원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Most of SCADA systems are Critical Infrastructures, so are vital to a nation and the incapacity or destruction of such systems would have enormous impact on the nation’s security, national public health or safety or any combination of those matters. SCADA security nowadays is mostly about providing a useful, but mainly "assured" methods to assess SCADA networks security. A lot of presenters talk about DefCon, BlackHats, password and vulnerability databases, SCADA tesing/assesing features. But the security doesn't stop with the hackers. This paper presents a new approach to SCADA security.
목차
Abstract
1. Introduction
2. SCADA and Control Systems
3. SCADA Components
3.1 SCADA HMI
3.2 SCADA Software
3.3 SCADA Hardware
4. SCADA’s role to Critical Infrastructure
5. SCADA Security
6. Vendors
6.1. Sabotage
6.2. Patching
7. People
7.1. Disgruntled employee
7.2. Protection
7.3. Irresponsibility
8. Technology
8.1. Anti-virus
8.2. Penetration testing
8.3. SCADA systems are insecure by default
9. Mistakes
10. Incidents
10.1. Disgruntled employees
10.2. Sabotage
10.3. Hackers
10.4. Thieves
10.5. Terrorists
11. Conclusion
References
1. Introduction
2. SCADA and Control Systems
3. SCADA Components
3.1 SCADA HMI
3.2 SCADA Software
3.3 SCADA Hardware
4. SCADA’s role to Critical Infrastructure
5. SCADA Security
6. Vendors
6.1. Sabotage
6.2. Patching
7. People
7.1. Disgruntled employee
7.2. Protection
7.3. Irresponsibility
8. Technology
8.1. Anti-virus
8.2. Penetration testing
8.3. SCADA systems are insecure by default
9. Mistakes
10. Incidents
10.1. Disgruntled employees
10.2. Sabotage
10.3. Hackers
10.4. Thieves
10.5. Terrorists
11. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보
