Securing Supervisory Control and Data Acquisition Systems: Factors and Research Direction

被引:0
作者
Ayaburi, Emmanuel [1 ]
Sobrevinas, Lucia [1 ]
机构
[1] Univ Texas San Antonio, San Antonio, TX 78285 USA
来源
AMCIS 2015 PROCEEDINGS | 2015年
关键词
SCADA; security; vulnerability; assessment; threat;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SCADA systems before their current generation were seen as mostly centralized and isolated monolithic structures that relied on proprietary network, hardware and communication protocol and were thus were considered insulated from cyber-attacks. However, with the recent advancement in network and communication technologies SCADA systems are now connected to corporate intranet and the internet. While this change has increased the ease of management and integration, it has also exposed SCADA systems to a myriad of cyber vulnerabilities. This research examined key factors that support secure assessment and operation of SCADA systems, the methods and techniques used to implement best practices and security controls within these systems, and finally it identified areas of currently ongoing and future research within this field.
引用
收藏
页数:9
相关论文
共 20 条
  • [1] Alcaraz C., 2011, Proceedings of the 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom 2011), P527, DOI 10.1109/CloudCom.2011.79
  • [2] Avallone S., 2010, 2010 5 INT C CRIT IN, P1
  • [3] Byres E.J., 2004, P VDE K, V116
  • [4] Cai N, 2008, IEEE INTL CONF IND I, P537
  • [5] A Trust System Architecture for SCADA Network Security
    Coates, Gregory M.
    Hopkinson, Kenneth M.
    Graham, Scott R.
    Kurkowski, Stuart H.
    [J]. IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (01) : 158 - 169
  • [6] Eduard v. L., PACE
  • [7] Fernandez J., 2005, J COMPUTING SCI COLL, V20, P160
  • [8] Hentea Mariana, 2008, Interdisciplinary Journal of Information, Knowledge, and Management, V3, P73
  • [9] Hildick-Smith A., 2005, SANS READING ROOM GS
  • [10] Security issues in SCADA networks
    Igure, Vinay M.
    Laughter, Sean A.
    Williams, Ronald D.
    [J]. COMPUTERS & SECURITY, 2006, 25 (07) : 498 - 506