Blog
About

159
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Forensic Taxonomy of SCADA Systems and Approach to Incident Response

      , , , , ,

      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)

      Industrial Control System & SCADA Cyber Security Research (ICS-CSR)

      17 - 18 September 2015

      SCADA forensics, digital forensics, incident response, SCADA architecture, ICS forensics, critical infrastructure

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          SCADA systems that monitor and control Critical National Infrastructure (CNI) are increasingly becoming the target of advanced cyber-attacks since their convergence with TCP/IP and other networks for efficient controlling. When a SCADA incident occurs the consequences can be catastrophic having an impact on the environment, economy and human life and therefore it is essential for a forensic investigation to take place. SCADA system forensics is an essential process within the cyber-security lifecycle that not only helps to identify the cause of an incident and those responsible but to help develop and design more secure systems of the future. This paper provides an overall forensic taxonomy of the SCADA system incident response model. It discusses the development of forensic readiness within SCADA system investigations, including the challenges faced by the SCADA forensic investigator and suggests ways in which the process may be improved.

          Related collections

          Most cited references 15

          • Record: found
          • Abstract: not found
          • Article: not found

          Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT)

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A distributed real-time event correlation architecture for SCADA security

               Y Deng,  S Shukla,  S. SHUKLA (2013)
                Bookmark

                Author and article information

                Contributors
                Conference
                September 2015
                September 2015
                : 42-51
                Affiliations
                Information Security Research group

                School of Computing and Mathematics

                Department of Computing, Engineering and Science

                University of South Wales

                Pontypridd, CF371DL UK
                Computer Science and Informatics

                Cardiff University, Queen’s Buildings

                5 The Parade, Roath

                Cardiff CF24 3AA, UK
                Airbus Group Innovations

                Quadrant House Celtic Springs

                Coedkernew

                Newport NP10 8FZ, UK
                10.14236/ewic/ICS2015.5
                © Eden et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
                ICS-CSR
                3
                Germany
                17 - 18 September 2015
                Electronic Workshops in Computing (eWiC)
                Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
                Product
                Product Information: 1477-9358 BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article