원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Critical Infrastructures are so crucial to the society and community that a disruption of it can cause great damage. Many of these identified Critical Infrastructures are controlled by control systems like SCADA or Supervisory Control and Data Acquisition. Because of this, SCADA becomes a target of terrorists and other threats. In this paper, we discuss the relationship of Critical Infrastructure and SCADA, the threats and vulnerabilities and provides steps to minimize these threats and vulnerabilities. We also discuss the function of SCADA systems and other control systems to sectors which were considered Critical Infrastructure.
목차
Abstract
1. Introduction
2. Critical Infrastructure (CI)
3. Supervisory Control And Data Acquisition Systems
4. SCADA Network Attacks
4.1 Affects Status and Display Screens
4.2 Taking Over the Control Station
4.3 Disrupting Processes
4.4 Equipment and Property Damage
5. Critical Infrastructure Controlled by SCADA
5.1 SCADA Systems for Measuring and Managing Water
6. The Negative Aspect of SCADA Over CI
7. Steps to Meliorate SCADA Controlled CI’s
7.1 Do Not Rely on Proprietary Protocols to Protect System
7.2 Implement Intrusion Detection Systems and Incident Monitoring
7.3 Disconnect Unnecessary Connections to The SCADA Network
7.4 Identify All Connections to SCADA Networks
7.5 Establish A Strict And on Going Risk Management Process.
8. Conclusion
References
1. Introduction
2. Critical Infrastructure (CI)
3. Supervisory Control And Data Acquisition Systems
4. SCADA Network Attacks
4.1 Affects Status and Display Screens
4.2 Taking Over the Control Station
4.3 Disrupting Processes
4.4 Equipment and Property Damage
5. Critical Infrastructure Controlled by SCADA
5.1 SCADA Systems for Measuring and Managing Water
6. The Negative Aspect of SCADA Over CI
7. Steps to Meliorate SCADA Controlled CI’s
7.1 Do Not Rely on Proprietary Protocols to Protect System
7.2 Implement Intrusion Detection Systems and Incident Monitoring
7.3 Disconnect Unnecessary Connections to The SCADA Network
7.4 Identify All Connections to SCADA Networks
7.5 Establish A Strict And on Going Risk Management Process.
8. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보
