TY - GEN
T1 - Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks
AU - Ismail, Suhaila
AU - Sitnikova, Elena
AU - Slay, Jill
PY - 2014
Y1 - 2014
N2 - Security is essential in protecting confidential data, especially in Supervisory Control and Data Acquisition (SCADA) systems which monitor and control national critical infrastructures, such as energy, water and communications. Security controls are implemented to prevent attacks that could destroy or damage critical infrastructures. Previous critical infrastructure surveys point out the gaps in knowledge, including the lack of coordination between sectors, inadequate exchange of information, less awareness and engagement in government critical infrastructure protection (CIP) programs. Consequently, private sector and government organizations feel less prepared. This paper highlights existing vulnerabilities, provides a list of previous attacks, discusses existing cyber security methodologies and provides a framework aiming to improve security in SCADA systems to protect them against cyber-attacks.
AB - Security is essential in protecting confidential data, especially in Supervisory Control and Data Acquisition (SCADA) systems which monitor and control national critical infrastructures, such as energy, water and communications. Security controls are implemented to prevent attacks that could destroy or damage critical infrastructures. Previous critical infrastructure surveys point out the gaps in knowledge, including the lack of coordination between sectors, inadequate exchange of information, less awareness and engagement in government critical infrastructure protection (CIP) programs. Consequently, private sector and government organizations feel less prepared. This paper highlights existing vulnerabilities, provides a list of previous attacks, discusses existing cyber security methodologies and provides a framework aiming to improve security in SCADA systems to protect them against cyber-attacks.
KW - Critical Infrastructure
KW - Cyber Security
KW - SCADA
KW - SCADA vulnerabilities
KW - Security Assessment
UR - http://www.scopus.com/inward/record.url?scp=84926509647&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-55415-5_20
DO - 10.1007/978-3-642-55415-5_20
M3 - Conference contribution
AN - SCOPUS:84926509647
SN - 9783642554148
T3 - IFIP Advances in Information and Communication Technology
SP - 242
EP - 249
BT - ICT Systems Security and Privacy Protection
A2 - Cuppens-Boulahia, Nora
A2 - Cuppens, Frédéric
A2 - Jajodia, Sushil
A2 - Kalam, Anas Abou El
A2 - Sans, Thierry
PB - Springer New York LLC
T2 - 29th IFIP TC 11 International Conference, SEC 2014
Y2 - 2 June 2014 through 4 June 2014
ER -