1,260
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Cyber Security Maintenance for SCADA Systems

      proceedings-article
      , ,
      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)
      Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
      17 - 18 September 2015
      Bookmark

            Abstract

            To ensure a high security level in industrial systems over a period of time, maintenance is required. In this paper, we give an overview of security-relatedmaintenance tasks incorporating new technologies employed in industrial control systems such as cloud computing but also new attack technologies such as GPS spoofing. We also provide a threat model that focuses on threats that materialize during the lifetime of an industrial system and that are typically not present during the commissioning phase. Furthermore, we show how the identified maintenance tasks can mitigate these threats.

            Content

            Author and article information

            Contributors
            Conference
            September 2015
            September 2015
            : 89-94
            Affiliations
            [0001]ABB Corporate Research

            Segelhofstr. 1K, Baden, Switzerland
            Article
            10.14236/ewic/ICS2015.10
            880ef0b1-632b-4423-96d9-25697e295d30
            © Schneider et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
            ICS-CSR
            3
            Germany
            17 - 18 September 2015
            Electronic Workshops in Computing (eWiC)
            Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICS2015.10
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction

            References

            1. 2007 Addressing IT security for critical control systems HICSS ’07: Proceedings of the 40th Annual Hawaii International Conference on System Sciences

            2. 2005 IT security for automation systems The Industrial Information Technology Handbook Boca Raton, FL CRC Press 1 14

            3. 2014 Sept 16–19 Securing industrial automation and control systems using application whitelisting Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA) Barcelona, Spain 1 4 Available from http://dx.doi.org/10.1109/ETFA.2014.7005242

            4. 2014 Automatic attack surface reduction in next-generation industrial control systems Proceedings of the IEEE Symposium Series on Computational Intelligence (SSCI) Orlando FL, USA

            5. 2014 Variables influencing information security policy compliance: A systematic review of quantitative studies Inform. Manage. Comput. Security 22 1 42 75

            6. 2014 Short paper: Detection of GPS spoofing attacks in power grids Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, ACM 99 104

            7. , 2013 Cyber security for a smart grid-what about phishing? 4th IEEE/PES Innovative Smart Grid Technologies Europe (ISGT Europe) 1 5

            8. 2009 Analysis on cyber threats to scada systems IEEE Transmission & Distribution Conference & Exposition: Asia and Pacific 1 4

            9. IEC 61850 International Electrotechnical Commission, IEC TC57

            10. , 2006 Security issues in SCADA networks Comput. Secur 25 7 498 506

            11. 2011 Principles of information security 4th ed Boston, MA Cengage Learning

            Comments

            Comment on this article