earticle

논문검색

보안 설계(Intrusion Detection and Protection)

A 4-step approach to SCADA security

원문정보

Kum-Taek Seo, Farkhod Alisherov, Min-kyu Choi, Tai-hoon Kim

피인용수 : 0(자료제공 : 네이버학술정보)

초록

영어

Most of SCADA systems are Critical Infrastructures, so are vital to a nation and the incapacity or destruction of such systems would have enormous impact on the nation’s security, national public health or safety or any combination of those matters. SCADA security nowadays is mostly about providing a useful, but mainly "assured" methods to assess SCADA networks security. A lot of presenters talk about DefCon, BlackHats, password and vulnerability databases, SCADA tesing/assesing features. But the security doesn't stop with the hackers. This paper presents a new approach to SCADA security.

목차

Abstract
 1. Introduction
 2. SCADA and Control Systems
 3. SCADA Components
  3.1 SCADA HMI
  3.2 SCADA Software
  3.3 SCADA Hardware
 4. SCADA’s role to Critical Infrastructure
 5. SCADA Security
 6. Vendors
  6.1. Sabotage
  6.2. Patching
 7. People
  7.1. Disgruntled employee
  7.2. Protection
  7.3. Irresponsibility
 8. Technology
  8.1. Anti-virus
  8.2. Penetration testing
  8.3. SCADA systems are insecure by default
 9. Mistakes
 10. Incidents
  10.1. Disgruntled employees
  10.2. Sabotage
  10.3. Hackers
  10.4. Thieves
  10.5. Terrorists
 11. Conclusion
 References

저자정보

  • Kum-Taek Seo Samrye-eup, Wanju-Gun, Jeollabuk-do
  • Farkhod Alisherov Department of Multimedia Engineering , Hannam University
  • Min-kyu Choi Department of Multimedia Engineering , Hannam University
  • Tai-hoon Kim Professor, Department of Multimedia Engineering , Hannam University

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.