Wireless Vulnerability of SCADA Systems

被引:0
作者
Francia, Guillermo, III [1 ]
Thornton, David [1 ]
Brookshire, Thomas [1 ]
机构
[1] Jacksonville State Univ, 700 Pelham Rd N, Jacksonville, AL 36265 USA
来源
PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE | 2012年
基金
美国国家科学基金会;
关键词
SCADA; Security; Wireless networks; Penetration Testing; Vulnerability Assessment; Risk;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Critical infrastructures such as the Supervisory Control and Data Acquisition (SCADA) systems have succumbed to the demands of greater connectivity. Although the scheme of connecting these critical equipment and devices to cyberspace has brought us tremendous convenience, it also enabled certain unimaginable risks and vulnerabilities. These risks and vulnerabilities are very critical to our daily existence and are perilous to ignore. This paper presents an overview of wireless security and vulnerabilities of SCADA systems. Also described are proof- of- concept methods of attacking wireless vulnerabilities on SCADA systems.
引用
收藏
页数:2
相关论文
共 9 条
[1]  
Ahmad A, 2005, WIRELESS AND MOBILE DATA NETWORKS, P1, DOI 10.1002/0471729221
[2]  
Aircrack-ng Website, 2011, SIMPL WEP CRACK FLOW
[3]  
Cache J., 2010, Hacking Exposed Wireless: Wireless Security Secrets Solutions, V2nd
[4]  
ColaSoft, 2012, COL PACK BUILD
[5]  
Francia III G. A., 2011, P 2011 INT C SEC MAN
[6]  
Karma Project, 2011, LIN ROG ACC POINT HO
[7]  
Martinovic I, 2008, WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P36
[8]  
Sanders C., 2010, Understanding man-in-the-middle attacks - part 3: Session hijacking
[9]  
Schneider Electric, J SER SPREAD SPECTR