We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Cryptography and Security

Title: Effectiveness of SCADA System Security Used Within Critical Infrastructure

Authors: Joshua Taylor
Abstract: Since the 1960s Supervisory Control and Data Acquisition (SCADA) systems have been used within industry. Referred to as critical infrastructure (CI), key installations such as power stations, water treatment and energy grids are controlled using SCADA. Existing literature reveals inherent security risks to CI and suggests this stems from the rise of interconnected networks, leading to the hypothesis that the rise of interconnectivity between corporate networks and SCADA system networks pose security risks to CI. The results from studies into previous global attacks involving SCADA and CI, with focus on two highly serious incidents in Iran and Ukraine, reveal that although interconnectivity is a major factor, isolated CIs are still highly vulnerable to attack due to risks within the SCADA controllers and protocols.
Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:2012.11375 [cs.CR]
  (or arXiv:2012.11375v1 [cs.CR] for this version)

Submission history

From: Joshua Taylor [view email]
[v1] Fri, 18 Dec 2020 00:31:01 GMT (181kb)

Link back to: arXiv, form interface, contact.