Supervisory Control and Data Acquisition Systems security and risk management

Publish Year: 1393
نوع سند: مقاله کنفرانسی
زبان: English
View: 717

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICMI01_343

تاریخ نمایه سازی: 20 دی 1394

Abstract:

Supervisory Control and Data Acquisition Systems manage many of today’s citical infrastructures. They play a vital role in supporting modern society. Individuals, businesses, and governments rely on these critical controlsystems for their daily operation. Disruptions of these systems can lead to serious social and economic consequences at the national level. This paper shows relationship of objects in Supervisory Control and Data Acquisition System security incident chain and four pillars of critical information infrastracture protection. The four pillars are prevention and early warning, detection, reaction, and crisis management. The paper also classifies four pillars measures in Supervisory Control and Data Acquisition System protection based on technical and non-technical measures.

Authors

Elham Judi

IT management PHD student, Faculty of Economics and Business Administration, Ferdowsi University of Mashhad

Seyed Amin Hosseini Seno

Assistant professor of Computer Engineering Faculty, Ferdowsi University of Mashhad

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Alcaraz, C. (2011), Interconnec ted Sensor Networks for Critical Information ...
  • Alcaraz, C. Lopez, J. (2014), WASAM: A dynamic wide-area situational ...
  • Alcaraz, C. Zeadally, S. (2013), Critical Control System Protection in ...
  • Alcaraz, C. Zeadally, S. (2015), Critical infrastructure protection: Requirements and ...
  • Bahatt, J. Shah, V. Jani, O. (2014), An in strumentation ...
  • Fernandez, J. D. Fernandez, A. E. (2005), SCADA systems: vulnerabilities ...
  • Givens, A. D. Busch, N. E. (2013), Realizing the promise ...
  • Hiller, J. S. Russel, R. S. (2013), The challenge and ...
  • Lewis, A. M. Ward, D. Cyra, L. Kourti, N. (2013), ...
  • Merabti, M. Kennedy, M. Hurst, W. (2011), Critical Infrastructure Protection: ...
  • Ward, D. Kourti, N. Lazari, A. Cofta, P. (2014), Trust ...
  • Youm, H. Y. and Paik, E. (2012), Cybersecurity (Knowledge Sharing ...
  • http : //www .dhs _ gov/critic al -infrastructure sectors ...
  • نمایش کامل مراجع