DocumentCode :
2927428
Title :
Developing a solid SCADA security strategy
Author :
Pollet, Jonathan
fYear :
2002
fDate :
19-21 Nov. 2002
Firstpage :
148
Lastpage :
156
Abstract :
This paper will discuss how the level of hacking has risen in recent years, and some of the existing vulnerability assessments that have been recorded and discussed by several organizations. It will then step through a series of strategies for designing "Rings of Defense" around your corporate networking and SCADA infrastructure. The section on "Developing a SCADA Security Strategy" has been compiled through many sources, and these strategies can be considered as "Best Practices". This paper will then describe specific threats to SCADA Systems and some sample hacking scenarios, and then rank these threats in a security matrix. The following sections after the security matrix describe why security for SCADA systems and control systems are typically overlooked, and what steps should be taken when considering SCADA Security.
Keywords :
SCADA systems; computer crime; security of data; SCADA system security; computer hacking; control system; corporate network; Automation; Computer crime; Computer hacking; Government; Information security; National security; Network servers; SCADA systems; Solids; Telecommunication computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Sensors for Industry Conference, 2002. 2nd ISA/IEEE
Print_ISBN :
1-55617-834-4
Type :
conf
DOI :
10.1109/SFICON.2002.1159826
Filename :
1159826
Link To Document :
بازگشت