Cyber Security challenges and Issues of Industrial Control Systems - Some Security Recommendations

被引:0
作者
El Idrissi, Omar [1 ]
Mezrioui, Abdellatif [1 ]
Belmekki, Abdelhamid [1 ]
机构
[1] INPT, RAISS Team, STRS Lab, Rabat, Morocco
来源
2019 5TH IEEE INTERNATIONAL SMART CITIES CONFERENCE (IEEE ISC2 2019) | 2019年
关键词
Industrial Control System; SCADA control system; Critical infrastructure; Cyber security; Vulnerabilities; Threats;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Industrial control systems (ICS) are used to monitor and to control a variety of critical infrastructures that provide electricity, water, transportation, manufacturing and other essential services. The growing integration of IT technologies into ICS to support enterprise connectivity as well as remote access capabilities has exposed them to a wide range of security issues. In this article, we highlight that addressing these issues is a great challenge because there are no specific security solutions designed exclusively for ICS. In addition, we point out that it is difficult to implement existing conventional security measures at the ICS to address these security issues and that it is due to the differences between traditional IT systems and the ICS in terms of both security constraints and security requirements. Therefore, in order to improve ICS security posture, a list of recommendations and best practices has been proposed at the end.
引用
收藏
页码:330 / 335
页数:6
相关论文
共 21 条
  • [1] [Anonymous], 2016, Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies
  • [2] [Anonymous], 2018, THREAT LANDSC IND AU
  • [3] Cherdantseva Y., SCIENCEDIRECT 2015
  • [4] Clusif, 2017, FICH INC CYB SI IND
  • [5] CPNI, 2011, CYB SEC ASS IND CONT
  • [6] Duggan David P., SANDIA REPORT
  • [7] E-ISAC, Analysis of the Cyber Attack on the Ukrainian Power Grid
  • [8] European Network and Information Security Agency (ENISA), PROT IND CONTR SYST
  • [9] Falco J., IT SECURITY IND CONT
  • [10] Falliere N., 2011, W32. Stuxnet Dossier, V5, P29