원문정보
초록
영어
The system of SCADA(Supervisory Control and Data Acquisition Security) used in electricity, water, petroleum and gas, transportation as well as manufacturing, is to collect scattered data and to monitor assets related as a centralized suppression system. ICS system, including current SCADA, is not isolated from outside, being connected with IT solution, and can operate equipment through broadband network, instead of accessing physically. Accordingly, the security accident of suppressing system can occur in the fields of antagonistic nations, terrorists, foundational facility invaders, natural disasters and ill-will or accidental actions. The security control examined in this study provides a defense-in-depth strategy which is applicable to the effective cyber security strategy regarding ICS to protect the confidentiality of information, zero defect, availability through the classification of control, operational control and technological control.
목차
1. Introduction
2. Related Studies
2.1 SCADA System
2.2 ICS Risk
3. Establishment of Defense-In-Depth Strategy
3.1 Management Control
3.2 Operation Control
3.3 Technology Control
4. Conclusion
References
