SCADA Systems Cyber Security for Critical infrastructures: Case Studies in the Transport Sector

Suhaila Ismail, Elena Sitnikova, Jill Slay

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Past cyber-attacks on Supervisory Control and Data Acquisition (SCADA) Systems for Critical infrastructures have left these systems compromised and caused financial and economic problems for the relevant organisations. Deliberate attacks have resulted in delayed or denial of services, inconvenience to the public and physical injury to people in certain cases. This study will explore the past attacks on and vulnerabilities of SCADA Systems with specific reference to the transport sector by examining three case studies. The outcomes of these case studies will be further analysed according to the cyberterrorist decision-making theories. These are strategic, organisational and psychological theories based on the study by McCormick (20003), who further categorized Nelson's (1999) cyber-terrorist capabilities that included: simple-unstructured, advance-structured and complex-coordinated capabilities categories that lead to an attack on a system, in particular SCADA Systems for Critical infrastructures. Based on existing theories, this paper outlines the level of capabilities and decision-making pattern that a cyberterrorist requires when attempting penetrating a SCADA systems environment. The results of this study will form the basis of a guideline that organisations can use so that they are better prepared in identifying potential future cybersecurity attacks on their SCADA systems.

Original languageEnglish
Title of host publicationProceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
EditorsJannie Zaaiman, Louise Leenen
PublisherAcademic Conferences and Publishing International Limited
Pages425-433
Number of pages9
ISBN (Electronic)9781910309964
Publication statusPublished - 2015
Externally publishedYes
Event10th International Conference on Cyber Warfare and Security, ICCWS 2015 - , South Africa
Duration: 24 Mar 201525 Mar 2015

Publication series

NameProceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015

Conference

Conference10th International Conference on Cyber Warfare and Security, ICCWS 2015
Country/TerritorySouth Africa
Period24/03/1525/03/15

Keywords

  • Critical infrastructures
  • SCADA system
  • SCADA system vulnerabilities
  • Security assessment
  • Security best practices

Fingerprint

Dive into the research topics of 'SCADA Systems Cyber Security for Critical infrastructures: Case Studies in the Transport Sector'. Together they form a unique fingerprint.

Cite this