Cyber-Security for ICS/SCADA: A South African Perspective

被引:8
|
作者
Pretorius, Barend [1 ,2 ]
van Niekerk, Brett [1 ,2 ]
机构
[1] Transnet, Durban, South Africa
[2] Univ KwaZulu Natal, Durban, South Africa
关键词
Cyber-Attack; Cyber-Security; Industrial Control Systems; Supervisory Control and Data Acquisition; Vulnerabilities;
D O I
10.4018/IJCWT.2016070101
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies operating the infrastructure. Despite the high risk of leaving these systems exposed, providing adequate cyber-security is often challenging. The Stuxnet worm illustrated how vulnerable control systems potentially are when it bypassed a number of security mechanisms to cause physical damage to an Iranian nuclear facility. The article focuses on ICS/SCADA in South Africa discussing the unique challenges and legislation relate to securing control system in the South Africa. A governance and security framework for overcoming these challenges are proposed.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [31] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs
    Gallego-Nicasio Crespo, Beatriz
    Garwood, Alan
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
  • [32] Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph
    Mendsaikhan, Otgonpurev
    Hasegawa, Hirokazu
    Yamaguchi, Yukiko
    Shimada, Hajime
    IEEE ACCESS, 2020, 8 (08): : 177041 - 177052
  • [33] Cyber-Security of Smart Microgrids: A Survey
    Nejabatkhah, Farzam
    Li, Yun Wei
    Liang, Hao
    Reza Ahrabi, Rouzbeh
    ENERGIES, 2021, 14 (01)
  • [34] Cyber-security: Who will provide protection?
    ViaSat, United Kingdom
    Comput. Fraud Secur., 12 (19-20): : 19 - 20
  • [35] THE IMPORTANCE AND ROLE OF NATO IN CYBER-SECURITY
    Cioaca, Catalin
    15TH INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION: MILITARY SCIENCES. SECURITY AND DEFENSE, CONFERENCE PROCEEDINGS 1, 2009, 1 : 158 - 162
  • [36] Cyber-security in robotics and autonomous systems
    Matellan, Vicente
    Bonaci, Tamara
    Sabaliauskaite, Giedre
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2018, 100 : 41 - 42
  • [37] WHERE NEXT FOR UK CYBER-SECURITY?
    Neville-Jones, Pauline
    Phillips, Mark
    RUSI JOURNAL, 2012, 157 (06): : 32 - 40
  • [38] AI, Connectivity and Cyber-Security in Avionics
    Gatti, Marc
    Damien, Alienor
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 35 - 38
  • [39] Cyber-security fortresses built on quicksand
    Flexera Software, United States
    Netw. Secur., 8 (5-8):
  • [40] Cyber-Security Incidents and Audit Quality
    Rosati, Pierangelo
    Gogolin, Fabian
    Lynn, Theo
    EUROPEAN ACCOUNTING REVIEW, 2022, 31 (03) : 701 - 728