Blog
About

  • Record: found
  • Abstract: found
  • Article: found
Is Open Access

A Forensic Taxonomy of SCADA Systems and Approach to Incident Response

, , , , ,

3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)

Industrial Control System & SCADA Cyber Security Research (ICS-CSR)

17 - 18 September 2015

SCADA forensics, digital forensics, incident response, SCADA architecture, ICS forensics, critical infrastructure

Read this article at

Bookmark
      There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

      Abstract

      SCADA systems that monitor and control Critical National Infrastructure (CNI) are increasingly becoming the target of advanced cyber-attacks since their convergence with TCP/IP and other networks for efficient controlling. When a SCADA incident occurs the consequences can be catastrophic having an impact on the environment, economy and human life and therefore it is essential for a forensic investigation to take place. SCADA system forensics is an essential process within the cyber-security lifecycle that not only helps to identify the cause of an incident and those responsible but to help develop and design more secure systems of the future. This paper provides an overall forensic taxonomy of the SCADA system incident response model. It discusses the development of forensic readiness within SCADA system investigations, including the challenges faced by the SCADA forensic investigator and suggests ways in which the process may be improved.

      Related collections

      Most cited references 15

      • Record: found
      • Abstract: not found
      • Article: not found

      Uninvited connections: A Study of vulnerable devices on the internet of things (IoT)

        Bookmark
        • Record: found
        • Abstract: not found
        • Article: not found

        Evaluation of the ability of the Shodan search engine to identify internet-facing industrial control devices

          Bookmark
          • Record: found
          • Abstract: not found
          • Article: not found

          Snort: IDS and IPS Toolkit

           J. Beale,  J BEALE (2007)
            Bookmark

            Author and article information

            Affiliations
            Information Security Research group

            School of Computing and Mathematics

            Department of Computing, Engineering and Science

            University of South Wales

            Pontypridd, CF371DL UK
            Computer Science and Informatics

            Cardiff University, Queen’s Buildings

            5 The Parade, Roath

            Cardiff CF24 3AA, UK
            Airbus Group Innovations

            Quadrant House Celtic Springs

            Coedkernew

            Newport NP10 8FZ, UK
            Contributors
            Conference
            September 2015
            September 2015
            : 42-51
            10.14236/ewic/ICS2015.5
            © Eden et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
            ICS-CSR
            3
            Germany
            17 - 18 September 2015
            Electronic Workshops in Computing (eWiC)
            Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
            Product
            Product Information: 1477-9358 BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Comments

            Comment on this article