Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks

Suhaila Ismail, Elena Sitnikova, Jill Slay

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Citations (Scopus)

Abstract

Security is essential in protecting confidential data, especially in Supervisory Control and Data Acquisition (SCADA) systems which monitor and control national critical infrastructures, such as energy, water and communications. Security controls are implemented to prevent attacks that could destroy or damage critical infrastructures. Previous critical infrastructure surveys point out the gaps in knowledge, including the lack of coordination between sectors, inadequate exchange of information, less awareness and engagement in government critical infrastructure protection (CIP) programs. Consequently, private sector and government organizations feel less prepared. This paper highlights existing vulnerabilities, provides a list of previous attacks, discusses existing cyber security methodologies and provides a framework aiming to improve security in SCADA systems to protect them against cyber-attacks.

Original languageEnglish
Title of host publicationICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Proceedings
Subtitle of host publication29th IFIP TC 11 International Conference, SEC 2014 Marrakech, Morocco, June 2-4, 2014 Proceedings
EditorsNora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans
PublisherSpringer New York LLC
Pages242-249
Number of pages8
ISBN (Electronic)9783642554155
ISBN (Print)9783642554148
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event29th IFIP TC 11 International Conference, SEC 2014 - Marrakesh, Morocco
Duration: 2 Jun 20144 Jun 2014

Publication series

NameIFIP Advances in Information and Communication Technology
Volume428
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Conference

Conference29th IFIP TC 11 International Conference, SEC 2014
Country/TerritoryMorocco
CityMarrakesh
Period2/06/144/06/14

Keywords

  • Critical Infrastructure
  • Cyber Security
  • SCADA
  • SCADA vulnerabilities
  • Security Assessment

Fingerprint

Dive into the research topics of 'Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks'. Together they form a unique fingerprint.

Cite this