earticle

논문검색

A Study of Effective Defense-In-Depth Strategy of Cyber Security on ICS

초록

영어

The system of SCADA(Supervisory Control and Data Acquisition Security) used in electricity, water, petroleum and gas, transportation as well as manufacturing, is to collect scattered data and to monitor assets related as a centralized suppression system. ICS system, including current SCADA, is not isolated from outside, being connected with IT solution, and can operate equipment through broadband network, instead of accessing physically. Accordingly, the security accident of suppressing system can occur in the fields of antagonistic nations, terrorists, foundational facility invaders, natural disasters and ill-will or accidental actions. The security control examined in this study provides a defense-in-depth strategy which is applicable to the effective cyber security strategy regarding ICS to protect the confidentiality of information, zero defect, availability through the classification of control, operational control and technological control.

목차

Abstract
 1. Introduction
 2. Related Studies
  2.1 SCADA System
  2.2 ICS Risk
 3. Establishment of Defense-In-Depth Strategy
  3.1 Management Control
  3.2 Operation Control
  3.3 Technology Control
 4. Conclusion
 References

저자정보

  • Seong-Muk Choi Department of IT Policy and Mgmt., Graduate School of Soongsil University, Seoul 156-743, Korea
  • Rae-Hyung Kim Division of White Hacking Team, SK Infosec Consulting, Gyeonggi-do 13486, Korea
  • Ga-Ye Kim Department of Architectural Structure Labortory, Graduate School of Ewha Womans University, Seoul 120-750, Korea
  • Hyeon-Kyung Lee Graduate School of Software, Soongsil University, Seoul 156-743, Korea
  • GwangYong Gim Department of Business Administration, Soongsil University, Seoul 156-743, Korea
  • Jong-Bae Kim Graduate School of Software, Soongsil University, Seoul 156-743, Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.