Effectiveness of SCADA System Security Used Within Critical Infrastructure

12/18/2020
by   Joshua Taylor, et al.
0

Since the 1960s Supervisory Control and Data Acquisition (SCADA) systems have been used within industry. Referred to as critical infrastructure (CI), key installations such as power stations, water treatment and energy grids are controlled using SCADA. Existing literature reveals inherent security risks to CI and suggests this stems from the rise of interconnected networks, leading to the hypothesis that the rise of interconnectivity between corporate networks and SCADA system networks pose security risks to CI. The results from studies into previous global attacks involving SCADA and CI, with focus on two highly serious incidents in Iran and Ukraine, reveal that although interconnectivity is a major factor, isolated CIs are still highly vulnerable to attack due to risks within the SCADA controllers and protocols.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/17/2019

PropFuzz – An IT-Security Fuzzing Framework for Proprietary ICS Protocols

Programmable Logic Controllers are used for smart homes, in production p...
research
08/28/2022

Cyberattacks on Energy Infrastructures: Modern War Weapons

Recent high-profile cyberattacks on energy infrastructures, such as the ...
research
04/02/2019

A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape

As new technologies such as the Internet of Things (IoT) are integrated ...
research
07/11/2022

PowerDuck: A GOOSE Data Set of Cyberattacks in Substations

Power grids worldwide are increasingly victims of cyberattacks, where at...
research
06/26/2019

Security Rating Metrics for Distributed Wireless Systems

The paper examines quantitative assessment of wireless distribution syst...
research
05/16/2023

Comprehensively Analyzing the Impact of Cyberattacks on Power Grids

The increasing digitalization of power grids and especially the shift to...
research
02/17/2023

Cyber-attack TTP analysis for EPES systems

The electrical grid constitutes of legacy systems that were built with n...

Please sign up or login with your details

Forgot password? Click here to reset