):
  • [28] Cyber-security and risky behaviors in a developing country context: a Pakistani perspective
    Naurin Farooq Khan
    Naveed Ikram
    Sumera Saleem
    Saad Zafar
    Security Journal, 2023, 36 : 373 - 405
  • [29] Application of Bayesian Network to Data-Driven Cyber-Security Risk Assessment in SCADA Networks
    Huang, Kaixing
    Zhou, Chunjie
    Tian, Yu-Chu
    Tu, Weixun
    Peng, Yuan
    2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2017, : 96 - 101
  • [30] Cyber-security and risky behaviors in a developing country context: a Pakistani perspective
    Khan, Naurin Farooq
    Ikram, Naveed
    Saleem, Sumera
    Zafar, Saad
    SECURITY JOURNAL, 2023, 36 (02) : 373 - 405